Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • To Host or Not to Host RSA Archer, That is the Question.
    To Host or Not to Host RSA Archer, That is the Question.
    Jennifer Pesci-Anderson, Peter Ridgley Recorded: Aug 7 2018 47 mins
    To host, or not to host your RSA Archer GRC program, that is the question. Whether 'tis more secure and efficient to host your GRC system or take arms to manage an on-premise environment. There are several options for managing your RSA Archer environment. Join Peter Ridgley, President of Verterim and Jennifer Pesci-Anderson, Vice President and National Practice lead to learn about opportunities for hosting within a single tenant environment providing options for PII, PHI, flexible upgrade schedules, elastic environments among other possibilities.
  • Vendor Management is Risky Business
    Vendor Management is Risky Business
    Jennifer Anderson, Jeff Avery, Ben Fagan Recorded: Apr 26 2018 50 mins
    Do you struggle with truly understanding your risk with your vendors? Are you relying solely on static, self-assessments to understand vendor risk? This can put your company at a greater level of exposure. Join Verterim's Jennifer Anderson and Jeff Avery with BitSight Technology's Ben Fagan BrightTalk for an informative discussion on the changes in vendor management programs and a demonstration of the BitSight and Archer Integration. Our plug and play BitSight - RSA Archer integration provides dynamic risk information to augment your existing vendor assessment process, pointing you to specific areas that may be at risk, reducing your time on vendor risk analysis and proactively alerting you to potential issues real time.
  • Do You Understand Your Risk with Your Vendors?
    Do You Understand Your Risk with Your Vendors?
    Jennifer Anderson, Jeff Avery, Ben Fagen Recorded: Dec 13 2017 56 mins
    You can source your processes, but you own the risk. How well are you managing your third parties and supply chain? Are you able to understand changes in your vendors' security status dynamically? We invite you to attend our webinar to see our RSA Archer and BitSight integration. Using these two systems, see how we bring qualitative and quantitative risk information together for a more comprehensive and holistic view of your vendors.
  • PCI Continuous Controls; Set It and Forget It
    PCI Continuous Controls; Set It and Forget It
    Jennifer Pesci-Anderson, Peter Ridgley, George Waller Recorded: Jun 20 2017 61 mins
    With mounting HIPAA regulations and PCI requirements, learn why securing your access credentials should be your number 1 priority this year and solutions that can take the guess work out of the authentication process.
  • Between a ROC and a Hard Place with PCI?
    Between a ROC and a Hard Place with PCI?
    Jennifer Pesci-Anderson, Jeff Avery Recorded: Jun 6 2017 53 mins
    Learn how to conquer and manage the PCI process. Businesses are challenged with attempting to continuously monitor their PCI environment, responding when something changes and managing all the information to gather evidence and generate the report on compliance (ROC) or attestation on compliance (AOC). Verterim is providing a 3 part, educational PCI series to address some of these business challenges and provide our tips on how you can take advantage of technology you may already have in house. The first 30 minute BrightTalk will look at the PCI process at a higher level and provide a view into a standard RSA Archer use case to help solve the problem. Join our GRC practitioners, Jennifer Pesci-Anderson, National Practice Lead and Jeff Avery, Engineer on May 11 from 12-12:30 to see how you can address your PCI business challenges.
  • Stroke of genius; The only known way to fully protect against keystroke loggers
    Stroke of genius; The only known way to fully protect against keystroke loggers
    Peter Ridgley, President, Verterim inc. CJ Brunet, President, Advanced Cyber Security Recorded: Mar 30 2017 60 mins
    Reduce the costs and risks associated with incident response through stronger prevention. According to the 2016 Verizon Data Breach Report, the majority of confirmed data breaches involved stolen passwords. Learn what your peers are doing to reduce the impact of stolen credential breaches and other sensitive data right at their fingertips.  Join Peter Ridgley President of Verterim and CJ Brunet, President of Advanced Cyber Security on March 30th at 11 a.m. est. for an overview on overcoming the business challenges and preventions for advanced cyberattacks. Learn how encryption at the keystroke level can help prevent these attacks and address PCI, Healthcare, Financial Services and other regulatory requirements at the same time.
  • Why GRC Programs Fail
    Why GRC Programs Fail
    Philip Aldrich (Dell / EMC) and Jennifer Anderson (Verterim) Recorded: Jan 31 2017 61 mins
    Learn the top 8 reasons why GRC programs fail - no matter the size of the program. We will share what you can do to: identify red flags to side-step failure, turn failures into successes, create the path to GRC success The session will incorporate the use of GRC tools as well as company / organizational tips.

Embed in website or blog