Hi [[ session.user.profile.firstName ]]

Modulo

  • Date
  • Rating
  • Views
  • The CISO as a Transformational Role in Risk Management The CISO as a Transformational Role in Risk Management Michael Rasmussen- GRC 20/20 Recorded: Oct 6 2016 50 mins
    Mike Rasmussen of GRC 20/20 explores the ever changing role of the CISO in a modern organization.

    This presentation offers a prescription for managing information security risk as it permeates business operations, processes, transactions, and relationships in the digital world.
  • Top Lessons Learned from the Vendor Risk Management Wars Top Lessons Learned from the Vendor Risk Management Wars Carlos Krause, Modulo & Rich Licato, Airlines Reporting Corporation Recorded: Dec 9 2015 64 mins
    Unless you have been hiding under a rock for over a year, you and your peers have realized that Third-Party Risk is a major component of overall risk management and security programs. In this webinar you will hear the top lessons learned from Modulo’s years of implementing IT vendor risk programs, as well as helpful examples from Rich Licato and Airlines Reporting Corporation (ARC). By sharing these experiences you can discover how to implement a world-class vendor management program and gain insights from professionals that have actually been there and done it!
  • Modulo Risk Manager: What's New v9.2 Modulo Risk Manager: What's New v9.2 Modulo, LLC Recorded: Jun 1 2015 14 mins
    Demo video of Modulo Risk Manager Version 9.2, featuring enhanced functionality for the following Modulo Risk Manager’s modules:

    - Module editor
    - HTTP calls in workflow rules
    - Attributes as required fields
    - Out-of-the-box risk and event BI reports
  • Dealing with Today’s Data Minefield Dealing with Today’s Data Minefield Modulo, LLC Recorded: May 19 2015 18 mins
    At a time where most organizations are embracing digitalization, the associated risks and cyber threats have accordingly increased as new forms of data are created. This makes Governance, Risk & Compliance (GRC) a necessity for organizations who deal with sensitive information such as customer data.

    EnterpriseManagement360º asks Modulo’s Stephen Gant how security officers can better navigate these complex issues.
  • SecurityCurrent Analyst Interviews Healthcare Risk Management Professional SecurityCurrent Analyst Interviews Healthcare Risk Management Professional Modulo, LLC Recorded: May 19 2015 13 mins
    Information Security Risk Management has never been more pressing in light of increasing cyber attacks across all industries, in particular healthcare. Medical-related identity theft accounted for 43 percent of all identify thefts reported in the United States in 2013, according to the Identity Theft Resource Center.

    In light of the alarming trend of increasing risk surrounding data loss, patient and employee information protection, and potential fines, Yale New Haven Health System takes cyber security seriously. Steve Bartolotta, head of Yale New Haven Health System’s risk management expert, talks about the challenges of building good processes for enterprise-wide information security. He and securitycurrent’s Vic Wheatman discuss common problems facing organizations today and some possible measurable actions to take. In this podcast with Vic Wheatman, Bartolotta describes the tools he uses to support YNHHS’s risk management system and what he has gained.
  • IT Governance, Risk, and Compliance IT Governance, Risk, and Compliance Modulo, LLC Recorded: May 19 2015 5 mins
    A 5 minute guide on how to get the most value out of automating IT GRC.
  • GRC Process Automation GRC Process Automation Carlos Krause, CISSP, Head of Professional Services - Modulo Recorded: Apr 2 2015 58 mins
    Many organizations still use spreadsheets and emails for business critical processes related to Governance, Risk, and Compliance (GRC) management. These more “manual” processes become burdensome as infrastructure scales out or new compliance and policy requirements emerge. Without a traceable and efficient way to perform, track, and report GRC assessment results, organizations face the possibility of failing audits, costly fines, and reputation damage.

    Modulo’s solutions for GRC help automate processes, which improve the efficiency and traceability of GRC activities. Modulo’s Risk Manager™ software automates GRC tasks based on both proven processes aligned with international standards and on your own established methodologies.

    In this session, learn how to:
    • Align processes to the “plan, do, check, act” methodology
    • Replicate and improve internal processes using an easily configurable workflow tools
    • Build and send user-friendly, traceable surveys
    • View assessment results in detailed and high-level dashboards and reports
    • Leverage audit log to monitor the history of assessment participation and issue remediation
  • GRC inside-out: Preparing for & deploying GRC automation GRC inside-out: Preparing for & deploying GRC automation Carlos Krause, Modulo & Tony UcedaVelez, VerSprite Recorded: Feb 26 2015 67 mins
    Good security risk management begins with a repeatable process within security governance, risk management, and compliance (GRC). GRC and many security risk management processes fail when organizations rely too much on point-solution technologies rather than repeatable processes.

    Do you have an optimal security risk management program? Two experts discuss security risk management best practices and “quick-win” GRC automation opportunities. In this live webinar, learn how to:

    Create governance for security risk management
    Identify gaps in foundational processes
    Build a GRC automation deployment timeline
  • Modulo Risk Manager: What's New v9.1 Modulo Risk Manager: What's New v9.1 John Ambra, Chief Product Officer, Modulo Recorded: Jan 21 2015 15 mins
    Demo video of Modulo Risk Manager Version 9.1, featuring enhanced functionality for the following Modulo Risk Manager’s modules: GRC Intelligence; Policy; Organization, Risk, Compliance, Workflow; as well as improved system stability and performance, low-impact bug fixes and a new version of the installer, released initially for internal use, to help speed up the installation process.
  • Is Your Vulnerability Management Program Vulnerable? (Part 2) Is Your Vulnerability Management Program Vulnerable? (Part 2) Carlos Krause, Manager of Professional Services, CISSP, CISA, MCSO Recorded: Dec 18 2014 59 mins
    Is your vulnerability management program vulnerable? If you are unsure or answered “yes," sign up to join Carlos Krause, Modulo’s lead technical consultant for Part 2 of this two-part webinar series.

    In Part 1, Carlos identified key challenges and pitfalls most vulnerability management programs face. In Part 2, he will outline best practices and action items to improve your vulnerability management process, including how to:

    *Integrate your vulnerability management program with the risk and compliance actions in the organization
    *Harmonize vulnerability metrics with other programs and assessments
    *Represent risks in a business language
    *Plan and deploy a successful implementation

    Carlos Krause presented this topic at ISACA ISRM 2014 at a record-setting Megatrend Session. Due to its popularity, we wanted to bring it to you in a webinar series. Don’t miss out!