Managing Enterprise Risk in the New Environment

Moderator: Brandon Dunlap (Brightfly) Panelists: Chris McClean (Forrester); Tom Bolger (Methodware); Puneet Mehta (SDGC)
For many years complying with government standards and industry regulations has been seen as a check box in the lengthy list of IT security tasks. However, most recent changes in the environment and increased cyber security threats have led to a rethinking of this approach. With more than 365 security incidents reported in 2011 affecting over 126 million records, many organizations are rethinking the way they approach security, risk management, and compliance.

Technologies like virtualization, cloud computing, and social networking present companies with major opportunities to develop their businesses. However, it is important to keep one eye firmly fixed on the associated risks and businesses should be prepared for these incidents before they occur. More and more organizations realize that instead of looking at Governance, Risk, and Compliance from a centralized perspective, it is more efficient to let business operations drive these efforts as that 's where the organization's risk knowledge resides. Join this session for insights on:

* The challenges faced by senior executives in managing risk in the changing landscape.
* Successful approaches to tackle risk and its associated controls by business unit.
* Key steps to identify and address emerging risk.
* How to classify and manage unknown risk.
* Pitfalls to avoid when trying to automate risk management efforts.
* Getting the attention of executives to make sure that enough attention is being paid to the risk.
* How Compliance is tied to Risk Management in the context of business.
Oct 3 2012
62 mins
Managing Enterprise Risk in the New Environment
Risk Management IT Risk ERM
Join us for this summit:

Webinars and videos

  • Live and recorded (1540)
  • Upcoming (34)
  • Date
  • Rating
  • Views
  • *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether its PCI DSS, SOX, HIPPA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data.

    Join Dave Shackleford, IT security consultant and founder of Voodoo Security, as he breaks down these updated requirements and how to remain current while securing your business.

    Attend this webcast and learn:
    - Best practices for protecting data in today’s complex security landscape

    - Latest updates to compliance mandates pertaining to data encryption

    - What these updates mean to your security teams.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • David Moule, Manager of IT Security Operations at Allied Irish Bank, discusses how AIB has leveraged Modulo Risk Manager™ to mature their Vulnerability Management process, remedy “on the fly” VM needs, and successfully navigate an internal audit.
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. Steve Smith, Senior Technical Manager at McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • 10 minute "whiteboard" style video that explains what Quorum does and the unique value for mid-market organizations
  • Channel
  • Channel profile
Up Down
  • A New IT Approach to GRC for Business Innovation Jun 11 2014 6:00 pm UTC 60 mins
    The burden of the existing day-to-day IT workload has never been greater and continues to grow. The recent financial scandals and high profile data breaches have raised scrutiny to unprecedented levels. This scrutiny, together with new legislative changes, has resulted in an array of new compliance measures and related challenges, which have led to a melting pot of complexity that has seen organizations increase spend simply to 'keep the IT maintenance lights on'.

    Due to consumer demand, leaders are having to look hard at their IT strategy and ways to reduce expenditure so they can invest in innovation to future-proof the business. Many banks are considering whether a complete IT infrastructure overhaul would prove more beneficial as spending on basic maintenance and compliance does little to move the business forward, yet it consumes the vast majority of IT budget. Not complying is not an option, and reducing IT spend on compliance is difficult as associated projects have become high priority 'must haves' and budget 'must spends'. If organizations fail to adapt their approach it will remain impossible for IT departments to service the needs of the compliance office and still satisfy the business innovation agenda.

    Attend this webinar to learn more about:

    - Driving efficiencies to reduce the cost of compliance
    - Using compliance to enabling teams to focus their efforts more effectively
    - Automating business process to get ahead of compliance
    - Raising your organization's overall data privacy, compliance, and security profile
  • Disaster Recovery in the Cloud: Developing a Metric-Driven BCM Program May 29 2014 6:00 pm UTC 60 mins
    The state of business continuity and disaster recovery planning is dismal in most organizations and nonexistent in many. Most plans in place simply don’t work. This is not surprising since disaster recovery hasn't been a priority among CIOs, until now, as cloud for disaster recovery is now a viable and more cost-effective option for organizations.

    One of the key activities of business continuity (BC) management is measuring the performance of the program. Good governance presumes analysis of ongoing business processes to ensure they are fulfilling company objectives. In most business continuity management activities, a management review and assessment process should be performed, and the use of metrics for measuring BC performance will provide tangible and auditable evidence that your program is performing up to expectations.

    Join us as we show you how to develop a metric-driven business continuity program that can be implemented in the cloud, and learn how to present your plan from a business perspective that your managers will understand and support.
  • Rethinking Email Security: Best Practices to Protect Private Communications May 6 2014 4:00 pm UTC 60 mins
    *On this webcast we're giving away a pass to our partner event: Governance, Risk and Compliance for Financial Services on June 24-26*

    2014 has been called "The Year of Encryption." The recent data breaches, personal identity theft cases, email snooping concerns, and a serious, far-reaching software vulnerability (i.e., Heartbleed) have put a spotlight on the importance of protecting sensitive data, both inside and outside the enterprise. Email is invaluable to enterprises. It's the easiest mode of communication which also makes it an easy target for data theft.

    As email users communicate sensitive data, often in the form of credit card numbers, social security numbers, phone numbers, personal financial data, and personal health information, it is sent and resent to multiple users and locations. Sometimes this data is secure, but all too often, it is not. This impacts companies of all sizes where email security vulnerabilities are both internal and external to the enterprise.
    The need to protect private information being communicated by email between customers, prospects, patients, loan applicants, and clients is now the norm. Unfortunately, many enterprise email solutions are several years old and using outdated and ineffective security technology.

    This session will explore the key concepts and best practices to protect and maintain private email communications and why you need to rethink your email security. Hear from two email security experts and learn:

    - Best practices for securing sensitive email communications.
    - When is the right time to replace your legacy email security.
    - How to protect sensitive email information as it flows to and from the enterprise.
    - Latest insights on Identity-Based Encryption and Stateless Key Management.
    - How other enterprises deploy the world’s most popular email security solution.
    - How end-to-end Identity-Based Encryption (IBE) helps protect email in the event of a vulnerability being exploited.
  • How Codenomicon Discovered Heartbleed Solutions For Protecting Your Organization Apr 24 2014 4:00 pm UTC 60 mins
    Presented by the experts with the facts.

    The Inside Story of the Discovery, the Timeline and Solutions to Protect Your Organization. Finally, All of Your Questions Answered.

    Join the conversation and get the latest Heartbleed updates by following @CodenomiconLTD
  • The New Data De-identification: Enabling Business Agility while Protecting Data Recorded: Apr 23 2014 63 mins
    *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • Lessons Learned From the Target Data Breach Recorded: Mar 18 2014 60 mins
    *On this webcast we're giving away a non-transferable guest pass to the IQPC 2nd Annual Cyber Security for Oil and Gas Summit, being held in Houston, Texas between June 16 - 18, 2014.

    In December 2013, US retailer Target suffered a high profile data breach at the hands of a cybercriminal group, who infected its point-of-sale (PoS) terminals with malware to steal the details of around 110 million customers. Marcus Group's systems were also compromised recently and crooks made off with customer card details, while several other merchants are reported to be preparing to go public with their own breaches.

    Data breaches are nothing new and have been around for quite some time; however, we are seeing a significant increase in incidents and 2013 was the worst year in terms of data breaches recorded to date. According to the Online Trust Alliance over 740 million records were exposed in 2013, and they determined that 89% of all breach incidents were avoidable had basic security controls and best practices been enforced. Join us as we discuss some key lessons learned from the recent breaches and:

    - Discuss how malware aimed at retailers is evolving on a daily basis
    - Analyze the tools and methodology employed hackers to bypass security
    - Address steps retailers and banking institutions should take to secure their networks
    - Provide procedural and technical steps for securing third party code
    - Discuss how to develop an effective Data Incident (DIP) Plan, including a communication strategy
  • Third-Party Compliance: Managing Website Data to Reduce Corporate Risk Recorded: Feb 5 2014 62 mins
    * On this webcast you can win a pass to the GRC Summit in Boston!

    Providing services and features to website visitors often requires deploying many third party service providers for analytics, marketing, payment processing, and data management. Managing risk from these third parties is vitally important in a landscape filled with new threats and regulations. The nature of these relationships requires that information be shared, and risk accrues whenever sensitive information is shared with or processed by third parties.

    During this webcast our panel will specifically address the practical 'how to's' around managing website data to reduce corporate risk, and we'll look at some cost effective third party due diligence solutions.
  • PCI DSS 3.0 - What the Changes Mean for Your Organization Recorded: Jan 21 2014 76 mins
    The official release of PCI DSS v3.0 is here, now what?

    Voltage Security have invited a PCI DSS QSA to assist you with your PCI challenges by providing recommendations on how to execute a seamless upgrade from PCI DSS version 2.0 to 3.0. Find out why it's no longer acceptable to strive for compliance over real-time security. And learn how the new standard brings a whole new meaning to 'business as usual'.

    Learn about these important changes and how they affect your business:

    - PCI DSS 3.0 – Business as Usual
    - PCI DSS 3.0 – Template Changes
    - PCI DSS 3.0 – Scope
    - PCI DSS 3.0 – Phase-in Requirements
    - PCI DSS 3.0 – New Reporting Template

    Find out why the new standard can help you make PCI DSS part of your business-as-usual activities by introducing more flexibility, and an increased focus on education, awareness and security as a shared responsibility.
  • How to Achieve Compliance and Secure the Public and Private Cloud Recorded: Dec 5 2013 63 mins
    New initiatives such as cloud computing are imposing significant security risks on the corporation, network, IT and the day to day activities of the business. How do businesses maintain compliance, control and ownership of sensitive data as they move from the physical environment to a cloud world? The distribution of data onto devices may not be completely controlled by the data owner, and there is liability confusion as cloud service providers take on a larger role. As a result CIOs are looking at technologies and strategies to assure security while delivering the required services.

    Fortunately, this model of enterprise computing doesn't have to be the high-risk proposition some IT professionals fear. By rethinking of security as an enabler instead of an obstacle for cloud adoption, you can easily protect data, mitigate the risks and achieve compliance across public and private cloud environments while maximizing the business potential of the cloud. During this webcast we will discuss ways to achieve compliance across cloud environments, and address considerations that will help you assure data protection, and empower workers to new levels of productivity while maintaining information governance and managing risk.
  • Panel Discussion: Navigating PCI Security Mountains in the Cloud Recorded: Nov 6 2013 55 mins
    Organizations outsourcing card data to the cloud face significant security risks. Storing, processing and transmitting cardholder data in the cloud brings the cloud environment into scope for the PCI Data Security Standard (PCI DSS). And as soon as an organization adds other players to the offsite card-management mix, ensuring compliance with the PCI DSS becomes increasingly challenging.

    In this new environment cloud users and cloud service providers need to clearly understand what their roles and responsibilities are when it comes to protecting this data. Organizations need to know where their data is at all times yet they have limited or no control over cardholder data storage. These are all things that you have to take into consideration when you're thinking about outsourcing to a cloud provider. In this webcast our panel will address ways to navigate the main PCI security challenges in the cloud, and attendees will gain insights on:

    - Emerging PCI security risks in the cloud
    - Processes for assessing risk when card data could potentially be stored in multiple locations
    - Recommendations for achieving PCI compliance across virtual environments
    - How to use a data-centric approach to maintain PCI scope management
  • Implementing a Business-Driven Security Strategy Recorded: Oct 17 2013 66 mins
    **At the end of the session we're giving away a $2,950 guest pass to the Cyber Security & Digital Forensics Exchange (http://www.cyber-securityexchange.com). The pass is for the entire 3 day event, and includes meals and two night hotel accommodation. The winner will be chosen at random. To be entered into the draw you must attend this live webcast.**

    Today’s corporate leaders face multiple challenges, including the need to innovate in extremely competitive business climates, address highly dynamic regulatory and compliance challenges, and secure the enterprise against a wide barrage of new and evolving sophisticated threats. Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. Organizations often take a bottoms-up approach to security and continually build on top of their existing security investments. This technology-centric approach often creates an excessively complex and disjointed security infrastructure that is difficult to manage and prone to operational inefficiencies which can escalate IT costs.

    The need to be able to integrate security with business functions and operations exists more than ever. A Business-Driven approach can achieve end-to-end security that supports business goals such as driving innovation and reducing organizational costs, as well as operational requirements to address compliance measures, protect against internal and external threats, and prioritize the security risk management activities that make the most sense for their organization. In this webcast presentation we will address how to implement a solid Business-Driven security strategy within your organization.
  • Big Data Security in an Era of Social, Mobile and Cloud Computing Recorded: Sep 24 2013 66 mins
    **At the end of the session we're giving away a $2,950 guest pass of to the Cyber Security & Digital Forensics Exchange (http://www.cyber-securityexchange.com). The pass is for the entire 3 day event, and includes meals and two night hotel accommodation. The winner will be chosen at random. To be entered into the draw you must attend this live webcast.**

    Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. Today’s expanded IT infrastructure, including Social, Mobile and Cloud Computing, is collecting more data, including sensitive data, and now significant security risks are being compounded as the data is being concentrated in large data “lakes” such as Hadoop. As a result CIOs are looking at upgrades, new technologies and new strategies to assure security while delivering the required services.

    Fortunately, this model of enterprise computing doesn’t have to be the high-risk proposition some IT professionals fear. By rethinking security to meet expanded requirements, you can mitigate the risks that may arise and take full advantage of Big Data benefits. During this webcast we will discuss ways to create a strong strategy to protect sensitive corporate and customer data in Hadoop, and help you assure security in the cloud and empower workers to new levels of productivity while maintaining information governance and managing risk.
  • Managing Security and Compliance in a Big Data World Recorded: Aug 14 2013 59 mins
    **At the end of the session we're giving away a $2,950 guest pass of to the Cyber Security & Digital Forensics Exchange (http://www.cyber-securityexchange.com). The pass is for the entire 3 day event, and includes meals and two night hotel accommodation. The winner will be chosen at random. To be entered into the draw you must attend this live webcast.**

    Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.

    Fortunately, this model of enterprise computing doesn't have to be the high-risk proposition some IT professionals fear. Enterprises willing to create automated processes to identify and value business data can take control of information governance before the big-data onslaught swamps them. As a result, they can meet key corporate objectives, such as lowering costs, lowering risk and making better business decisions. By rethinking security to meet expanded requirements, you can ensure compliance in the big data world.
  • Navigating PCI Security Mountains in the Cloud Recorded: May 15 2013 64 mins
    Organizations outsourcing card data to the cloud face significant security risks. As soon as an organization adds other players to the offsite card-management mix, ensuring compliance with the PCI Data Security Standard becomes increasingly challenging. Cloud users and cloud service providers need to understand what their roles and responsibilities are when it comes to protecting this data. Storing, processing and transmitting cardholder data in the cloud brings the cloud environment into scope for PCI-DSS.

    Organizations need to know where their data is at all times. A lot of cloud clients have limited or no control over cardholder data storage. Organizations should be concerned about collecting and correlating access logs and other information from cloud vendors to ensure they are maintaining security compliance. Where's the data being stored? Is it stored in multiple locations? These are all things that you have to take into consideration when you're thinking about outsourcing to a cloud provider. Join this webcast as we address the compliance challanges in the cloud, and gain new insights on:

    - Emerging PCI security risks in the cloud
    - Understand the role of cloud entities
    - Processes for assessing risk when card data could potentially be stored in multiple locations
    - Structuring planning controls to deal with PCI DSS changes
    - Recommendations for achieving PCI compliance across virtual environments
  • Enterprise Risk Management: a Holistic Approach Recorded: Apr 4 2013 61 mins
    ON THIS SESSION WE'RE HOLDING A PRIZE DRAW AND TWO LUCKY ATTENDEES WILL WIN A GUEST PASS TO THE BOSTON GRC SUMMIT IN APRIL.

    Organizations are suffering from volatility across all risk types, and need to re-think their enterprise risk strategy. In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders in all sectors, and gaining a complete view of an organization's risk exposure is increasing in complexity.

    A well defined risk management program cannot achieve high maturity scores without integrating risk management systems across divided organisational units. Organizations must thoroughly understand the true value at risk and ensure their compliance mandates are not geographically siloed. At the heart of this strategy is the need for a single consistent view of the data. It is a necessity for organizations to build a new generation of integrated risk solutions and applications that exploit this single view of the truth discretely and holistically, driving towards maximum synergy within the enterprise.

    Join our panel as they discuss a new generation of risk technologies which use a holistic approach to data management and achieve functional competence. We will explain the most effective way to manage risk across the enterprise, how to get the attention of executives to make sure that enough attention is being paid to the risk, and how to achieve enormous economies of scale while simultaneously meeting the demanding landscape of regulatory change.
  • Using Auto-Classification to Improve Your Information Governance Practices Recorded: Apr 2 2013 63 mins
    Information Governance is an essential element to your compliance planning and execution. With evolving regulatory demands and increased litigation, the imperative to gain control over business content has never been more critical. Experts know that managing the retention and disposition of business information reduces litigation risk and legal discovery costs. But with the best of plans, there are challenges to face and decisions to make. Add in the maturation of technology and security issues, and the challenges seem to grow exponentially.

    Governance is still lacking in many organizations as around 85% of users still manually identify records, but are not clear which content is valuable and not valuable, and as a result, there is considerable fear towards the regulatory impact of deleting information. New auto-classification technologies can take the burden off the end user by eliminating the need for them to manually identify records, by providing automatic identification, classification, retrieval, archival, and disposal capabilities for electronic business records according to governance policies. During this webinar we will discuss how to improve your governance practices with auto-classification technologies. Join us for tips and insights on:

    - Understanding and Identifying the risks and costs of discoverable information
    - Quantifying the business benefits of Information Governance practices and Auto-Classification
    - How Auto-Classification works and can seamlessly fit into your organization
  • Seeing the Big Picture with Big Data Discovery Recorded: Mar 18 2013 62 mins
    Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. According to IDC, the amount of information created, captured or replicated has exceeded available storage for the first time since 2007, and many organization's are spending far more time looking for information than actually using it. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.

    A business classification and information governance process can help guide and tame Big Data, preventing it from costing more than necessary, yet ensuring it is at hand when and where it's needed, while freeing IT staff to drive more strategic technology initiatives. Enterprises willing to create automated processes to identify and value business data can take control of information governance before the big-data onslaught swamps them. As a result, they can meet key corporate objectives, such as lowering costs, lowering risk and making better business decisions.

    Attend this webinar for insights on:

    - The practical benefits of information governance
    - Developing a business classification initiative
    - Big Data analytics tools
    - Managing the Big Data lifecycle
  • How to Select the Right MDM and BYOD Security Solution for eGRC Recorded: Feb 21 2013 60 mins
    WE'RE HOLDING A PRIZE DRAW AT THE END OF THIS PRESENTATION AND THE WINNER WILL RECEIVE A $400 APPLE GIFT CARD.

    69 percent of organizations have employees using mobile devices to connect to their corporate network. This brings not only security concerns, but practical problems with managing a variety of devices that can contain both personal and corporate data. As a result, mobile device management (MDM) and bring your own device (BYOD) solutions for the enterprise are exploding into the market. Choosing the right solution will increase enterprise efficiency, while maintaining security security and regulatory compliance, without a massive burden on IT.

    However, selecting a solution has never been more difficult. The explosive growth of the market has created a glut of new and relatively unknown vendors, the industry is far from mature with costs are all over the board. According to Forrester Research, there are over 40 vendors in the market, offering software with core features such as configuration management, troubleshooting and support, inventory, remote control and reporting capabilities. There are many methods of delivery, such as premise-based, hosted, SaaS, managed services, on demand, cloud computing and outsourced. With each term used in different ways, it can often be confusing and hard to compare, and every organization will have different reasons for selecting a particular method of delivery.

    It is important to choose a vendor that will continue to innovate as the marketplace evolves and conscientious businesses take a proactive approach and seek to mitigate the emergent tactical needs with solutions that will serve in the longer term. Join our panel as they discuss ways to select the right MDM and BYOD solutions for your organization.
  • Managing Enterprise Risk in the New Environment Recorded: Oct 3 2012 62 mins
    For many years complying with government standards and industry regulations has been seen as a check box in the lengthy list of IT security tasks. However, most recent changes in the environment and increased cyber security threats have led to a rethinking of this approach. With more than 365 security incidents reported in 2011 affecting over 126 million records, many organizations are rethinking the way they approach security, risk management, and compliance.

    Technologies like virtualization, cloud computing, and social networking present companies with major opportunities to develop their businesses. However, it is important to keep one eye firmly fixed on the associated risks and businesses should be prepared for these incidents before they occur. More and more organizations realize that instead of looking at Governance, Risk, and Compliance from a centralized perspective, it is more efficient to let business operations drive these efforts as that 's where the organization's risk knowledge resides. Join this session for insights on:

    * The challenges faced by senior executives in managing risk in the changing landscape.
    * Successful approaches to tackle risk and its associated controls by business unit.
    * Key steps to identify and address emerging risk.
    * How to classify and manage unknown risk.
    * Pitfalls to avoid when trying to automate risk management efforts.
    * Getting the attention of executives to make sure that enough attention is being paid to the risk.
    * How Compliance is tied to Risk Management in the context of business.
  • Enabling Your Mobile Security Strategy for eGRC Recorded: Jun 20 2012 63 mins
    The rapid evolution of consumer devices and a growing demand from employees are changing the ways in which organizations deliver mobility solutions to the workforce. There are any number of new mobile devices and emerging technologies to help today's professionals do their jobs in any location, and these technologies bring a range of new challenges, from security, compliance and risk management, to cost and human capital management.

    Organizations need to address these challenges by defining policies that regulate the usage of consumer and personal mobility for employees, and they need the appropriate tools to enforce policies, regulate behaviors and manage risks, across multiple device platforms. In addition, they need to choose the appropriate management approach and the products and services that can help to enforce those policies in a cost-effective way.
    Join this expert panel for insights on:

    * Understanding your mobile device management requirements;
    * Identifying the risks and benefits of introducing support for corporate applications on personal devices;
    * Defining policies that regulate the usage of mobile devices for employees and address BYOD;
    * Tools to effectuate policies, regulate behaviors and manage risks across multiple device platforms;
    * Strategies for containerization and layered security to protect devices, data and networks;
    * Selecting the right options that can help to enforce and monitor policies in a cost-effective way.
Empowering the GRC Community
The IT GRC Forum produces online events and provides professional networking facilities and market intelligence to Governance, Risk Management and Compliance professionals.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Managing Enterprise Risk in the New Environment
  • Live at: Oct 3 2012 3:00 pm
  • Presented by: Moderator: Brandon Dunlap (Brightfly) Panelists: Chris McClean (Forrester); Tom Bolger (Methodware); Puneet Mehta (SDGC)
  • From:
Your email has been sent.
or close
You must be logged in to email this