Hi [[ session.user.profile.firstName ]]

BAP Solution

  • Date
  • Rating
  • Views
  • GRC and IT Security Series: Addressing GDPR Security Provisions
    GRC and IT Security Series: Addressing GDPR Security Provisions
    Paul Schoeny, VP Cybersecurity, BAP Recorded: Nov 7 2018 26 mins
    Join the GRC & IT Webinar Series for byte-sized sessions aimed at making federal regulations understandable and actionable. The European Union’s General Data Protection Regulation (GDPR) has been active for several months. Organizations find themselves building or refining a repeatable and scalable infrastructure to manage GDPR security controls. Join us to learn:
    -GDPR’s impact on Security, Data Protection and Compliance Programs
    -Key importance of continuous monitoring to demonstrate ROPA and to reduce risk of fines
    -The steps for implementing and maintaining GDPR within your organization
    -How to align active threats with GDPR standards to know real-time if your organization is secure
    -Understand how continuous monitoring of GDPR control health can eradicate fines and failing GDPR assessment reports.
    -How to align the security objectives with NIST 800-53 security controls and map them to events, giving you complete accountable security.
  • GRC & IT Series: Using a NIST Based Approach to Align Cyber & Compliance
    GRC & IT Series: Using a NIST Based Approach to Align Cyber & Compliance
    Paul Schoeny, VP Cybersecurity, BAP Recorded: Oct 24 2018 27 mins
    Join the GRC & IT Webinar Series for byte-sized sessions aimed at making federal regulations understandable and actionable.The NIST Cybersecurity Framework is quickly becoming the flagship program for managing cybersecurity risk. However, complying with the security standards can be a complicated process. Join us to take the guesswork out of NIST and learn:

    -To understand the security management provisions found in the NIST Framework
    -How to view the controls set forth in the Framework
    -How to measure your security success
    -To understand your IT risk tolerance
    -What teams should be involved and have responsibility?
  • How to Integrate Technology in Policy Gap Analysis
    How to Integrate Technology in Policy Gap Analysis
    Scott Lawler, LP3 and Jeffrey Lush, BAP Recorded: Aug 28 2018 40 mins
    How do organizations comply with complex mandates? This task is often overwhelming, and the solution is often expensive and may require outside help to conduct a lengthy gap analysis. The output is a long list of urgent actions to accomplish again this year just like last year—not helpful.

    The solution must be simpler with automation. In this webinar we’ll discuss:
    - How to automate gap analysis for continuous monitoring
    - Enabling policy implementation visibility for the first time
    - How to reduce the noise quickly to build a reputable cyber strategy
    - Validating continuously enterprise and system security policy enforcement
  • Controls, Baselines and Regulations, Oh My! Building Your Security Strategy
    Controls, Baselines and Regulations, Oh My! Building Your Security Strategy
    Jeffrey Lush Recorded: Jun 14 2018 37 mins
    Organizations of all size are continuously tasked with building, updating, or revitalizing their cybersecurity strategies. Breaking news stories of organizations being hacked splash across major news outlets headlines on an increasingly frequent basis. The question is how can you gain the strongest security infrastructure all while reducing costs and man hours?

    Join renowned security expert Jeffrey Lush of BAP in the first webinar in our Jumpstart Cybersecurity webinar series. This webinar will give you practical information to build, analyze and protect your organization.

    In this webinar you will be introduced to:

    -Understanding what a security baseline is and why is it important
    -Learning the difference between continuous monitoring and accountable security
    -Gaining information on mapping events to security controls
    -Understanding your level of risk
    -Preparing yourself for federal regulations such as DFARS, GDPR, HIPAA and more.

Embed in website or blog