{"id":11429,"date":"2024-07-25T14:33:02","date_gmt":"2024-07-25T12:33:02","guid":{"rendered":"https:\/\/lean42.com\/?post_type=mec-events&#038;p=11429"},"modified":"2024-08-21T14:48:43","modified_gmt":"2024-08-21T12:48:43","slug":"webinar-security-with-eam","status":"publish","type":"mec-events","link":"https:\/\/lean42.com\/de\/event\/webinar-security-with-eam\/","title":{"rendered":"Strengthening Your Cyber Security with EAM"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11429\" class=\"elementor elementor-11429\">\n\t\t\t\t<div class=\"has_eae_slider elementor-element elementor-element-6fb319e e-flex e-con-boxed e-con e-parent\" data-eae-slider=\"8478\" data-id=\"6fb319e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-3d42406 e-flex e-con-boxed e-con e-child\" data-eae-slider=\"28779\" data-id=\"3d42406\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d5d7431 elementor-widget elementor-widget-image\" data-id=\"d5d7431\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1332\" height=\"750\" src=\"https:\/\/lean42.com\/wp-content\/uploads\/2024\/07\/2024-10-17-Webinar-Security-EAM.jpg\" class=\"attachment-large size-large wp-image-11484\" alt=\"\" srcset=\"https:\/\/lean42.com\/wp-content\/uploads\/2024\/07\/2024-10-17-Webinar-Security-EAM.jpg 1332w, https:\/\/lean42.com\/wp-content\/uploads\/2024\/07\/2024-10-17-Webinar-Security-EAM-1200x676.jpg 1200w, https:\/\/lean42.com\/wp-content\/uploads\/2024\/07\/2024-10-17-Webinar-Security-EAM-360x203.jpg 360w\" sizes=\"(max-width: 1332px) 100vw, 1332px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-caf2838 elementor-widget elementor-widget-heading\" data-id=\"caf2838\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Enhance Your Cybersecurity Posture: Essential Strategies and Compliance Insights<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79d983d elementor-widget elementor-widget-heading\" data-id=\"79d983d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">In an era where cyber threats are increasingly sophisticated and frequent, it is essential for organizations to continuously enhance their security strategies. Our webinar, \"Strengthening Your Cyber Security with EAM\" offers insights into the effective management of information security. We'll explore the synergies between Enterprise Architecture Management (EAM) and Information Security Management Systems (ISMS) and discuss how integrating EAM with a Configuration Management Database (CMDB) can significantly enhance ISMS.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed22e20 elementor-widget elementor-widget-text-editor\" data-id=\"ed22e20\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Key Topics Covered:<\/strong><\/p><ul><li><strong>Interaction and Synergies between EAM and ISMS:<\/strong><br \/>Understand how the integration of EAM and ISMS can create a cohesive security framework, enhancing your organization&#8217;s ability to respond to and recover from security incidents.<\/li><li><strong>Introduction to the Lean42 Security Strategy Model:<\/strong><br \/>Learn about the Lean42 Security Strategy Model, which aligns security initiatives with business goals, assesses risks in the context of your company&#8217;s overall risk tolerance, and provides a holistic framework for improving security capabilities.<\/li><li><strong>Overview of Key Regulatory Requirements and Frameworks:<\/strong><br \/>Get an overview of crucial regulatory requirements and standardized frameworks, including the NIS2 Directive and the new Digital Operational Resilience Act (DORA). We&#8217;ll outline the necessary steps for compliance and discuss the implications of these regulations on your organization.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2e241f elementor-widget elementor-widget-text-editor\" data-id=\"f2e241f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Target Audience:<\/strong><\/p><p>This webinar is ideal for Chief Information Security Officers (CISOs), Information Security Officers (ISOs), IT Managers, Compliance Officers, Business Continuity Planners, Risk Management Professionals, Enterprise Architects, and anyone interested in enhancing their organization&#8217;s cybersecurity posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1686b0 elementor-widget elementor-widget-heading\" data-id=\"c1686b0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Secure your spot to gain valuable insights into enhancing your organization's cybersecurity posture and ensuring regulatory compliance.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b2c703 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"7b2c703\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/lean42.com\/webinars\/cybersecurity-with-eam\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Register now!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45c7045 elementor-widget elementor-widget-spacer\" data-id=\"45c7045\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-a4a61a2 e-flex e-con-boxed e-con e-child\" data-eae-slider=\"74278\" data-id=\"a4a61a2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88e7262 elementor-widget elementor-widget-heading\" data-id=\"88e7262\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Thursday, October 17, 2024<br \/>\n10 am CEST<br \/>\nOnline<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"shariff shariff-align-flex-end shariff-widget-align-flex-end\" style=\"display:none\"><div class=\"ShariffHeadline\">Share:<\/div><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin\" style=\"background-color:#1488bf;border-radius:10%\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Flean42.com%2Fde%2Fevent%2Fwebinar-security-with-eam%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\";border-radius:10%; background-color:#c4c4c4; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button xing\" style=\"background-color:#29888a;border-radius:10%\"><a href=\"https:\/\/www.xing.com\/spi\/shares\/new?url=https%3A%2F%2Flean42.com%2Fde%2Fevent%2Fwebinar-security-with-eam%2F\" title=\"Share on XING\" aria-label=\"Share on XING\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\";border-radius:10%; background-color:#c4c4c4; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 25 32\"><path fill=\"#126567\" d=\"M10.7 11.9q-0.2 0.3-4.6 8.2-0.5 0.8-1.2 0.8h-4.3q-0.4 0-0.5-0.3t0-0.6l4.5-8q0 0 0 0l-2.9-5q-0.2-0.4 0-0.7 0.2-0.3 0.5-0.3h4.3q0.7 0 1.2 0.8zM25.1 0.4q0.2 0.3 0 0.7l-9.4 16.7 6 11q0.2 0.4 0 0.6-0.2 0.3-0.6 0.3h-4.3q-0.7 0-1.2-0.8l-6-11.1q0.3-0.6 9.5-16.8 0.4-0.8 1.2-0.8h4.3q0.4 0 0.5 0.3z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button facebook\" style=\"background-color:#4273c8;border-radius:10%\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Flean42.com%2Fde%2Fevent%2Fwebinar-security-with-eam%2F\" title=\"Share on Facebook\" aria-label=\"Share on Facebook\" role=\"button\" rel=\"nofollow\" class=\"shariff-link\" style=\";border-radius:10%; background-color:#c4c4c4; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 18 32\"><path fill=\"#3b5998\" d=\"M17.1 0.2v4.7h-2.8q-1.5 0-2.1 0.6t-0.5 1.9v3.4h5.2l-0.7 5.3h-4.5v13.6h-5.5v-13.6h-4.5v-5.3h4.5v-3.9q0-3.3 1.9-5.2t5-1.8q2.6 0 4.1 0.2z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button twitter\" style=\"background-color:#595959;border-radius:10%\"><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Flean42.com%2Fde%2Fevent%2Fwebinar-security-with-eam%2F&text=Strengthening%20Your%20Cyber%20Security%20with%20EAM\" title=\"Share on X\" aria-label=\"Share on X\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\";border-radius:10%; background-color:#c4c4c4; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\"><path fill=\"#000\" d=\"M14.258 10.152L23.176 0h-2.113l-7.747 8.813L7.133 0H0l9.352 13.328L0 23.973h2.113l8.176-9.309 6.531 9.309h7.133zm-2.895 3.293l-.949-1.328L2.875 1.56h3.246l6.086 8.523.945 1.328 7.91 11.078h-3.246zm0 0\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button whatsapp\" style=\"background-color:#5cbe4a;border-radius:10%\"><a href=\"https:\/\/api.whatsapp.com\/send?text=https%3A%2F%2Flean42.com%2Fde%2Fevent%2Fwebinar-security-with-eam%2F%20Strengthening%20Your%20Cyber%20Security%20with%20EAM\" title=\"Share on Whatsapp\" aria-label=\"Share on Whatsapp\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\";border-radius:10%; background-color:#c4c4c4; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#34af23\" d=\"M17.6 17.4q0.2 0 1.7 0.8t1.6 0.9q0 0.1 0 0.3 0 0.6-0.3 1.4-0.3 0.7-1.3 1.2t-1.8 0.5q-1 0-3.4-1.1-1.7-0.8-3-2.1t-2.6-3.3q-1.3-1.9-1.3-3.5v-0.1q0.1-1.6 1.3-2.8 0.4-0.4 0.9-0.4 0.1 0 0.3 0t0.3 0q0.3 0 0.5 0.1t0.3 0.5q0.1 0.4 0.6 1.6t0.4 1.3q0 0.4-0.6 1t-0.6 0.8q0 0.1 0.1 0.3 0.6 1.3 1.8 2.4 1 0.9 2.7 1.8 0.2 0.1 0.4 0.1 0.3 0 1-0.9t0.9-0.9zM14 26.9q2.3 0 4.3-0.9t3.6-2.4 2.4-3.6 0.9-4.3-0.9-4.3-2.4-3.6-3.6-2.4-4.3-0.9-4.3 0.9-3.6 2.4-2.4 3.6-0.9 4.3q0 3.6 2.1 6.6l-1.4 4.2 4.3-1.4q2.8 1.9 6.2 1.9zM14 2.2q2.7 0 5.2 1.1t4.3 2.9 2.9 4.3 1.1 5.2-1.1 5.2-2.9 4.3-4.3 2.9-5.2 1.1q-3.5 0-6.5-1.7l-7.4 2.4 2.4-7.2q-1.9-3.2-1.9-6.9 0-2.7 1.1-5.2t2.9-4.3 4.3-2.9 5.2-1.1z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto\" style=\"background-color:#a8a8a8;border-radius:10%\"><a href=\"mailto:?body=https%3A%2F%2Flean42.com%2Fde%2Fevent%2Fwebinar-security-with-eam%2F&subject=Strengthening%20Your%20Cyber%20Security%20with%20EAM\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\";border-radius:10%; background-color:#c4c4c4; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button printer\" style=\"background-color:#a8a8a8;border-radius:10%\"><a href=\"javascript:window.print()\" title=\"print\" aria-label=\"print\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\";border-radius:10%; background-color:#c4c4c4; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 30 32\"><path fill=\"#999\" d=\"M6.8 27.4h16v-4.6h-16v4.6zM6.8 16h16v-6.8h-2.8q-0.7 0-1.2-0.5t-0.5-1.2v-2.8h-11.4v11.4zM27.4 17.2q0-0.5-0.3-0.8t-0.8-0.4-0.8 0.4-0.3 0.8 0.3 0.8 0.8 0.3 0.8-0.3 0.3-0.8zM29.7 17.2v7.4q0 0.2-0.2 0.4t-0.4 0.2h-4v2.8q0 0.7-0.5 1.2t-1.2 0.5h-17.2q-0.7 0-1.2-0.5t-0.5-1.2v-2.8h-4q-0.2 0-0.4-0.2t-0.2-0.4v-7.4q0-1.4 1-2.4t2.4-1h1.2v-9.7q0-0.7 0.5-1.2t1.2-0.5h12q0.7 0 1.6 0.4t1.3 0.8l2.7 2.7q0.5 0.5 0.9 1.4t0.4 1.6v4.6h1.1q1.4 0 2.4 1t1 2.4z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button rss\" style=\"background-color:#ff8c00;border-radius:10%\"><a href=\"https:\/\/lean42.com\/de\/feed\/rss\/\" title=\"RSS feed\" aria-label=\"RSS feed\" role=\"button\" class=\"shariff-link\" style=\";border-radius:10%; background-color:#c4c4c4; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#fe9312\" d=\"M4.3 23.5c-2.3 0-4.3 1.9-4.3 4.3 0 2.3 1.9 4.2 4.3 4.2 2.4 0 4.3-1.9 4.3-4.2 0-2.3-1.9-4.3-4.3-4.3zM0 10.9v6.1c4 0 7.7 1.6 10.6 4.4 2.8 2.8 4.4 6.6 4.4 10.6h6.2c0-11.7-9.5-21.1-21.1-21.1zM0 0v6.1c14.2 0 25.8 11.6 25.8 25.9h6.2c0-17.6-14.4-32-32-32z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>This webinar will guide you on preparing for and responding to inevitable security incidents. Key topics include the financial impacts of cyberattacks, the Lean42 Security Strategy Model, and compliance with regulations such as the NIS2 Directive and DORA. Gain insights into best security practices and the integration of EAM &#038; CMDB to support ISMS.<\/p>\n","protected":false},"author":2,"featured_media":10333,"comment_status":"closed","ping_status":"closed","template":"","tags":[498,499,249,500],"mec_category":[393],"mec_speaker":[501],"class_list":["post-11429","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","tag-cyber-security","tag-dora","tag-enterprise-architecture-management","tag-nis2","mec_category-webinars"],"_links":{"self":[{"href":"https:\/\/lean42.com\/de\/wp-json\/wp\/v2\/mec-events\/11429","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lean42.com\/de\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/lean42.com\/de\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/lean42.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/lean42.com\/de\/wp-json\/wp\/v2\/comments?post=11429"}],"version-history":[{"count":0,"href":"https:\/\/lean42.com\/de\/wp-json\/wp\/v2\/mec-events\/11429\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lean42.com\/de\/wp-json\/wp\/v2\/media\/10333"}],"wp:attachment":[{"href":"https:\/\/lean42.com\/de\/wp-json\/wp\/v2\/media?parent=11429"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lean42.com\/de\/wp-json\/wp\/v2\/tags?post=11429"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/lean42.com\/de\/wp-json\/wp\/v2\/mec_category?post=11429"},{"taxonomy":"mec_speaker","embeddable":true,"href":"https:\/\/lean42.com\/de\/wp-json\/wp\/v2\/mec_speaker?post=11429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}