Yes we can! Research conducted by Protiviti recently found that not only are managers keen to improve the process and accountability of the grants management process, they also welcome suggestions for improvement. Against that background, Protiviti Managing Director Mark Harrison will take managers through how they can:
•Strengthen grants risk management
•Improve assurance reviews
•Strengthen capability, and
•Outline a whole of government solution
Don’t miss this complimentary seminar.
RecordedJul 26 201242 mins
Your place is confirmed, we'll send you email reminders
You are invited to register for our upcoming COSO webinar, COSO 2013: Mapping Controls to Principles. Transitioning to the New COSO Framework is top of mind for many organizations. How do you get started? How do you map controls to principles or vice versa? What are some of the preliminary findings organizations are seeing as they head down the path to implement the framework?
Please submit top-of-mind questions during the webinar registration process.
CPE credits will be provided to qualifying attendees.
Protiviti has conducted the second-annual Executive Perspectives on Top Risks Survey. We obtained the views of more than 370 board members and C-suite executives about risks that are likely to affect their organisation in 2014.
Join Managing Director, Mike Purvis and Director, Dirk Verwohlt for a discussion of the report findings.
Internal auditors play a vital role in their organisation’s strategies and daily activities. Your department’s audit plan should be a well-balanced examination that covers regulatory requirements and aligns key risk areas within the organisation.
Join Protiviti's Mark Harrison & Adam Christou, as they help internal audit professionals identify hot topics & emerging trends in 2014 to better execute the department’s strategic focus on risk throughout the year.
Neville Thomas, Head of Internal Audit Group at AMP, Chris Grant, & Ewen Ferguson, Protiviti
IT audit is a dynamic area with high personnel turnover, rapidly changing environments and shifting risk profiles. Protiviti's third-annual IT Audit Benchmarking Survey Report analyses the underlying IT audit trends facing our profession today.
Attend this webinar discussing key findings such as:
• Data security is of paramount concern
• Significant gaps in IT auditing
• Lack of IT audit risk assessments
• Strengthening IT governance practices
Protiviti's Tim Long, Scott Jones, John Atkinson, Steven Stachowicz, Nicole Weber
With nearly 40 percent of the Dodd-Frank Act yet to be implemented, numerous new consumer protection requirements taking effect this year, and the continued strong focus on anti-money laundering and sanctions compliance, regulatory compliance will remain a major challenge for the financial services industry in 2014.
Join Protiviti's Tim Long, Scott Jones, John Atkinson, Steven Stachowicz and Nicole Weber on Wednesday January 29, as they help compliance, risk and internal audit professionals identify some of the important regulatory issues and developments for 2014 that will need to be included in internal audit and compliance programs.
Topics will include:
• Consumer Financial Lending and Deposits Products
• Anti-Money Laundering and Sanctions
• Broker-Dealers and Investment Advisers
• The impact of the Current Environment on Compliance and Internal Audit organizations
CPE credits will be provided to qualifying attendees.
We look forward to having you join us. If you have any questions, contact Esther Veenhuizen at 212.708.6350 or firstname.lastname@example.org.
Brian Christensen, David Brand and Keith Keller, Protiviti
Internal auditors play a vital role in their organization’s strategies and daily activities. Your department’s audit plan should be a well-balanced examination that covers regulatory requirements and aligns key risk areas within the organization. However, in today’s fast changing environment, plans change and the needs of the organization may evolve rapidly. Has your support of the organization kept pace with those changes? Should you make changes to your audit plan to ensure coverage of new risks? Also, do you know what new elements should be included in your 2014 plan?
The objective of this presentation is to help internal audit professionals identify emerging trends in need of attention so that auditors can better execute the department’s strategic focus on risk.
Scott Moritz, Managing Director, Protiviti and Pam Verick, Director, Protiviti
Internal Auditors are often the first line of defense in a company’s fight against fraud and corruption. Indeed, Internal Auditors are often called upon to “pivot” when a routine internal audit unearths red flags that may be indicators of fraud, corruption or misconduct.
This presentation is intended to provide internal auditors with:
•Knowledge of investigative techniques
•The ability to recognize fraud or corruption indicators
•Tools to respond to red flags
Ann Butera, President of the Whole Person Project, Inc. and Ashley Hartley, Director at Protiviti
As a manager, you are likely adept at handling crises on the job. But how do you handle people in crisis? Whether positive or negative, any life-altering event can affect how your employees work, and as the boss, you may be the last person to know. What can you do to diagnose changes in employee performance before it’s too late?
Join Ann Butera, President of the Whole Person Project, Inc. and Protiviti in this webinar to discuss how to mitigate the effects of your employees‘ personal lives on their work lives. We will discuss how the inherent boss/employee relationship can lend itself to misunderstanding, how to recognize the symptoms and warning signs of employees’ crises, and how you can adjust your management style to deal with this.
The World has forever changed. eCommerce is no longer a nice to have…it is a necessity. We live in a very noisy world where technology has changed the way we buy. Time, context and attention are the new currency.
Join us for this webinar where Aaron Greenman, Protiviti Director, will explore how technology has had a significant impact on mobile commerce, the security implications involved and measures to consider.
Adam Brand, Associate Director, Protiviti; Magen Hughes, Consultant, Protiviti
Infosec is known for constantly telling IT to "patch your stuff" to prevent getting compromised. Scan reports with a bunch of red are kicked over the wall, and scary reports showing thousands of vulnerabilities are an all-to-frequent result of a vulnerability assessment. But these scan reports are often lying about the true severity of the vulnerabilities, which creates more work for everyone and leaves Infosec crying wolf more often than it should. In this talk, we take a closer look at the problem with vulnerability ratings and how to have IT fail less by having to patch less, while simultaneously being more secure.
Protiviti is a global business consulting and internal audit firm composed of experts specializing in risk, advisory and transaction services. Our firm includes leading experts in areas of finance and accounting, risk and compliance, technology effectiveness, litigation, investigations and financial restructuring. Our professionals have powerful insights on par with the largest consulting organizations in the world; however, we are more nimble and adept than these competitors in delivering value for our clients.
Protiviti is the leading company dedicated exclusively to risk consulting and internal audit. We help our clients seize new opportunities for growth and profitability while protecting them from their risks. We work with more than 25 percent of the FORTUNE 500®. Our 2,500 professionals in 60 offices worldwide bring powerful insights and proven delivery with a customized blend of competencies to every project.
VCE VxRail Appliance with EMC data protection provides simple, fast and efficient protection of data and applications regardless of where they live, against whatever might happen, and at the right service level based on business value.
Learn how all employees can work and collaborate securely! The new world of work demands that people collaborate faster and more seamlessly than ever before.
Your employees have access to cloud-based apps, personal devices, and pervasive internet connectivity. All these things are great for getting work done, but your company is still held to high standards around security, and auditing, and you can't afford to make a wrong move.
Join this webcast to explore some common security scenarios such as:
•How do you provide access when you can't always control the endpoint?
•How do you know where all your company's files are right now?
•If you terminate an employee, how would you know what files they had in their possession.?
•Could you wipe a terminated employee's corporate data while leaving their personal content alone?
This webcast is part of our Digital security in the modern world webcast series. Sign up for this session, or the entire series today!
VMware, NetApp and even EMC are proponents of using NFS based storage systems to support mission critical workloads like virtual machines, databases and performance sensitive unstructured data. But in comparison to mission critical fibre channel, the tools to monitor and optimize your NFS infrastructure are lacking. In this webinar Storage Switzerland and Virtual Instruments will discuss the five challenges facing IT professionals that depend on NFS-based storage infrastructure for performance-intensive workloads. You will learn how to detect and overcome:
Business continuity can be a high pressured role at times, with many decisions having to be made under that pressure. It is important to be able to manage it effectively and so ensure the right decision is taken, whatever the circumstances. In this webinar, Paul Breed MCBI presents a decision making model which includes:
Information - (Fact, Assumption, Gaps - urgency)
Threat and Risk Assessment - based on Identity, Capability, Intention
Development of a Working Strategy - that dovetails the Threat and Risk Assessment
Options - ideally from a predetermined tactical menu that reduces time critical decision making
Action - based on the agreed option together with contingencies
Review - constantly review the decision especially when new information comes to light
Wie können Sie angesichts des neuen Grads an Ausgereiftheit und Bedrohung, den Ransomware im vergangenen Jahr erreicht hat, sicher sein, dass Ihre Infrastruktur davor geschützt und Ihr Unternehmen ausreichend vorbereitet ist, um einen Angriff zu bewältigen?
Sicherheitsverantwortliche haben heute mit diesen Problemen zu kämpfen:
•Nicht genügend umsetzbare Threat Intelligence, um verstehen zu können, welche Akteure und Kampagnen eine Bedrohung für ihre Unternehmen darstellen.
•Zu wenig geschulte Sicherheitsanalysten, die die zunehmende Zahl von Bedrohungen identifizieren können, die in ihre Unternehmen eindringen. Beispielsweise konnte der Einsatz von Crypto-Ransomware als Angriffstool im Jahr 2015 eine weitere Zunahme verzeichnen, und zwar um 35 %. Dennoch brauchen Unternehmen, in denen ein Angriff stattfindet, in der Regel mehr als 200 Tage, um sich dessen bewusst zu werden.
•Zu wenig spezialisiertes Know-how hinsichtlich der Methoden, die erforderlich sind, um auf Bedrohungen zu reagieren und diese unschädlich zu machen, nachdem sie in ihrer IT-Umgebung Fuß gefasst haben.
Die Taktiken von Ransomware-Gangs werden immer ausgefeilter und Unternehmen müssen sich der Gefahr, die sie darstellen, vollständig bewusst sein. Nehmen Sie an einem Webinar von Symantec teil, in dem ein konkreter Ransomware-Angriff behandelt wird. Sie erfahren, was geschehen ist und welche Maßnahmen das betroffene Unternehmen ergriffen hat, um die Bedrohung zu beseitigen.
Ransomware continues to evolve. Last year, the use of encryption as a weapon to hold companies’ and individuals’ critical data hostage grew by 35 percent.
Take this opportunity to learn directly about what can happen in a ransomware attack based on real-life events. Symantec’s Cyber Security Services experts will lead the discussion and will help you to understand how you can improve your line of defense against ransomware and minimise the loss of key data, money and intellectual property from your organisation.
The frequency of cyber-attacks continues to increase at an unparalleled pace. By attacking the most vulnerable value chains of organizations, they result in information confidentiality & integrity breaches, discontinuity of business activities and huge damages. Once considered predominantly as a technological issue, the risks related to the information systems are now evaluated within the Enterprise Risk Management scope. On the other hand, traditionally, Business Continuity Management (BCM) is mostly treated as a domain separate from Information System Security Management (ISSM). With the rapid explosion of cyber threats, the alignment between BCM and ISSM is now becoming a must, in order to provide management with a holistic view and enabling them to implement organizations where the teams closely interact with each other.
It goes without saying that the organizational part of security and BCM is the key for a successful implementation, yet the information system (IS) part needs to also be addressed in an efficient way. Various standards and frameworks exist to help organizations implementing a BCM, but they lack a strong link with the governance, architecture and security of the IS. In this webinar we will introduce very briefly an innovative approach and describe the first steps for the linkage between the two worlds, enabling an efficient implementation of BC based on an architectured and secured IS.
If object storage is the future of unstructured data storage, NFS is clearly the present. Object storage vendors realize this and provide NFS support. The problem is most of these vendors leverage a NFS gateway to act as the bridge. Gateways create their own problems however, diminishing the value of the object storage investment. In this ChalkTalk video watch as Storage Switzerland’s George Crump and Caringo's Jonathan Ring discuss the ideal way to address NFS on Object shortfalls.
Ce webinaire présentera les bénéfices pour les organisation de s’aligner sur la norme ISO 22301 et de la certification à la norme ainsi que les bénéfices pour les individus de connaître la ISO 22301. Le webinaire présentera également la formation offerte par le BCI pour améliorer sa connaissance de cette norme et comment avoir une approche étapiste en vue de certifier une organisation en utilisant l’outil d’auto-évaluation. Ces formation et outil ont été développés par ICOR, le International Consortium for Organizational Resilience.
Marie-Hélène Primeau est formatrice pour le BCI et enseigne les cours ISO 22301 Lead Auditor. Sa firme, Premier Continuum, a aussi intégré l’outil d’auto-évaluation ISO 22301, développé par ICOR, dans son logiciel de continuité ParaSolution et le distribue sous licence.
Les SOC D’aujourd’hui se détournent de leur métier de base en devenant des centres de gestion d’alertes. Nous vous présenterons comment l’apport de la cyberveille peut permettre aux équipes de passer d’un mode réactif qui gère des alertes à un modèle proactif axé sur la chasse aux indicateurs et aux groupes d’assaillants présents sur vos environnements IT.