Hi [[ session.user.profile.firstName ]]

Governance, Risk, and Compliance

  • Date
  • Rating
  • Views
  • [Earn 1 CPE] Post-GDPR: Key Steps to GRC Integration
    [Earn 1 CPE] Post-GDPR: Key Steps to GRC Integration Moderator: Colin Whitaker. Panel: Sooji Seo, RSA; Quin Rodriguez, Riskonnect; Gabriel Gumbs, STEALTHbits; Tim Hill, Centrify Recorded: Jul 26 2018 76 mins
    Data protection laws such as the General Data Protection Regulation (GDPR) are complex, and can impact a broad range of business roles, including legal, audit, HR and finance, not just IT. In achieving GDPR compliance, organizations should focus on getting these roles to work together in ongoing efforts to ensure governance, risk and compliance (GRC) across an organization, and not be distracted by the noise in the marketplace. Through the process of integrating GRC practices real value can be achieved, as long as all stakeholders work with one another and take practical, measured steps toward integration. Join our panel of experts on this CPE accredited webinar to learn how your organization can achieve this.

    Learning Objectives

    - Find out how to align risk management with enterprise performance management under the GDPR.
    - Learn how to work with stakeholders to effectively integrate compliance activities, and gain transparency, efficiency and agility for process operations.
    - Discover how to identify and manage the digital risks that matter, and which risk functions need to transform.
  • [Earn 1 CPE] Practical Steps to Scale Your Vendor Risk Management Program
    [Earn 1 CPE] Practical Steps to Scale Your Vendor Risk Management Program Rebecca Herold. Panel: Jake Olcott, BitSight; Todd Boehler, ProcessUnity; Matt Kunkel, LogicGate; Scott Schneider, CyberGRX. Recorded: Jun 26 2018 76 mins
    As organizations rely on third parties to grow and thrive, they’re exposed to major cybersecurity risks. Mitigating this risk means confronting the potential security vulnerabilities that are present in your third party network, but traditional vendor risk management (VRM) methods are no match for modern threats. According to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.

    Join our panel of experts on this CPE accredited webinar to learn how your organization can create a VRM program that’s ready and able to stand up to today's third party threat landscape.

    Learning objectives:

    • Find out how to gain executive leadership buy-in for your VRM program.
    • Learn how to perform quantifiable vendor security analyses.
    • Discover how to leverage Automation to Scale your VRM program.
  • Small Business/Big Risk: Cybersecurity for All!
    Small Business/Big Risk: Cybersecurity for All! Vince Crisler, CEO and Co-Founder, Dark3 Recorded: Jun 12 2018 41 mins
    Small businesses face great threats from cyber attackers every day, and do so with a fraction of the resources that mid-sized companies and large corporations have at their disposal. A small business’s network, its customer data, and its intellectual property is just as critical to its operation as a firm 100 times its size, but it lacks the skills, the processes and the technology to keep pace with ever-present cyber threats and defend itself. Join us for this session where Dark3 experts will outline how small businesses can protect themselves effectively by taking advantage of the confluence of cloud-based technologies, scalable automation and enterprise-grade cybersecurity expertise.
  • [Earn 1 CPE] Best Practices for GRC Implementation & Enterprise Security
    [Earn 1 CPE] Best Practices for GRC Implementation & Enterprise Security Colin Whitaker, Moderator. Nick Hayes, Forrester; Viktor Culjak, ACL; Cameron Jackson, Riskonnect; James Maude, Avecto. Recorded: Jun 5 2018 77 mins
    In today’s world, implementing an effective GRC program is critical for every organization striving to secure the enterprise in an era of increasingly frequent and complex cyber threats. However, getting budget approval, organization buy-in and executing on a successful implementation can be daunting tasks to take on.

    Join our panel of experts on this CPE accredited webinar to discover some of the best practices for GRC Implementation and Enterprise Security in 2018.

    Qualifying participants will earn 1 CPE credit.

    Learning Objectives

    •Find out how to influence the correct stakeholders to successfully implement GRC at your organization.
    •Learn basic security fundamentals to reduce the attack surface and secure the lines of defense.
    •Discover strategies to mitigate threats and manage Reputational Risk.
  • Nemertes Conversations: Is Your Data Ready for GDPR?
    Nemertes Conversations: Is Your Data Ready for GDPR? Co-presented by: Julie McCoy, Solutions Engineer, AvePoint; and Irwin Lazar, VP & Service Director, Nemertes Research Recorded: May 24 2018 53 mins
    GDPR requires organizations to identify, classify, and protect personal information, but how do you prepare and protect against a possible breach if you don't know what data you have, where it lives, or how it's classified?

    In this informative webinar we'll discuss:
    • GDPR data classification requirements
    • How to incorporate GDPR data analysis into your breech prevention and reaction plan
    • How to classify and protect information across multiple data stores
    • Solutions for automating classification and information protection

    We look forward to sharing this information with you!
  • GDPR: Cutting Through the Noise
    GDPR: Cutting Through the Noise Alex Jordan, Senior Analyst, ISF LTD Recorded: May 24 2018 47 mins
    Data protection has always been important, but with the GDPR deadline looming and data sharing scandals shaking consumer confidence, securing personal data has never been more vital. The GDPR is leading businesses across the world to evaluate, and in many cases modify their data processing activities in line with upcoming law.

    So what if you’ve left it too late? What are the key steps you can take to work towards GDPR compliance, even after deadline day?

    Join us in this webinar with Alex Jordan, Senior Analyst at the Information Security Forum as he shares:

    -The ISF’s phased approach to GDPR implementation
    -Ways to determine the criticality of data and how to protect it appropriately
    -The urgent actions that a business can take to get GDPR compliance started
    -Common myths surrounding the GDPR, and guidance on cutting through the noise.
  • GDPR is Here! Now What?
    GDPR is Here! Now What? Theresa Abbamondi (Arbor Cloud & Services, NETSCOUT) & Azar Khansari Silver (NETSCOUT) Recorded: May 23 2018 22 mins
    The General Data Protection Regulation (GDPR) goes into effect on May 25, 2018. While GDPR is a regulation enacted by the European Union, if your company has global operations or reaches a worldwide audience, your company is also likely subject to GDPR. This session will help you build your GDPR preparation checklist based on the key elements of a GDPR compliance program for companies based outside the EU, explain GDPR provisions most relevant to the use of security solutions, and discuss questions you should be asking your security team and service providers to understand the features available within your solutions to help you comply with GDPR.

    Speakers:
    - Theresa Abbamondi, Director, Product Management, Arbor Cloud & Services, NETSCOUT
    - Azar Khansari Silver, Associate General Counsel, NETSCOUT
  • [Panel] GDPR & Cyber Security
    [Panel] GDPR & Cyber Security Julian Saunders (PORT.im) | Bob Honour (SonicWALL) | Raef Meeuwisse (ISACA) Recorded: May 23 2018 60 mins
    The General Data Protection Regulation (GDPR) is a key legislation going into effect in May that it will affect all organizations that handle, store or pass through data of EU citizens.

    Join this panel of Governance, Risk, Compliance and Security experts for an interactive Q&A as they discuss the importance of being GDPR-compliant:
    - What GDPR means for cyber security
    - GDPR requirements around data collection and governance, exposure and breach disclosure
    - Evaluating your cyber risk
    - Recommendations for achieving compliance post-deadline day
    - Other regulation on the horizon

    Speakers:
    - Julian Saunders, CEO, PORT.im
    - Bob Honour, EMEA Marketing Director, SonicWALL
    - Raef Meeuwisse, CISM, CISA, ISACA Governance Expert & Author “Cybersecurity for Beginners”
  • The Future of GDPR: Compliance beyond Deadline Day
    The Future of GDPR: Compliance beyond Deadline Day Brian Rutledge (Spanning) | Kalani Enos (FARO Technologies) | Heather Stratford (Stronger.tech) Recorded: May 22 2018 60 mins
    May 25th 2018 is the deadline day for achieving General Data Protection Regulation (GDPR) compliance. It is also only the beginning of GDPR.

    Discover what GDPR means for your organization, how it affects US businesses and why it's important to be GDPR compliant.

    Join this interactive Q&A panel discussion with industry experts to learn more about:
    - The intersection of GDPR, privacy and cybersecurity
    - How GDPR affects data governance, breach disclosures and overall data protection
    - Recommendations for improving your organization's cyber resilience

    Speakers:
    - Brian Rutledge, Principal Security Engineer at Spanning
    - Kalani Enos, IT Security Manager, FARO Technologies
    - Heather Stratford, CEO of Stronger.tech
  • De-Mystifying Consent Under the GDPR
    De-Mystifying Consent Under the GDPR Kristy Gouldsmith, Sr. Data Protection GDPR Consultant & Managing Director of Sapphire Consulting Group Recorded: May 22 2018 51 mins
    The General Data Protection Regulation (GDPR) comes into force on May 25th, 2018. The GDPR changes the way that consent is sought and managed and it sets a high standard for consent. Consent means offering people genuine choice and control over how you use their data. When consent is used properly, it helps you build trust and enhance your reputation.

    The changes from the GDPR reflect a more dynamic idea of consent: consent as an organic, ongoing and actively managed choice, and not simply a one-off compliance box to tick and file away. This webinar will help you to decide when to rely on consent for processing and when to look at alternatives. It explains what counts as valid consent, and how to obtain and manage consent in a way that complies with the GDPR.

    About the Speaker:
    Kristy Gouldsmith, CIPP/E, LLB, LLM, PGCE, BA, is a senior data protection GDPR consultant and the managing director of Sapphire Consulting Group, a leading UK data protection consultancy. Sapphire Consulting Group provide GDPR services such as audits, policies, data sharing agreements and training. Kristy is also the Data Protection Officer for a number of organisations including a multi-national software-as- a-service company, a large London-based serviced-office company and several firms of solicitors.

Embed in website or blog