Hi [[ session.user.profile.firstName ]]

MetaCompliance Ltd

  • Date
  • Rating
  • Views
  • 5 practical steps to implement your GDPR project
    5 practical steps to implement your GDPR project
    Robert O'Brien, CEO, MetaCompliance & Shane Fuller, Privacy Director & DPO, MetaCompliance Recorded: May 23 2019 30 mins
    There is so much material out there claiming to be the ultimate guide to your GDPR project, but a lot of this is complex jargon that doesn’t offer a pragmatic solution to the GDPR conundrum.

    Ensuring a successful GDPR project requires financial investment as well as time. With the May 2018 deadline getting closer, there is an increasing unease within organisations regarding their ability to mitigate the risk and demonstrate compliance.

    With this Webinar, we will provide you with 5 practical steps to implement your GDPR project. By the end of the Webinar you will be in possession of structured and practical solutions that lead to GDPR compliance.

    As a bonus for attending the Webinar, you will also receive a copy of the official GDPR for Dummies guide. We understand that GDPR is a complex issue, that’s why we worked with subject matter experts and the Wiley brand to create the official GDPR for Dummies guide that offers a practical approach to GDPR.
  • Enabling the Third Line of Defence through Policy Assurance
    Enabling the Third Line of Defence through Policy Assurance
    Michael Rasmussen Recorded: Apr 18 2019 45 mins
    The Three Lines of Defence is a popular framework for managing Governance, Risk Management & Compliance (GRC).

    In our first webinar, we explored the policy implications of the first line of defence – the front-line employees, then we explored effective policy management and oversight in the second line of defence.

    In this webinar we now explore the third line of defence, audit and assurance professionals and their role in providing assurance and validation that policies are properly managed, communicated, and enforced in the organization.

    The third line of defence is key in providing validation and assurance that policies are properly managed and current by the second line of defence, and the third line provides assurance that the first line of defence is aware of policies and that they are lived by throughout the organization to maintain integrity, mitigate risk, and reliably achieve organization objectives.

    Join this session to learn:

    - How the third line interacts with the first and second lines of defence to provide assurance on policies
    - How to effectively audit and validate policies to ensure they are current and understood in the organization
    - Methods for third line employees to assure policies are managed by the second line
  • 5 Ways to Bake Privacy & Cyber Security Awareness into your Teams
    5 Ways to Bake Privacy & Cyber Security Awareness into your Teams
    James MacKay, Luke Noonan, Robert Pickett Recorded: Apr 4 2019 24 mins
    Most companies have active digital transformation projects aimed at evolving the organisation into the new digital economy. Its also becoming important in commercial relationships to be able to demonstrate that your organization has adopted best practice Privacy and Information Security best practices. Often these have to be detailed in vendor risk assessments.
    The problem is that these are relatively new concepts and initiatives for the majority of staff members. Often Corporate Communications for Digital Transformation projects neglect to highlight Privacy and Cyber Security requirements. On top of that, this is an area that staff view as dull and boring.

    Getting your senior management and staff to engage in the necessary Privacy and Cyber Security awareness projects requires innovative thinking. Our philosophy is that it is the responsibility of the organisation to make these topics palatable for employees.

    At this webinar we will explore tried and tested approaches to obtaining staff participation, whilst at the same time delivering audit reporting to assist with Regulator relations.

    The webinar will explain:

    How to focus on the human aspect, including the difficulty for management to maintain these initiatives.
    How to approach user digestion of complex InfoSec and Privacy subjects.
    Using increased Privacy and InfoSec projects for competitive advantage
  • 2019 Cyber Security Challenges for Local Government
    2019 Cyber Security Challenges for Local Government
    Robert O'Brien, Peter Grogan Recorded: Feb 28 2019 25 mins
    Local Government has been managing the impact of both Privacy and Cyber Security risk for many years. However, with the implementation of GDPR and the adoption of digital transformation initiatives, there has been a significant increase in the information security risks for public sector organisations.

    Robert O'Brien, CEO of MetaCompliance, will be joined by Peter Grogan, former Information Governance Officer for Somerset Council, in an informal exploration of these issues and what the future of Cyber Security in local Government might look like.
  • It's Cyber Awareness Jim, But Not as We Know It
    It's Cyber Awareness Jim, But Not as We Know It
    Robert O'Brien, James Mackay, Robert Pickett Recorded: Jan 31 2019 29 mins
    As hackers hone their techniques and become more targeted in their attacks, it’s important to educate staff and provide them with role specific Cyber Security training that can equip them to deal with the most up to date Cyber Security threats.

    The problem with traditional Cyber Security training is it is bland, boring and leads to very low levels of staff participation which poses a huge risk to the security of an organisation.

    To be effective, Cyber Security awareness training needs to be specific to each organisation. It should be tailored to reflect the way people really work with security in an organisation and address the threats they face on a daily basis.

    MetaLearning is a brand-new way of engaging staff with Cyber Security awareness. It enables organisations to create customised training for their staff from an extensive library of short eLearning courses. The courses are easy to create and can be personalised and branded to make the content more relevant to staff.

    At this webinar, attendees will learn:
    - How to engage staff with Cyber Security training that is relevant to their role
    - How automation within your organisation can be used to improve Cyber Security
    - Key initiatives for Cyber Security awareness in 2019
  • Enabling the Second Line of Defence with Effective Policy Management & Oversight
    Enabling the Second Line of Defence with Effective Policy Management & Oversight
    Michael Rasmussen Recorded: Jan 23 2019 47 mins
    The Three Lines of Defence is a popular framework for managing Governance, Risk Management & Compliance (GRC). In our first webinar on the Three Lines of Defence we explored the policy implications of the first line of defence – the front line employees. In this webinar we now explore the second line of defence, the risk, security, and policy owners and managers and their job in ensuring that policies are current and understood in the organization.

    Continual growth of regulatory requirements, complex business operations, and global expansion demand a well thought-out and implemented approach to policy management that is governed by the second line of defence. In order to achieve effectiveness, efficiency, and agility in policy management, organizations need to define a structured governance framework and process. However, effectively managing policies is easier said than done. To consistently manage and communicate policies, the second line of defence is turning toward defined processes and technologies to govern policies and implement an effective policy management lifecycle.

    This webinar focuses on how to effectively manage and govern policies and enable the second line of defense in your organization through effective policy oversight.
    Attendees will learn:
    • GRC and policy management in the context of the Three Lines of Defence Model
    • How the second interact with the first and third lines of defense to protect the organization
    • How to effectively manage and maintain polices in the organization
    • Methods for second line employees to ensure that first line of employees are aware of policies
    • How technology can automate and enable the second line of defence
    • Driving efficiency, effectiveness and agility into all three lines of defence

    Enabling the First Line of Defence Webinar: https://goo.gl/accjxb
  • Jingle Bells, Phishing Smells, Hackers Go Away!
    Jingle Bells, Phishing Smells, Hackers Go Away!
    Robert O'Brien, CEO MetaCompliance Recorded: Dec 18 2018 14 mins
    Phishing scams are a persistent problem for organisations at all times of the year, however there is a steep increase in the number of scams at Christmas as hackers take advantage of distracted staff to launch targeted attacks.

    When we’re distracted, mistakes happen, and Christmas tends to be the one time of the year when employees let their guard down which can result in a massive loss of sensitive data.

    Cybercriminals don’t care about your internal processes around Cyber Security awareness communication. They are not stifled by the rules around staff communication.

    Cyber Security awareness training needs to be a top priority and it has to be of “stand out” quality. Not the normal “techno porridge” that has been passing for Information Security and Privacy training over the last 15 years.

    Cyber Security awareness is about the hearts and minds of your staff and it’s one of the biggest challenges in this new digital economy. Join us at our short webinar to hear about the best practice approaches to getting employees to participate in securing your digital assets.

    This 15-minute webinar will cover:

    •The seasonal phishing scams your employees need to be wary of
    •The 5 key aspects of a Cyber Security Awareness program
    •How Cyber Security is not about indulging in wishful thinking.
  • 7 Cyber Habits for Mid-sized Organisations
    7 Cyber Habits for Mid-sized Organisations
    Robert O'Brien - CEO MetaCompliance LTD. Recorded: Nov 27 2018 24 mins
    Having world class cyber security is a luxury many medium sized enterprises cannot afford. Added to this, the battle to attract and retain suitable technical staff poses a huge challenge to the security and compliance posture of the bulk of mid-market companies in western economies.

    August 9th - 3pm GMT / 4pm CET / 11am EST / 10am CNT / 8am PST

    At this webinar you will learn:
    •The importance of changing everyday behaviour in the face of evolving and sophisticated cyber threats
    •Key questions you should ask your information technology management
    •Why Executives and the Board of Directors should bear the ultimate responsibility for the creation of a modern cyber ready organisation
    •How to build cyber security into your digital transformation exercise
  • Measuring Policy Effectiveness
    Measuring Policy Effectiveness
    Michael Rasmussen Recorded: Nov 20 2018 36 mins
    Defining Process & Metrics to Demonstrate Policy awareness and adherence.

    Policies are no good if they are left to be documents that are written and forgotten, stored on a physical or electronic shelf collecting real or digital dust. Organizations need policies that are correctly written, but also clearly understood and enforced in the environment. This webinar looks at the key metrics and process to effectively communicate policies in the environment, track awareness, enforce policies, and monitor metrics of policy adherence.

    Attendees will specifically learn how to:
    •Write policies that are clearly understood
    •Develop a policy communication and awareness plan
    •Demonstrate understanding of policies by individuals
    •Enforce policy compliance/adherence
    •Measure and monitor effectiveness of policies
  • A Nightmare on Breach Street
    A Nightmare on Breach Street
    Robert O'Brien, CEO MetaCompliance Recorded: Oct 17 2018 33 mins
    Could a lack of staff education lead to an information security nightmare?

    For many organisations, a data breach becomes their worst nightmare. In 2018, not only has the threat of cyber-attacks increased, the risk of financial sanctions are more real since the introduction of GDPR.
    Halloween celebrates all that is spooky and scary, but for many organisations, nothing is more terrifying than a severe business-crippling data breach. Apart from the fines, organisations can suffer significant reputational damage and massive management distractions trying to remediate the problem and deal with the PR fallout.

    Staff are often the weakest link in an organisation’s defences. Only by adopting a fit for purpose staff security awareness program and through educating staff on the importance of cyber security vigilance, can a suitable response to the new regulatory environment be created.

    At this webinar we will explore:
    • The changing landscape for employers and the challenge of preventing data breaches
    • The key areas of focus for organisations attempting to lower their cyber risk
    • Managing the awareness and privacy lifecycle
    • Demonstrating duty of care for regulators in the event of a breach

    3pm GMT / 4pm CET / 11am EST / 10am CNT / 8am PST

Embed in website or blog