Do you feel that your risk register has become a graveyard for unresolved issues?
We will show you how to shift your focus from passive documentation to active decision support.
You will also see how you can use gamification to test your process and adapt it until it works as intended.
You will learn practical methods for making risk management simple, transparent, and easy to automate.
On-demand
(from February 10)
Emergency preparedness exercises cannot stand alone.
In this webinar, we will review the activities that are relevant throughout the year in order to ensure strong and operational emergency preparedness. The activities in the annual cycle will be relevant for all forms of emergency preparedness and cover maintenance, education, training, exercises, and improvements.
On-demand
(from February 18)
Get to grips with cyber security maps and compasses.
This webinar will give you inspiration on how to set a direction for cyber and information security that follows the same strategic goals as your company.
We will review the definition of objectives, the timing of sub-goals, and risk-based prioritization of sequence. Strategic cybersecurity is a strong foundation for relevant management reporting.
On-demand
(from February 26)
Many people confuse recovery with a simple backup and restore.
But in reality, it is much more than that. In this webinar, we will talk about how to create recovery plans that actually work when systems and businesses need to get back up and running.
March 23, 2026
9:00-9:30 a.m.
How to build technical recovery plans that are easy to maintain and test.
We go through the elements of a good plan and the principles you should follow to get a good and operational result. Based on extensive experience.
March 24, 2026
9:00-9:30 a.m.
Most companies have conducted a Business Impact Analysis.
But they often find that it does not help them make decisions.
In this webinar, we show why BIA should be used to manage priorities, investments, and trade-offs, and not just for documentation. See how management can use BIA to set the direction.
Can others understand what you are saying?
In this webinar, we will explore various techniques for communicating visually and telling relevant stories that the audience will remember. This is not about the subject matter itself, but about the ability to get your message across and ensure it is understood.
We will review various examples using graphics, video, photos, animations, and hand drawings. You will be inspired to be more courageous in your communication.
You probably have your home emergency preparedness under control, but what should you do as a business?
Is canned mackerel or satellite communication more important, and what should it actually be used for? We look at different scenarios and provide examples of "packages" that would be useful to put together for the situation.
This is do-it-yourself prepping for businesses, which is very relevant in times of hybrid threats.
Most GRC and security projects don't fail because of the tasks involved—they fail because of a lack of common understanding.
It's often too late when you realize that business, IT, and compliance have been working from different perspectives. In this webinar, we'll show you how simple visualizations can create a common language, faster decisions, and real ownership in your GRC implementation.
More training in smaller doses. That is the way to achieve a functional and operational emergency response.
In this webinar, we will review the principles of microtraining and microexercises, and how to improve your organization's skills without spending an enormous amount of time. It is about small, targeted efforts that are persistent. Get inspired for your own training.
How much security can you design without leaving it up to your colleagues?
We often hear that "the user is the weakest link." But if that's the case, then we've designed it that way, and changing behavior is both expensive and difficult, and often not effective enough.
This webinar is about choosing your battles wisely and thinking through the business case before the next campaign.
Automation sounds like the answer to everything in cybersecurity.
But if you automate the wrong things, you'll just amplify your mistakes. In this webinar, we'll look at the most important considerations before you power up your security work.
You'll gain insight into what needs to be in place first—management, responsibility, and decisions. So automation becomes a lever, not a risk.
We show you how to use risk management as a tool to focus and prioritize your efforts so that you get the most out of your available resources.
Even if you are ISO-certified, you can significantly reduce your administrative burden without compromising safety. At the same time, you will be able to reduce your remarks. We will show you how with specific examples.
Emergency preparedness exercises cannot stand alone.
In this webinar, we will review the activities that are relevant throughout the year in order to ensure strong and operational emergency preparedness. The activities in the annual cycle will be relevant for all forms of emergency preparedness and cover maintenance, education, training, exercises, and improvements.
This webinar will give you inspiration on how to improve resilience in your business with small, simple steps.
The scenarios we discuss cover cyber, personnel, buildings, supplies, and physical information assets.
This webinar is relevant for all companies that want to strengthen their resilience, regardless of whether they are subject to requirements from DORA, NIS2, CER, partners, or not.
Most organizations do not have too little security—but often too much of the wrong kind.
Everything grows. Policies, controls, processes, and meetings. In this webinar, we show you how to cut through the noise and focus on what actually reduces risk.
You will learn concrete steps to simplify your security management without losing control. This makes security easier to operate and harder to circumvent.
How to demonstrate the connection between technology, processes, requirements, and strategy. Dynamic and transparent reports are a highly effective tool for improving security.
We will review a simple method for building a report together with senior management and connecting it to the data you have available.
It is not always a good idea to use templates when drawing up contingency plans for business continuity.
We provide you with tools and examples of business continuity plans and how to test them.
Most IAM and security projects don't fail because of the tasks involved—they fail because of a lack of common understanding.
It's often too late when you realize that business, IT, and compliance have been working from different perspectives. In this webinar, we'll show you how simple visualizations can create a common language, faster decisions, and real ownership in your IAM implementation.