Hi [[ session.user.profile.firstName ]]

SAI Global

  • Date
  • Rating
  • Views
  • The Core Principles for Effective Internal Auditing
    The Core Principles for Effective Internal Auditing
    Norman Marks, CPA, CRMA, Author, Evangelist and Mentor Recorded: Jul 2 2019 59 mins
    Recent headlines:

    • “Internal audit report finds issues in University of Iowa Department of Public Safety Information Technology”

    • “Renault uncovers €11mn in questionable expenses linked to ex-CEO Ghosn”

    • Audit: TVA Failed to Meet Federal Cybersecurity Standards”

    There’s one common thread here: Internal auditors are knocking it out of the park.

    Behind the success of these Internal Auditors are a set of best practices you need to hear about from the renowned Internal Auditor, Norman Marks.

    Are you willing to pony up? Join us for a live webinar with Marks on July 2 at 2:00pm EDT.
  • Yikes! You're Surrounded by a Multi-Generational Workforce
    Yikes! You're Surrounded by a Multi-Generational Workforce
    Todd Fitzgerald Managing Director/CISO, CISO Spotlight, LLC Recorded: Jun 5 2019 60 mins
    Have you noticed lately that your InfoSec team is made up of Gen Xers, Millennials and Baby Boomers?

    Perhaps you’re finding that your co-workers who are in their 50s on up are more collaborative. And those younger are more opinionated, more likely to take risks and make quicker decisions.

    Don’t just shake your head yes.

    It’s not enough to simply co-exist with your colleagues, direct reports or managers. Understanding the multi-generational workplace is a critical factor to meet the daily challenges like discovering the weak links in your supply chain or identifying potential data breaches.

    Stick around for our continuing CISO Leadership Series featuring Todd Fitzgerald, veteran InfoSec practitioner and CISO, who will debunk misconceptions you may have about generations, explore the commonalities and begin to formulate how you might approach one another to affect a more powerful team.

    No secret sauce. Just common sense.
  • White Hat Hackers: Infiltrators for the Good
    White Hat Hackers: Infiltrators for the Good
    Vinny Troia, Joshua Crumbaugh and Alex Heid Recorded: May 9 2019 63 mins
    Some folks very successfully use “the dark side of the force” to further InfoSec practices as ethical hackers.

    And we’ve lined up a panel of three of the world’s leading--and coolest--white hat hackers out there:

    Vinny Troia, Joshua Crumbaugh and Alex Heid.

    Over the next couple of weeks we’re going to introduce you to our high-profile digital investigators, tell you some of their mind-bending stories and show you why you should carve out time in your calendar for this event.

    Their stories are going to reveal what it’s like behind “Darth Vader’s mask”--an exclusive peek inside the mind of an ethical hacker.
    The webinar will go live on May 9 at 2 pm EDT. Take action now to register.

    Only you could be so bold.
  • Norman Marks: Making Business Sense of Technology Risk
    Norman Marks: Making Business Sense of Technology Risk
    Norman Marks, CPA, CRMA, Author, Evangelist and Mentor Recorded: Apr 30 2019 59 mins
    Technology risk.

    The meaning of those words is broad.

    And means something different to different IT Security folks.

    But there’s one common thread: taking a business-first approach to technology risk. If this is something you’re struggling with, we’d like to have you join us for a live webinar on April 30 at 2:00pm EDT with Norman Marks leading the discussion.

    Technology risk must be an ongoing business conversation. Are you in?
  • Actionable Security Policies for Cyber Defense
    Actionable Security Policies for Cyber Defense
    Susan Morrow, Head of Research & Development, Avoco Secure Recorded: Apr 25 2019 54 mins
    Listen to this webinar as we explore how an effective security policy can prevent your workforce from falling foul of attacks from cyber criminals.

    A well-developed security policy is a powerful risk mitigation tool. As the media reminds us every day, it's often not IT systems, but people, that fall victim to hacking attempts. Regardless of company size, a security policy can establish actionable ways for your organization to foster and enforce a workforce culture of security awareness.

    To help information security leaders build an effective security policy or fine-tune an existing program, SAI Global has partnered with security expert Susan Morrow, Head of Research & Development at Avoco Secure, to discuss the critical steps you should take to develop your security policy.

    Susan will share:

    • The risks of not having a security policy
    • The value of going beyond off-the-shelf policy solutions
    • Critical steps in policy development
    • The effectiveness of a global policy vs. department-specific policies
    • Suggestions on policy content, scope and implementation
  • Phishing: The Security Threat You Can't Ignore
    Phishing: The Security Threat You Can't Ignore
    Mike Nobers, Director of Channel InfoSec Institute Recorded: Apr 24 2019 58 mins
    With email providing the entry point for 91% of global cyber-attacks, a sustainable information security and data privacy risk management program needs to empower employees and third-party vendors to detect, avoid and report security risks and phishing attacks.

    Consider account verification emails, DocuSign requests, cloud file sharing alerts and delivery notifications. These asks could actually be a phishing attack in disguise.

    Learn to spot the signs and how to enable your team to be the first line of defense.

    Join SAI Global and the InfoSec Institute as Mike Nobers, Director of Channel InfoSec Institute discusses the critical steps in addressing phishing in the workplace. Exploring how software can help organizations identify risk and phish-susceptible individuals with market-leading risk intelligence capabilities that can help ensure a security culture.

    Topics to be covered include:

    • Why Phishing attacks are so successful
    • How to approach team members with awareness training
    • What technology measures organizations can take to protect themselves
    • Where the threat landscape is heading
  • CISO Leadership Series: Getting the Job Done without the Shiny Object
    CISO Leadership Series: Getting the Job Done without the Shiny Object
    Todd Fitzgerald Managing Director/CISO, CISO Spotlight, LLC Recorded: Apr 17 2019 59 mins
    Are you continuously refining many of your business processes and procedures just to get your job done? What if there was an easier way to retool some of those broken methods and land on processes that make better sense?

    Tune in for our 4th live webinar in our CISO Leadership Series with Todd Fitzgerald, veteran CISO, April 17 at 2:00pm EDT. Fitzgerald will talk us through the ‘systems’ area of the McKinsey 7S diagnostic model which is widely used by academics and practitioners, and remains one of the most popular strategic planning tools

    If you’re thinking that your business processes and procedures are ineffective or need improvement, take a moment to register for this enlightening presentation.

    You just might get by without the shiny object.
  • Norman Marks: The Concept of Risk Appetite is Flawed
    Norman Marks: The Concept of Risk Appetite is Flawed
    Norman Marks, CPA, CRMA, Author, Evangelist and Mentor Recorded: Mar 26 2019 55 mins
    Amid the common definition of the phrase ‘risk appetite’, GRC trailblazer Norman Marks, debunks its conventional meaning during a live talk on Tuesday, March 26, 2019 at 2:00pm EDT. Marks will bring you a fresh perspective on recognizing that no organization will succeed if it doesn’t take a risk.

    So let’s stop talking about managing and mitigating risk. Let’s talk about what might happen.
  • CISO Leadership Series: Who you report to could have unintended consequences
    CISO Leadership Series: Who you report to could have unintended consequences
    Todd Fitzgerald Managing Director/CISO, CISO Spotlight, LLC Recorded: Mar 13 2019 55 mins
    Think blue skies…if you could select your supervisor, who would you it be? Your CEO, CTO, CIO? On a live session, March 13 at 2:00pm EST, accomplished veteran CISO, Todd Fitzgerald, will help you understand how your role as an InfoSec practitioner is viewed within your organization based on who you report to.

    By the way, your horoscope for today is to register for this intriguing conversation.
  • Norman Marks: What's Right and What's Wrong with SOX?
    Norman Marks: What's Right and What's Wrong with SOX?
    Norman Marks, CPA, CRMA, Author, Evangelist and Mentor Recorded: Feb 26 2019 63 mins
    Have you noticed that the cost and scope of the SOX compliance program keeps multiplying? What’s up with that?

    Our leading GRC authority, Norman Marks, will explore the causes of this emerging trend and more during a live talk on Tuesday, February 6, 2019 at 2:00pm EST. Marks’ risk-based, top-down approach to SOX compliance just might surprise you enough to take action.

    No matter how you put your sox on, you’ll want to put this SOX seminar on your calendar

Embed in website or blog