6 episodes

Craftsmen sharing knowledge on building security, privacy, and compliance programs.

The Virtual CISO risk3sixty

    • Business

Craftsmen sharing knowledge on building security, privacy, and compliance programs.

    Privacy Shield Was Invalidated - Now What?

    Privacy Shield Was Invalidated - Now What?

    In this video we will discuss the recent Privacy Shield invalidation and the relevant implications for companies.  

    #Privacy #PrivacyShield #Security

    • 12 min
    The CISO Role: How to Design a Security Leadership Role Custom Fit to for Your Organization

    The CISO Role: How to Design a Security Leadership Role Custom Fit to for Your Organization

    In this Episode, veteran CISO Shane Peden and Christian Hyatt discuss the common pitfalls of the CISO role as well as a framework to design a CISO role that makes sense for your organization.

    • 41 min
    SOC 2 Basics: Everything You Need to Get a SOC 2 Report

    SOC 2 Basics: Everything You Need to Get a SOC 2 Report

    In this podcast we cover the basics of SOC 2 reporting, what to expect during a SOC 2 audit, and why a SOC 2 report may make sense for your organization.   

    #SOC2 #cybersecurity #Compliance

    • 31 min
    ISO 27701: Everything you need to prepare for ISO 27701 certification

    ISO 27701: Everything you need to prepare for ISO 27701 certification

    In this webinar we discuss everything you need to prepare for an ISO 27701 certification, including the link between ISO 27701 and ISO 27001. We also discuss the implementation and certification process.  

    #ISO27001 #ISO27701 #Privacy #Security

    • 39 min
    ISO 27001 Basics: Everything You Need to Get Certified

    ISO 27001 Basics: Everything You Need to Get Certified

    In this video we will cover the basics of ISO 27001, the implementation process, and the certification process.   

    #ISO27001 #cybersecurity #risk3sixty

    • 43 min
    Pentest Engagement Types: A Guide to Understanding Simulated Attack Types

    Pentest Engagement Types: A Guide to Understanding Simulated Attack Types

    This webinar will define and explain common penetration test offerings in detail, outline the key differences and benefits, and which engagement type is the best fit for your organization.   #penetrationtesting #cybersecurity #security

    • 35 min

Top Podcasts In Business