How to Manage Your Risks and Protect Your Financial Data

Register Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Companies in the finance and insurance sector are today faced with a complex landscape of risk management and third-party security.  

Today's security leaders are tasked with being able to effectively manage their risks and those of third-party providers and protect their financial data from potential security threats.

This webinar focuses on the growing risks in the financial industry. The speakers will highlight proven strategies for protecting financial infrastructure, sensitive data and business continuity.

They will emphasise the urgent need for action by citing recent studies on threat trends from compromised third-party providers, data theft, unpatched systems, outdated technology, data breaches and vulnerabilities.

By joining this webinar attendees will: 

  • Understand how to respond to threats in an effective and DORA-compliant manner using modern cybersecurity solutions
  • Learn how to use the Censys Internet Map to proactively identify and mitigate these risks

Speakers

Photo of Harald  Roeder

Harald Roeder

Senior Sales Engineer, Censys

Photo of Tabatha Von Koelichen

Tabatha Von Koelichen

Regional Sales Director, Censys

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Censys here: https://censys.com/privacy-policy/. Please see Infosecurity Magazine’s privacy policy for more information.