News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Webinars
»
Shielding Yourself: A CISO's Guide to Personal Liability Protection
Shielding Yourself: A CISO's Guide to Personal Liability Protection
Webinar
18 Feb 2025
Speakers
Jessica Nall
Partner, Baker & McKenzie LLP
Why not watch?
How CISO's Can Survive and Thrive in a Complex Cyber Landscape
18 Feb 2025
Pluralsight Keynote: AI in Cybersecurity From Compliance to Threat Defense
18 Feb 2025
#IMOS18 - CISO Interview; Paul Watts, Dominos
11 Sep 2018
#IMOS19 Profile Interview - Jennifer Leggio
27 Mar 2019
You may also like
Business Confidence in Cloud Security Grows
News
13 Jan 2016
#Infosec2025: Cybersecurity Lessons From Maersk’s Former CISO
News
5 Jun 2025
Google’s Nick Godfrey on Overcoming CISOs' Mounting Security Challenges
Interview
19 May 2025
Google Cloud: CISOs Demand Simplified Security Tools Amid Growing Tech Complexity
News
10 Apr 2025
Over Half of Organizations Report Serious OT Security Incidents
News
5 Mar 2025
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
One in 12 US/UK Employees Uses Chinese GenAI Tools
News
17 Jul 2025
1
Grok-4 Jailbroken Two Days After Release Using Combined Attack
News
14 Jul 2025
2
Education Sector is Most Exposed to Remote Attacks
News
16 Jul 2025
3
SaaS Security Adoption Grows Amid Rising Breach Rates
News
15 Jul 2025
4
Louis Vuitton UK Latest Retailer Hit by Data Breach
News
14 Jul 2025
5
Four Arrested in Connection with April UK Retail Attacks
News
10 Jul 2025
6
Indian Cyber Espionage Group Targets Italian Government
News
11 Jul 2025
1
ISACA Addresses Experience Gap with CISA Associate Designation
News
11 Jul 2025
2
IoT Devices at Risk Due to eSIM Flaw in Kigen eUICC Cards
News
14 Jul 2025
3
LLMs Fall Short in Vulnerability Discovery and Exploitation
News
10 Jul 2025
4
Microsoft Exposes Scattered Spider’s Latest Tactics
News
17 Jul 2025
5
MPs Warn of “Significant” Iranian Cyber-Threat to UK
News
11 Jul 2025
6
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance
Webinar
17 Jul 2025
1
Predicting and Prioritizing Cyber Attacks Using Threat Intelligence
Webinar
26 Jun 2025
2
Cybersecurity Employment: Making Sense of Conflicting Messaging
Webinar
19 May 2025
3
How CISO's Can Survive and Thrive in a Complex Cyber Landscape
Webinar
18 Feb 2025
4
Reimagining the SOC: From Reactive to Resilient
Webinar
17 Jun 2025
5
Safeguarding Critical Supply Chain Data Through Effective Risk Assessment
Webinar
10 Apr 2025
6
#Infosec2025: How CISOs Can Manage Budgets Effectively Amid Spending Restraints with Madelein van der Hout (video)
Interview
5 Jun 2025
1
Scattered Spider Uses Tech Vendor Impersonation and Phishing Kits to Target Helpdesks
News
6 Jun 2025
2
#Infosec2025: Understanding AI's Role in Exploiting Human Cyber Vulnerabilities (video)
Interview
5 Jun 2025
3
How to Incentivize Security by Design
News Feature
26 May 2025
4
How AI and Verifiable Credentials Are Redefining Digital Identities
Webinar
27 Mar 2025
5
#Infosec2025: NCA Cyber Intel Head on Cybercrime's New Post-Trust Era (video)
Interview
3 Jun 2025
6