Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date To FAIR or not? A Risk Assessment Discussion David Elfering There are several ways to get the risk assessment wrong. If the risk is considered a “thing”, and not a “quantity”, we probably got it wrong. Werner... 3 years ago | 61 mins Building a Vulnerability Management Program Erik Wille, Director, Information Security – Penske Automotive Group Join Erik in talking about building a thriving vulnerability management program that focuses on improving business risk through refocusing efforts on ... 3 years ago | 60 mins IIA Detroit Chapter Ethics Webinar Stephen W. Blann, CPA, CGFM, CGMA Every day we are faced with ethical dilemmas. They are not all big, earth-shattering decisions between right and wrong… but every ethical decision we ... 3 years ago | 122 mins VIRTUAL MAY CHAPTER MEETING Scott Darragh, Economist, State of Michigan Department of Treasury and Paul Traub, Senior Business Economist, Federal Reserve JOINT MEETING WITH THE INSTITUTE OF MANAGEMENT ACCOUNTANTS ALSO, 2020-2021 IIA DETROIT CHAPTER BOARD ELECTIONS WILL BE HELD Topics: THE STATE OF MICH... 3 years ago | 139 mins Evolution of Traditional Investigations and Modern Forensics Bill Hickman, COO of CSI Corporate Security and Investigations Inc. and Peter L. Mansmann, president of Precise, Inc., a lit The use of web enabled devices has profoundly changed the world we live in. The average American now spends upwards of 10 hours per day in front of s... 6 years ago | 57 mins Keeping Insider Risk at Bay Doug Copley, Deputy CISO and Senior Security & Privacy Strategist at Forcepoint Is that activity you’re seeing a malicious user? Is it someone who made a mistake? Is it coming from an account whose credentials were compromised? Is... 6 years ago | 60 mins Assessing Cyber Risk - Challenges and Solutions STEPHEN HEAD - Experis Finance: Director of IT Risk Advisory Services Managing cyber risk in today’s digital environment is extremely challenging, whether your organization is public, private or governmental. In respons... 4 years ago | 60 mins ISACA Chapter Meeting Simplifying Policy: Information Security on One Page David Soubly, Principal, IT Security and Risk, ICEX (Intellectual Capital Exchange) Year at a Glance Charlie Murray, Vice President Nominations & Awards Keith Cheresko, Chairperson Webinar Topic and Speaker Simplifying Policy: Inf... 3 years ago | 91 mins Leveraging NIST’s Publications to Build Cybersecurity Audit Programs Brad Barton, CISA, Century GRCS As a continuation to last month’s webinar where Jeff Sisolak discussed how to leverage the National Institute of Standards and Technology (NIST) libra... 3 years ago | 56 mins PROMOTING CIVILITY IN THE WORKPLACE PRESENTER: DON LEVONIUS, CERTIFIED SPEAKER AND MASTER FACILITATOR VICTORY PERFORMANCE CONSULTING LLC We live in contentious times in which divisiveness not only drives people to engage in antisocial and unethical behavior, but creates tremendous risk ... 4 years ago | 121 mins Load more