Combating InfoSec Compliance Fatigue: Pain Points and Best Practices

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Information security compliance proves you can be trusted with sensitive customer data. Simply, it’s your license to sell. However, complying and keeping up with all the tasks associated to frameworks and the internal requirements you are managing can be very time-consuming and pose a real challenge to you and your team.  

In this webinar, you will hear first-hand from security experts the key pain-points they are facing today as well as detail into their secrets and strategies to keep up and be audit ready.  

You will leave the session knowing:  

  • Best techniques to build a bridge to the Line of Business (true 1st line)  
  • Data management streamlining, considering control requirements and business units needs  
  • Duplicate work minimisation and reconciliation techniques  
  • Best practices for reporting and collecting evidence    


Photo of Scott Bridgen

Scott Bridgen

Global GTM & Strategy Lead - GRC & Integrated Risk, OneTrust

Photo of Tony Hughes

Tony Hughes

Dir of cybersecurity & tech risk consulting, ANSEC IA & ISACA Emerging Trends Working Group Member

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for OneTrust here: Please see Infosecurity Magazine’s privacy policy for more information.