Techniques for Good Cyber Governance, Compliance & IT Security Strategies
Masterclass
Techniques for Good Cyber Governance, Compliance & IT Security Strategies
Duration: 1 Hour
Techniques for Good Cyber Governance, Compliance & IT Security Strategies
Dulan Fernando
Head of Information Security & Compliance, Camms
Techniques for Good Cyber Governance, Compliance & IT Security Strategies
David Turner
Chief Executive Officer, RiskNZ
Watch Now

In today's digital landscape, regulatory demands and cyber threats are ever-evolving, making robust governance practices vital for any organisation. Join David Turner, CEO of RiskNZ, and Dulan Fernando, Head of Information Security & Compliance at Camms, for an insightful webinar focused on mastering IT governance, compliance, and security. This session will cover key frameworks such as NIST RMF, ISO 27005, COSO, and ISO 31000, offering actionable strategies for ensuring compliance, managing cyber risks, and protecting data.

Ideal for IT professionals, risk managers, and compliance officers, this webinar will provide practical insights to enhance your organisation's security posture while ensuring regulatory compliance. We will guide you through the core principles of effective governance and share practical insights on enhancing your organisation’s IT compliance and security posture. Ensure your organisation is prepared for the future by developing a strong culture of compliance and resilience.

Meet our Speakers
Meet the thought leaders and product experts who provide insights in this session
Webinar Highlights
This on-demand webinar covers the essential topics outlined below
Related Webinars
Find similar webinars on related topics to enhance your knowledge and skills...
Techniques for Good Cyber Governance, Compliance & IT Security Strategies
Techniques for Good Cyber Governance, Compliance & IT Security Strategies
Get In Touch
Our team is ready and available to support you with any inquiry you may have.
Contact Support
Techniques for Good Cyber Governance, Compliance & IT Security Strategies