Hi [[ session.user.profile.firstName ]]
Sort by:
    • Innovation in GRC 360 Contextual Awareness: Lockpath Keylight Ambassador
      Innovation in GRC 360 Contextual Awareness: Lockpath Keylight Ambassador Michael Rasmussen - GRC 20/20, Sam Abadir - Lockpath Recorded: Mar 20 2018 12:45 pm UTC 28 mins
    • Join the GRC Pundit, Michael Rasmussen and Lockpath’s Sam Abadir for a 60-minute webinar as we review the capabilities of the Lockpath Keylight Ambassador, winner of the 2015 GRC 2020 Award for Technology Innovation in Enterprise GRC Integration.

      Organizations need to move beyond the concept of a GRC platform and focus on an integrated view of GRC data and systems through a GRC architecture that is a cohesive part of the broader business fabric of the organization. This is what GRC 20/20 refers to as 360° GRC contextual awareness. Where risk and compliance is monitored and understood in the course of business operations, changing risks and regulations, and interactions. Delivery of GRC contextual awareness requires that GRC be a central nervous system to capture signals found in processes, data, and transactions as well as changing risks and regulations for interpretation, analysis, and holistic awareness of risk in the context of business. Lockpath Keylight Ambassador is a GRC solution that offers a hybrid agent architecture that enables organizations to collect distributed GRC related data from applications installed across the organization and in the cloud. Keylight’s Ambassador innovation and advancement of GRC technology is its ability to securely and automatically transmit on premise data to the cloud from business systems and information security tools.

      Read more >
    • Mobile Assessments for Your GRC Program: Anytime, Anywhere
      Mobile Assessments for Your GRC Program: Anytime, Anywhere Mason Karrer, GRC Strategist, RSA Recorded: Mar 27 2014 3:00 pm UTC 58 mins
    • Today’s workforce embraces the idea that with mobile technology, we can work anywhere. Risk and compliance professionals are challenged to complete assessments that require location or site-specific information. Physical security, facility site and self-assessments require them to collect data and evidence while they are away from their desks, and organizations are turning to mobile to help them accomplish these tasks more efficiently.

      During this webcast, you will learn how to develop and implement a mobile strategy for your GRC assessments to more efficiently capture risk and compliance assessment information on-site. By transforming time-consuming operational chores into efficient, value-added processes, you can significantly reduce potential data entry errors and delays in sharing this critical risk data.

      Join us to learn more about:
      • Considerations for determining what GRC use cases are best suited for the mobile environment
      • How customers are utilizing RSA Archer GRC Mobile
      • Using RSA Archer GRC Mobile to conduct audit, risk and compliance assessments via a product demonstration

      Read more >
    • Turn Risk into Opportunity with a Risk Intelligence Approach to GRC
      Turn Risk into Opportunity with a Risk Intelligence Approach to GRC Steve Schlarman, GRC and Security Strategist, RSA Recorded: Jun 17 2014 3:00 pm UTC 60 mins
    • Today’s business environment is fraught with risk. Economic, technology and market conditions affect organizations on a daily basis. However, this constantly changing risk landscape – globalization, expanding digital infrastructures, supply chains, regulatory changes – also represents an opportunity. An opportunity for growth and innovation that can take an organization to the next level.

      We are moving to a world where risk management will become the primary source of competitive advantage. Rather than avoiding risk, organizations need the ability to embrace it. Risk management will become the core capability from which organizations who do it effectively will prosper, while those that don’t will fail.

      Join this webcast to learn the benefits of a Risk Intelligence approach, including:
      • Better, more predictable decision-making
      • Greater business opportunity
      • Better business performance

      Read more >
    • [Earn 1 CPE] Best Practices for GRC Implementation & Enterprise Security
      [Earn 1 CPE] Best Practices for GRC Implementation & Enterprise Security Colin Whitaker, Informed Risk Decisions; Renee Murphy, Forrester, Cameron Jackson, Riskonnect Upcoming: Jun 5 2018 5:00 pm UTC 75 mins
    • In today’s world, implementing an effective GRC program is critical for every organization striving to secure the enterprise in an era of increasingly frequent and complex cyber threats. However, getting budget approval, organization buy-in and executing on a successful implementation can be daunting tasks to take on.

      Join our panel of experts on this CPE accredited webinar to discover some of the best practices for GRC Implementation and Enterprise Security in 2018.

      Qualifying participants will earn 1 CPE credit.

      Learning Objectives

      - Discover what it takes to successfully implement GRC at your organization by:
      - Unifying controls for IT risk and compliance.
      - Enabling IT governance by establishing accountability.
      - Aligning technology and processes for efficiency and consistency.
      - Learn how do you measure the cost and ROI of an implementation, so that you can present the case to management.
      - Identify the maturity and design of your GRC program, and plan on an appropriate GRC implementation given your current state.

      Read more >
    • Third Party Risk: Gaining certainty amid a web of global relationships
      Third Party Risk: Gaining certainty amid a web of global relationships Michael Rasmussen, GRC Analyst at GRC 20/20 and SureCloud's COO, Nick Rafferty Recorded: Apr 6 2017 2:00 pm UTC 56 mins
    • In today’s interconnected world, organizations struggle to adequately govern risk in third party business relationships. Over half of the organization’s insiders are no longer traditional employees. Insiders now include suppliers, vendors, outsourcers, service providers, contractors, subcontractors, consultants, temporary workers, agents, brokers, dealers, intermediaries, and more. Third party problems are the organization’s problems that directly impact brand, reputation, compliance, strategy, and risk to the organization.

      Join Michael Rasmussen, The GRC Pundit of GRC 20/20, and Nick Rafferty, SureCloud COO, to get an expert view of the challenges companies face and how to gain certainty amid an uncertain web of complex, global relationships.

      In this webinar you will learn:

      Why fragmented approaches to third party governance are doomed to fail
      How inadequate resources can’t keep up with growing risk and regulations
      How document, spreadsheet and email-centric approaches lack current-state analyses and audit trails
      Amid a challenging environment, what to do today by defining a strategy and adopting a single-version-of-the-truth software solution.
      How SureCloud's unique GRC Platform and its Third Party Risk Manager Application can strengthen your assessment process

      Agenda includes plenty of time to address your questions.

      Read more >
    • Innovation in User Experience: Keylight Bulk Operations
      Innovation in User Experience: Keylight Bulk Operations Michael Rasmussen - GRC 20/20, Sam Abadir - Lockpath Recorded: Mar 27 2018 12:55 pm UTC 38 mins
    • Join the GRC Pundit, Michael Rasmussen and Lockpath’s Sam Abadir for a 60-minute webinar as we review the capabilities of Lockpath’s Bulk Operations solution, winner of the 2015 GRC 20/20 Award for Innovation in User Experience for IT GRC.

      Information security operations often are encumbered by processes that take extensive time to modify and update. When mass changes need to take place, it is time consuming to go into each record and modify and manipulate data. For example, when vulnerability scanners report finding assets that are about to be decommissioned, action items in remediation will be a waste of time. Another example is when a business division splits or is dissolved and IT assets and security records needs to be reassigned to one division or another. Lockpath’s Bulk Operations is an innovative solution that makes it easy and intuitive for organizations to manage bulk changes to IT GRC data. Lockpath clients can now easily identify data that needs some sort of change, whether it’s a change in the value of a single or multiple fields, the addition of new fields, the removal/deletion of existing fields, or shifting workflow and tasks. This saves organizations hours of work because the feature is built into the ad hoc reporting engine, organizations can easily and quickly filter data sets they want to edit.

      Read more >
    • How to Buy a GRC Platform
      How to Buy a GRC Platform Adam Billings - Principal Consultant, Lockpath Recorded: Feb 22 2018 5:00 pm UTC 57 mins
    • Buying a GRC platform isn’t so much about sizing up the options as it is about analyzing your company’s needs. After that, it’s about knowing which questions to ask vendors and how to evaluate their offerings while keeping business processes front and center. In this webinar, we’ll share how to self assess needs and benchmark your GRC maturity. Throughout the hour, we’ll offer buyer’s tips and empower you to buy the GRC platform that’s right for your company.

      In this webinar, you will discover:

      • How to assess your organization and determine what type of platform is right for you
      • What questions to ask when evaluating GRC vendors
      • Tips for building a business case for a GRC platform and estimating potential ROI

      In our increasingly competitive and digital world, organizations need to evolve to be more competitive. For many, an untapped resource is GRC and its role in increasing efficiency and organizational resiliency. Explore what’s possible in this educational webinar.

      Read more >
    • Mature Compliance: Increase GRC User Adoption
      Mature Compliance: Increase GRC User Adoption Deborah Cheek - CRFS, Sam Abadir - Lockpath Recorded: Mar 14 2018 7:10 pm UTC 39 mins
    • Prior to the implementation of the Keylight Platform, Claims Recovery Financial Services’s (CRFS) policies and procedures were scattered throughout the organization’s networks. With a vast number of compliance requirements and multiple client audits each year, the company’s existing policy and compliance management process was inefficient and costly.

      In this 60-minute webinar, Deborah Cheek, CISO at CRFS, will discuss with Sam Abadir how implementing the Lockpath Keylight Platform transformed CRFS’ policy management and compliance program, streamlined its internal policy management process, increased user adoption of its GRC program, and ultimately helped the company gain a competitive advantage.

      Read more >
    • Using GRC to Tackle Operational Risk Management
      Using GRC to Tackle Operational Risk Management Sam Abadir - VP of Industry Solutions, Lockpath Recorded: Jan 23 2018 12:40 pm UTC 39 mins
    • Operational risk management (ORM) is a growing discipline within an organization’s integrated risk management program. Practitioners identify how daily managed activities and external events impact strategic goals, value creation, and operations. Managing operational risk can be challenging, in part, because of the inability to fully understand how risk impacts value.

      In this fast-paced webinar, Lockpath’s Sam Abadir shares current ORM trends and challenges, Lockpath’s ORM maturity model and how a governance, risk management, and compliance (GRC) processes can address ORM.

      Specifically, you’ll learn about the following:

      • A practical guide to ORM processes, including current trends and challenges
      • The impact of daily managed activities and external events on overall business operations and strategic goals
      • One organization that uses a GRC solution to conduct ORM and create value
      • How a GRC platform can help you avert crisis and embrace risk

      Read more >
    • Making Information Security Actionable with GRC
      Making Information Security Actionable with GRC Sam Abadir, Director of Product Management, Lockpath Recorded: Oct 2 2017 2:00 pm UTC 30 mins
    • Cyber risk is not only a present danger, but it’s also overwhelming at most organizations. IT departments are inundated with vulnerabilities and unable to analyze them in a timely fashion. Meanwhile, the C-suite is clamoring for evidence to support their risk management decisions.

      Governance, risk management, and compliance (GRC) processes make cyber risk data actionable for both IT departments and the executive ranks. In this Lockpath webinar, you’ll learn the areas GRC impacts and how one organization uses a GRC platform to prioritize vulnerabilities, while delivering visibility and accountability. Specifically, you’ll learn:

      • The role of information security in your GRC program.
      • How GRC processes can make your data actionable, driving better business decisions.
      • How one organization employed GRC to strengthen its vulnerability management program.

      Read more >