The snowballing complexity of the business and technology risks, introduction of new regulations and ever increasing compliance requirements have made it vital for every enterprise to set up a proficient Governance, Risk and Compliance (GRC) framework.
This webinar will emphasise on the essential GRC elements that organizations must adopt in order to protection business critical assets and exploit new opportunities with confidence.
Today’s workforce embraces the idea that with mobile technology, we can work anywhere. Risk and compliance professionals are challenged to complete assessments that require location or site-specific information. Physical security, facility site and self-assessments require them to collect data and evidence while they are away from their desks, and organizations are turning to mobile to help them accomplish these tasks more efficiently.
During this webcast, you will learn how to develop and implement a mobile strategy for your GRC assessments to more efficiently capture risk and compliance assessment information on-site. By transforming time-consuming operational chores into efficient, value-added processes, you can significantly reduce potential data entry errors and delays in sharing this critical risk data.
Join us to learn more about:
• Considerations for determining what GRC use cases are best suited for the mobile environment
• How customers are utilizing RSA Archer GRC Mobile
• Using RSA Archer GRC Mobile to conduct audit, risk and compliance assessments via a product demonstration
Hear two seasoned GRC Program Managers share their best practices for a successful GRC program. They will reveal how they have helped companies take the leap to a strategic enterprise GRC focus where they cultivated, managed and maintained an effective, holistic GRC plan. Learn how to benchmark and demonstrate the value of your GRC program.
Phil Aldrich, Sr. Manager, GRC Program Management, EMC; and Jennifer Anderson, GRC Program Director, Verterim, will provide tips for expanding your GRC program across the enterprise. You will learn:
• The 8 keys of highly effective GRC programs and their applications
• Which program elements are most impactful
• Implementation tips
Today’s business environment is fraught with risk. Economic, technology and market conditions affect organizations on a daily basis. However, this constantly changing risk landscape – globalization, expanding digital infrastructures, supply chains, regulatory changes – also represents an opportunity. An opportunity for growth and innovation that can take an organization to the next level.
We are moving to a world where risk management will become the primary source of competitive advantage. Rather than avoiding risk, organizations need the ability to embrace it. Risk management will become the core capability from which organizations who do it effectively will prosper, while those that don’t will fail.
Join this webcast to learn the benefits of a Risk Intelligence approach, including:
• Better, more predictable decision-making
• Greater business opportunity
• Better business performance
In today’s interconnected world, organizations struggle to adequately govern risk in third party business relationships. Over half of the organization’s insiders are no longer traditional employees. Insiders now include suppliers, vendors, outsourcers, service providers, contractors, subcontractors, consultants, temporary workers, agents, brokers, dealers, intermediaries, and more. Third party problems are the organization’s problems that directly impact brand, reputation, compliance, strategy, and risk to the organization.
Join Michael Rasmussen, The GRC Pundit of GRC 20/20, and Nick Rafferty, SureCloud COO, to get an expert view of the challenges companies face and how to gain certainty amid an uncertain web of complex, global relationships.
In this webinar you will learn:
Why fragmented approaches to third party governance are doomed to fail
How inadequate resources can’t keep up with growing risk and regulations
How document, spreadsheet and email-centric approaches lack current-state analyses and audit trails
Amid a challenging environment, what to do today by defining a strategy and adopting a single-version-of-the-truth software solution.
How SureCloud's unique GRC Platform and its Third Party Risk Manager Application can strengthen your assessment process
Agenda includes plenty of time to address your questions.
When Aflac’s global security team set out to revamp their technology governance, risk and compliance (GRC) processes, they embraced the opportunity to create an even stronger program through automation. Aflac needed greater visibility into technology GRC activities, as well as a single platform to improve document management and act as a central source of the truth accessible to all stakeholders. IT Risk Manager was selected and implemented to improve transparency and accountability. It helped the Aflac global security team save on time and resources for a more intelligent approach to risk management.Read more >
-Better understand effective GRC automation
-Identify the right time to automate
-Believe in a future beyond spreadsheets and emails
-View assessment results in detailed and high-level dashboards and reports
GRC transformation is typified by the challenges of enterprise software implementation and exaggerated by the convergence of traditionally isolated business processes. EY has developed a measured approach to GRC transformation, developing an ecosystem that meets the current needs for consolidated reporting with minimal disruption to the current state of the business.
In this session, EY discusses perspectives on GRC in general, trends in their customers’ use of GRC technologies, and their pragmatic approach to GRC transformation.
How should you manage and maintain policies? GRC Pundit, Michael Rasmussen discusses the act of keeping policies current in a world of business change, risk change and regulatory change.
• Policy enforcement and assessment of compliance
• Policy governance, steering committee and the role of the policy manager
• Policy metrics and improvement
• Policy maintenance and updates
• How technology enables the management and maintenance of policy
Cyber risk is not only a present danger, but it’s also overwhelming at most organizations. IT departments are inundated with vulnerabilities and unable to analyze them in a timely fashion. Meanwhile, the C-suite is clamoring for evidence to support their risk management decisions.
Governance, risk management, and compliance (GRC) processes make cyber risk data actionable for both IT departments and the executive ranks. In this LockPath webinar, you’ll learn the areas GRC impacts and how one organization uses a GRC platform to prioritize vulnerabilities, while delivering visibility and accountability. Specifically, you’ll learn:
• The role of information security in your GRC program.
• How GRC processes can make your data actionable, driving better business decisions.
• How one organization employed GRC to strengthen its vulnerability management program.
Once a policy is written, how should you get employees engaged? GRC Pundit, Michael Rasmussen discusses best practices in policy awareness and communication. You’ll learn:
• The role of training and ramification
• The policy portal—building an interactive employee experience for policy management
• Getting employee questions answered
• Attestations, read and understood, certifications
• How technology enables employee engagement on policy
“It was the best of times, it was the worst of times,” wrote Dickens. 2017 has been a tumultuous year for governance, risk management, and compliance (GRC). 2018 could be just as stormy with cybersecurity, GDPR, and new risks caused by the shift to digital business. In this webinar, our panel of industry experts will recap the year’s highlights and offer their thoughts on what to expect in 2018.
Discussion topics include:
• Ramifications of major data breaches in 2017
• The continuing shift in risk perspective from department to enterprise
• Navigating third-party risk management on the road ahead
• The role and influence of the board in 2018
• GDPR and the trend toward data privacy and security
Plan now to attend this special webinar on 2017 trends and 2018 predictions for GRC.
Anyone can write a document and call it a policy, but that puts liability and exposure on the organization. GRC Pundit, Michael Rasmussen discusses the act of responsible authoring. You’ll learn:
• How to define who is authorized to write policy
• How to determine when to write a policy
• Mechanics and consistency of good policy writing
• Supporting tools for policy writing and style guide
• How technology enables consistent policy authoring
Learn the top 8 reasons why GRC programs fail - no matter the size of the program. We will share what you can do to: identify red flags to side-step failure, turn failures into successes, create the path to GRC success The session will incorporate the use of GRC tools as well as company / organizational tips.Read more >
Mike Rasmussen of GRC 20/20 explores the ever changing role of the CISO in a modern organization.
This presentation offers a prescription for managing information security risk as it permeates business operations, processes, transactions, and relationships in the digital world.
Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.
Organizations with the ability to view cybersecurity breaches as a risk, with associated probabilities and impacts, can strike the right balance between resilience and protection. By bringing together leadership and capabilities across fraud, IT, cybersecurity and operational risk, organizations can connect the dots and manage their GRC program more effectively. Organizations need to employ a proactive approach to review their existing risk management processes, roles and responsibilities with respect to cybersecurity to re-align them into an overall ERM strategy with boardroom backing.
Attend this panel webinar, as we discuss these issues and address ways to develop an evolving GRC program to cope with the growing threat landscape.
Attendees can earn 1 CPE credit on this session.
Digitization has become deeply embedded in enterprise strategy, as nearly all businesses and activities have been slated for digital transformations. The significant advantages of digitization, with respect to customer experience, revenue, and cost, have become increasingly compelling, and we are starting to see digital transformations in risk create real business value by improving efficiency and the quality of risk decisions.
The state of risk management at most global, multiregional, and regional banks is abundant with opportunity. Current processes are resource intensive and insufficiently effective, as indicated by average annual fines above $400 million for compliance risk activities alone. By improving the efficiency and effectiveness of current risk-management approaches, digital risk initiatives can reduce operating costs for risk activities by up to 30 percent, and a digitized risk function can provide better monitoring and control and more effective regulatory compliance. On this webinar our panel of experts will discuss digital innovations for risk management success.
In every organization, there are a multitude of applications and devices and a universe of threats and vulnerabilities. Every process, function and system has certain risks and compliance requirements. It is no longer enough to have a handful of diligent security and compliance professionals managing the organization's risk strategies and controls. Their processes must embrace business and mission professionals’ knowledge of risk, who evaluate the causal impact of threats to their operational performance, and participate in decision-making to meet their risk posture goals.
Organizational GRC context is achieved by correlating business criticality, threat reachability, IT controls and vulnerabilities to optimize business performance through prioritized remediation, resulting in the desired risk posture with compliance governance. CIOs and CROs need to holistically integrate threat and vulnerability management processes into the broader IT governance and risk management program. This approach will allow IT organizations to not only deal with cyber-threats effectively, but also manage IT risks and compliance mandates more proactively.
Join this executive panel as we discuss ways to use threat and vulnerability management to enable your IT GRC program.
Introducing Digital Manager 360.
Formerly known as IT Risk Manager, this video highlights the newest features, capabilities and look of SAI Global's Digital Manager 360.
Today’s IT risk environment is more threatened than ever thanks to the growth in sophisticated cyber attacks and security vulnerabilities. Now, complex, hard-to-detect attacks could bring down not just a single institution but also large parts of the internet and the financial markets. Organizations need an intelligent approach when it comes to assessing IT risk and managing compliance.
Staying safe is no longer just about deflecting attackers. It’s about staying ahead of attackers who are already inside the organization, and banks are doing this through structured lines of defense that enhance security capabilities, involve IT risk managers in operations, and expand internal audits mandate so they can cover business disruption. On this webinar presentation we will address some ways how organizations can as a part of an Integrated Risk Management initiative orchestrate effective IT risk management across the lines of defense.
This session will focus on:
1)How to simplify your vendor risk management program to help lower your exposure to fiscal, operational and regulatory risk from your extended enterprise,
2) Providing practical examples of how to automate your IT Vendor Management using the IT Risk Manager platform,
3) Demonstrate how to perform vendor risk assessments more efficiently, assess more vendors against more controls and automate vendor due diligence and on-boarding to safeguard your organisation.