Join the GRC Pundit, Michael Rasmussen and Lockpath’s Sam Abadir for a 60-minute webinar as we review the capabilities of the Lockpath Keylight Ambassador, winner of the 2015 GRC 2020 Award for Technology Innovation in Enterprise GRC Integration.
Organizations need to move beyond the concept of a GRC platform and focus on an integrated view of GRC data and systems through a GRC architecture that is a cohesive part of the broader business fabric of the organization. This is what GRC 20/20 refers to as 360° GRC contextual awareness. Where risk and compliance is monitored and understood in the course of business operations, changing risks and regulations, and interactions. Delivery of GRC contextual awareness requires that GRC be a central nervous system to capture signals found in processes, data, and transactions as well as changing risks and regulations for interpretation, analysis, and holistic awareness of risk in the context of business. Lockpath Keylight Ambassador is a GRC solution that offers a hybrid agent architecture that enables organizations to collect distributed GRC related data from applications installed across the organization and in the cloud. Keylight’s Ambassador innovation and advancement of GRC technology is its ability to securely and automatically transmit on premise data to the cloud from business systems and information security tools.
The snowballing complexity of the business and technology risks, introduction of new regulations and ever increasing compliance requirements have made it vital for every enterprise to set up a proficient Governance, Risk and Compliance (GRC) framework.
This webinar will emphasise on the essential GRC elements that organizations must adopt in order to protection business critical assets and exploit new opportunities with confidence.
Today’s workforce embraces the idea that with mobile technology, we can work anywhere. Risk and compliance professionals are challenged to complete assessments that require location or site-specific information. Physical security, facility site and self-assessments require them to collect data and evidence while they are away from their desks, and organizations are turning to mobile to help them accomplish these tasks more efficiently.
During this webcast, you will learn how to develop and implement a mobile strategy for your GRC assessments to more efficiently capture risk and compliance assessment information on-site. By transforming time-consuming operational chores into efficient, value-added processes, you can significantly reduce potential data entry errors and delays in sharing this critical risk data.
Join us to learn more about:
• Considerations for determining what GRC use cases are best suited for the mobile environment
• How customers are utilizing RSA Archer GRC Mobile
• Using RSA Archer GRC Mobile to conduct audit, risk and compliance assessments via a product demonstration
Hear two seasoned GRC Program Managers share their best practices for a successful GRC program. They will reveal how they have helped companies take the leap to a strategic enterprise GRC focus where they cultivated, managed and maintained an effective, holistic GRC plan. Learn how to benchmark and demonstrate the value of your GRC program.
Phil Aldrich, Sr. Manager, GRC Program Management, EMC; and Jennifer Anderson, GRC Program Director, Verterim, will provide tips for expanding your GRC program across the enterprise. You will learn:
• The 8 keys of highly effective GRC programs and their applications
• Which program elements are most impactful
• Implementation tips
Today’s business environment is fraught with risk. Economic, technology and market conditions affect organizations on a daily basis. However, this constantly changing risk landscape – globalization, expanding digital infrastructures, supply chains, regulatory changes – also represents an opportunity. An opportunity for growth and innovation that can take an organization to the next level.
We are moving to a world where risk management will become the primary source of competitive advantage. Rather than avoiding risk, organizations need the ability to embrace it. Risk management will become the core capability from which organizations who do it effectively will prosper, while those that don’t will fail.
Join this webcast to learn the benefits of a Risk Intelligence approach, including:
• Better, more predictable decision-making
• Greater business opportunity
• Better business performance
In today’s world, implementing an effective GRC program is critical for every organization striving to secure the enterprise in an era of increasingly frequent and complex cyber threats. However, getting budget approval, organization buy-in and executing on a successful implementation can be daunting tasks to take on.
Join our panel of experts on this CPE accredited webinar to discover some of the best practices for GRC Implementation and Enterprise Security in 2018.
Qualifying participants will earn 1 CPE credit.
- Discover what it takes to successfully implement GRC at your organization by:
- Unifying controls for IT risk and compliance.
- Enabling IT governance by establishing accountability.
- Aligning technology and processes for efficiency and consistency.
- Learn how do you measure the cost and ROI of an implementation, so that you can present the case to management.
- Identify the maturity and design of your GRC program, and plan on an appropriate GRC implementation given your current state.
In today’s interconnected world, organizations struggle to adequately govern risk in third party business relationships. Over half of the organization’s insiders are no longer traditional employees. Insiders now include suppliers, vendors, outsourcers, service providers, contractors, subcontractors, consultants, temporary workers, agents, brokers, dealers, intermediaries, and more. Third party problems are the organization’s problems that directly impact brand, reputation, compliance, strategy, and risk to the organization.
Join Michael Rasmussen, The GRC Pundit of GRC 20/20, and Nick Rafferty, SureCloud COO, to get an expert view of the challenges companies face and how to gain certainty amid an uncertain web of complex, global relationships.
In this webinar you will learn:
Why fragmented approaches to third party governance are doomed to fail
How inadequate resources can’t keep up with growing risk and regulations
How document, spreadsheet and email-centric approaches lack current-state analyses and audit trails
Amid a challenging environment, what to do today by defining a strategy and adopting a single-version-of-the-truth software solution.
How SureCloud's unique GRC Platform and its Third Party Risk Manager Application can strengthen your assessment process
Agenda includes plenty of time to address your questions.
Join the GRC Pundit, Michael Rasmussen and Lockpath’s Sam Abadir for a 60-minute webinar as we review the capabilities of Lockpath’s Bulk Operations solution, winner of the 2015 GRC 20/20 Award for Innovation in User Experience for IT GRC.
Information security operations often are encumbered by processes that take extensive time to modify and update. When mass changes need to take place, it is time consuming to go into each record and modify and manipulate data. For example, when vulnerability scanners report finding assets that are about to be decommissioned, action items in remediation will be a waste of time. Another example is when a business division splits or is dissolved and IT assets and security records needs to be reassigned to one division or another. Lockpath’s Bulk Operations is an innovative solution that makes it easy and intuitive for organizations to manage bulk changes to IT GRC data. Lockpath clients can now easily identify data that needs some sort of change, whether it’s a change in the value of a single or multiple fields, the addition of new fields, the removal/deletion of existing fields, or shifting workflow and tasks. This saves organizations hours of work because the feature is built into the ad hoc reporting engine, organizations can easily and quickly filter data sets they want to edit.
Buying a GRC platform isn’t so much about sizing up the options as it is about analyzing your company’s needs. After that, it’s about knowing which questions to ask vendors and how to evaluate their offerings while keeping business processes front and center. In this webinar, we’ll share how to self assess needs and benchmark your GRC maturity. Throughout the hour, we’ll offer buyer’s tips and empower you to buy the GRC platform that’s right for your company.
In this webinar, you will discover:
• How to assess your organization and determine what type of platform is right for you
• What questions to ask when evaluating GRC vendors
• Tips for building a business case for a GRC platform and estimating potential ROI
In our increasingly competitive and digital world, organizations need to evolve to be more competitive. For many, an untapped resource is GRC and its role in increasing efficiency and organizational resiliency. Explore what’s possible in this educational webinar.
Prior to the implementation of the Keylight Platform, Claims Recovery Financial Services’s (CRFS) policies and procedures were scattered throughout the organization’s networks. With a vast number of compliance requirements and multiple client audits each year, the company’s existing policy and compliance management process was inefficient and costly.
In this 60-minute webinar, Deborah Cheek, CISO at CRFS, will discuss with Sam Abadir how implementing the Lockpath Keylight Platform transformed CRFS’ policy management and compliance program, streamlined its internal policy management process, increased user adoption of its GRC program, and ultimately helped the company gain a competitive advantage.
When Aflac’s global security team set out to revamp their technology governance, risk and compliance (GRC) processes, they embraced the opportunity to create an even stronger program through automation. Aflac needed greater visibility into technology GRC activities, as well as a single platform to improve document management and act as a central source of the truth accessible to all stakeholders. IT Risk Manager was selected and implemented to improve transparency and accountability. It helped the Aflac global security team save on time and resources for a more intelligent approach to risk management.Read more >
-Better understand effective GRC automation
-Identify the right time to automate
-Believe in a future beyond spreadsheets and emails
-View assessment results in detailed and high-level dashboards and reports
Lockpath’s Keylight Platform offers a suite of solutions for your financial institution’s complicated GRC needs.
From Compliance and Policy Management to Third Parties and IT Risk, Keylight is a comprehensive scalable software platform designed to serve financial institutions in an ever changing regulatory environment.
Operational risk management (ORM) is a growing discipline within an organization’s integrated risk management program. Practitioners identify how daily managed activities and external events impact strategic goals, value creation, and operations. Managing operational risk can be challenging, in part, because of the inability to fully understand how risk impacts value.
In this fast-paced webinar, Lockpath’s Sam Abadir shares current ORM trends and challenges, Lockpath’s ORM maturity model and how a governance, risk management, and compliance (GRC) processes can address ORM.
Specifically, you’ll learn about the following:
• A practical guide to ORM processes, including current trends and challenges
• The impact of daily managed activities and external events on overall business operations and strategic goals
• One organization that uses a GRC solution to conduct ORM and create value
• How a GRC platform can help you avert crisis and embrace risk
GRC transformation is typified by the challenges of enterprise software implementation and exaggerated by the convergence of traditionally isolated business processes. EY has developed a measured approach to GRC transformation, developing an ecosystem that meets the current needs for consolidated reporting with minimal disruption to the current state of the business.
In this session, EY discusses perspectives on GRC in general, trends in their customers’ use of GRC technologies, and their pragmatic approach to GRC transformation.
“It was the best of times, it was the worst of times,” wrote Dickens. 2017 has been a tumultuous year for governance, risk management, and compliance (GRC). 2018 could be just as stormy with cybersecurity, GDPR, and new risks caused by the shift to digital business. In this webinar, our panel of industry experts will recap the year’s highlights and offer their thoughts on what to expect in 2018.
Discussion topics include:
• Ramifications of major data breaches in 2017
• The continuing shift in risk perspective from department to enterprise
• Navigating third-party risk management on the road ahead
• The role and influence of the board in 2018
• GDPR and the trend toward data privacy and security
Plan now to attend this special webinar on 2017 trends and 2018 predictions for GRC.
How should you manage and maintain policies? GRC Pundit, Michael Rasmussen discusses the act of keeping policies current in a world of business change, risk change and regulatory change.
• Policy enforcement and assessment of compliance
• Policy governance, steering committee and the role of the policy manager
• Policy metrics and improvement
• Policy maintenance and updates
• How technology enables the management and maintenance of policy
Cyber risk is not only a present danger, but it’s also overwhelming at most organizations. IT departments are inundated with vulnerabilities and unable to analyze them in a timely fashion. Meanwhile, the C-suite is clamoring for evidence to support their risk management decisions.
Governance, risk management, and compliance (GRC) processes make cyber risk data actionable for both IT departments and the executive ranks. In this Lockpath webinar, you’ll learn the areas GRC impacts and how one organization uses a GRC platform to prioritize vulnerabilities, while delivering visibility and accountability. Specifically, you’ll learn:
• The role of information security in your GRC program.
• How GRC processes can make your data actionable, driving better business decisions.
• How one organization employed GRC to strengthen its vulnerability management program.
Once a policy is written, how should you get employees engaged? GRC Pundit, Michael Rasmussen discusses best practices in policy awareness and communication. You’ll learn:
• The role of training and ramification
• The policy portal—building an interactive employee experience for policy management
• Getting employee questions answered
• Attestations, read and understood, certifications
• How technology enables employee engagement on policy
Learn the top 8 reasons why GRC programs fail - no matter the size of the program. We will share what you can do to: identify red flags to side-step failure, turn failures into successes, create the path to GRC success The session will incorporate the use of GRC tools as well as company / organizational tips.Read more >
Anyone can write a document and call it a policy, but that puts liability and exposure on the organization. GRC Pundit, Michael Rasmussen discusses the act of responsible authoring. You’ll learn:
• How to define who is authorized to write policy
• How to determine when to write a policy
• Mechanics and consistency of good policy writing
• Supporting tools for policy writing and style guide
• How technology enables consistent policy authoring