Live presentations & recordings

Next Live Webinar Sessions

Webinar Recordings

Access free webinar recordings here.

What If you didnt have IT General Controls

Through the study and analysis of real-life cases, learn why ITGCs are essential to protecting your company’s assets.


Not getting the most from your IAM system?

Does your identity management system leave you only mildly satisfied? No need to rip and replace your current solution.

replay Not getting the most from your IAM system?

CyberArk Access Management Tool Enhancements

Have you chosen CyberArk’s Privileged Access Manager solution to help you with this? In order to resolve the issues that customers face using CyberArk PAM, Brainwave GRC has created PAM Booster as a Service designed for CyberArk.

CyberArk Pam Booster

What should you know about securing logical access rights in alignment with the EBA/EIOPA guidelines?

Find out why the user access review is an essential control mechanism for following the EBA and EIOPA guidelines.

eba eiopa

Webinar – Can IAM Be Done without Identity Analytics?

IAM without Identity Analytics is like driving without a steering wheel or without headlights at night.

Identity Analytics allows you to map all the resources and applications of the company to thoroughly analyze who has access to what, to calculate a risk score for each access, and to make recommendations that help with decision-making.


can iam be done without identity analytics

Webinar – Access Review Automation: Feedback from ADP

Access Review Automation at ADP: Carte Blanche to Pierre Dumas.
We bring you the exceptional testimony of Pierre Dumas, IT Security and Compliance Director at ADP, EMEA. Pierre talks about how ADP implemented the access review, how it was optimized, and how the teams were involved.

Webinar Revue des accès automatisée Retour client ADP

Webinar – Periodic or Continuous Access Reviews: 2 Strategies

There are two ways of doing user access reviews. The most common is the periodic review which shows compliance at a specific date in time.

However, the continuous review strategy is actually more important from a best practice standpoint because it reduces the risks associated with access information.

To find out more about these two ways of doing access reviews, click on the image.

Webinars revues 2 strategies EN Replay

Webinar – Implementing a Role Mining Project: Customer Experience and Feedback from Wavestone

Wavestone shares its user experience and discusses the implementation of a Brainwave Role Mining project for one of its hospital clients.
Watch this webinar to learn the details of how to gather and clean data, define a project scope, and create role modeling.


Webinar – Role mining: How to?

What are the main stages to follow to build quality roles?
Watch this webinar to discover all best practices and identify the main pitfalls of a role mining project.

recording role mining

Webinar – Q&A Role Mining: Everything You Need to Know

The floor is yours! Ask us anything you ever wanted to know about role mining: its definition, the stakes, the mechanics and best practices.

Recording Q&A role mining

Webinar – Make Your User Access Reviews More Efficient with Brainwave

Intuitive, efficient and easy to use: these are a few of the words that our customers use to describe their experience with the Brainwave GRC solution as their choice for performing their automated access reviews.

Do you wonder what the tool looks like, how it works and why it is so popular among our users?

To find out, join our webinar, and we will demonstrate how the tool is used with a variety of customer use cases.

Webinar – User Access Review Implementation and Benefits

After a short recap on why to automate your user access review, discover the best practices used in implementing a user access review process in addition to key customer use cases and the advantages they received in using Brainwave’s expertise.

Live Q&A session – User Access Review

After a short introduction on Access Review and what’s at stake, our CEO and CTO answer all your questions about the benefits and the implementation of a UAR process.

With this webinar, learn all you ever wanted to know about automating user access review.

How to Implement True Privileged Access Governance

Boost your PAM program to implement true privileged access governance.

Do you know who has access to your resources? Are you aware of all the privileged accounts in your organization? Are your employees involved in your PAM program?

With this webinar, learn how Brainwave gives you 360° visibility to your privileged accounts so you don’t miss a thing!

How to Implement IT General Controls

The purpose of ITGCs or IT General Controls is to protect information against unauthorized use, disclosure or modification and against any damage or loss of data.

The implementation of these controls is a regulatory obligation for large companies.

With this webinar, discover how Brainwave iGRC can help you meet these control and compliance requirements.

Deploying a User Access Review Initiative

Learn about the organizational and technical considerations to set up a User Access Review (UAR): process flow, pitfalls to avoid, implementation strategies, tips for managing change and performance indicators.

Problems and Solutions for Access Review and Remediation

To avoid the inherent pitfalls of user access review as well as to ensure compliance to regulations and to your internal company policies, register to discover the best practices for a successful implementation and industrialisation of your reviews with Brainwave Identity GRC.

Active Directory and Identity Governance

Discover what is at stake regarding Active Directory, the cornerstone of your digital transformation, and how Booster for Active Directory makes it possible to visualize, contextualize, and analyze the risks related to access within all of your Active Directory domains and to produce reports and dashboards designed to improve the situation.

Logical Access Control for Financial Systems

Discover how to automate your controls including SoD controls and efficiently ensure your security policy’s implementation in order to easily reduce and manage your fraud and compliance risks.

Identity Governance and Unstrucured Data

Discover with Booster Data Governance how to start building a full inventory of your unstructured data access, tag shared folders with sensitive and personal data, retrieve the identities in the company that can access this data, understand the reason why and check the legitimacy of these accesses.

Internal Control Automation and GRC Analysis

Discover how to automate controls with Brainwave GRC, especially SoD controls, and reduce fraud risk in your financial systems.

Ready To Get Started?