Hi [[ session.user.profile.firstName ]]
Sort by:
    • Tightening the Reins on Credit Risk Modeling Tightening the Reins on Credit Risk Modeling Tom Kimner and John Voigt of SAS and Dan Magestro, IIA Research Director Upcoming: Aug 25 2016 4:00 pm UTC 60 mins
    • Many financial institutions recognize that they still do not have sufficient data management, infrastructure, or staffing in place to address all the issues brought about by the myriad of risk regulations. While larger banks continue to struggle with the qualitative aspects of supervisory stress testing and capital planning, IFRS 9 and the new CECL accounting standard will demand greater interconnection of Finance and Risk, more complex modeling, and increased public disclosure. Heightened expectations of strong model risk management and governance further strain organizations.

      To address these challenges, institutions are reexamining existing processes with a goal to establish a more efficient and controlled modeling environment—including model implementation and lifecycle management, orchestration, and governance. How can financial institutions ensure they have the foundational building blocks in place to meet these increasing demands?

      Read more >
    • Ethical Leadership: How Internal Audit Can Influence the Tone at the Top Ethical Leadership: How Internal Audit Can Influence the Tone at the Top Don Levonius Recorded: Nov 18 2014 4:30 pm UTC 120 mins
    • According to IIA guidance, internal auditors are charged with monitoring organizational ethics and assessing whether management policies, procedures, and practices support ethical operations. And while management usually seeks to set, promote, and perpetuate an ethical climate, some leaders seem either motivated by self-interest or so focused on other operational priorities that they overlook their obligation to steward organizational ethics.

      What can internal audit do to articulate this risk of unethical behavior? How can internal audit influence the tone at the top? How can internal auditors persuade management to see the value proposition for ethical leadership? This webinar addresses these questions and equips auditors, audit directors, and CAEs to make a compelling argument as to how ethical leadership drives bottom-line results.

      By the end of this webinar, participants should be able to:

      -Compare contrasting views of behavioral ethics
      -Differentiate between moral and conditioned honesty
      -Examine rationalizations commonly indicative of moral disengagement
      -Explain why ethical stewardship is a primary leadership responsibility
      -Correlate ethical leadership to organizational results
      -Formulate a compelling argument in favor of an ethical tone at the top

      Read more >
    • Minimizing the Impact of Cyber-attacks Minimizing the Impact of Cyber-attacks Randy Gainer Recorded: Feb 23 2016 5:00 pm UTC 61 mins
    • Randy will describe a few of the hundreds of cyberattacks he and his partners have helped clients respond to. He will describe the wider cyber-threat environment that generates such attacks. Randy will discuss the best-practice defenses businesses and other entities deploy to reduce the risk that they will be victims of cyberattacks and the tools “compromise-ready” organizations use to minimize the effects of attacks when they occur. Randy will also describe the steps business managers and internal auditors must take to respond to data security incidents.

      Read more >
    • Minimizing Risks using Data Analytics Minimizing Risks using Data Analytics Opher Jackson, Retired EY Executive Director Recorded: Mar 29 2016 4:00 pm UTC 61 mins
    • Do you want evidence that risk in your organization is not increasing?
      Do you want to address audit committee concerns about how you monitor risk within your internal audit or risk department at an enterprise or group level?
      Do you want to show that internal audit is integrating analytics to focus your audit efforts on emerging or high risk activities?
      Then this webinar may contain information you will find useful. The webinar discusses how analytics have monitored GL transactions to help internal audit and risk functions:
      •Ensure business behaviors are not changing
      •Provide visibility to executives on the impact of GL policy changes
      •Get ahead of whistle blower calls
      •Distinguish significant versus insignificant GL activity

      Read more >
    • IIA-Australia/Protiviti 2013 Internal Audit Benchmarking Survey IIA-Australia/Protiviti 2013 Internal Audit Benchmarking Survey Mark Harrison,Managing Director, Protiviti Canberra & Rob McKimm, Group Assurance Manager, Origin Energy Recorded: May 29 2013 1:00 am UTC 60 mins
    • For the past four years, the Institute of Internal Auditors - Australia and Protiviti have conducted comprehensive surveys of Chief Audit Executives from over 160 organisations across all sectors, to capture trends and developments in the internal audit profession.

      Now in its fifth year, the 2013 edition surveyed Chief Audit Executives (CAEs) from organisations across the listed, unlisted, government and not for profit sectors. In 2012, we conducted qualitative research with Audit Committee members (Achieving High Performance in Internal Audit, Fourth Edition, 2012). Several major themes were raised and were included as questions in the current survey to CAEs. Mark Harrison, Managing Director, Protiviti Canberra and Rob McKimm, Group Assurance Manager, Origin Energy will present the results of the survey which include reflecting on the major themes from 2012. They will compare year on year results and highlight trends that may be relevant to you and your organisation.

      Read more >
    • Crisis Communication – How to Mitigate Potential Damage Crisis Communication – How to Mitigate Potential Damage Sheila Hyland and Judy McNeil Recorded: Jan 13 2016 5:00 pm UTC 50 mins
    • It takes just one misstep, one careless quote in the news media or one misguided post on social media to damage the reputation of an entire company and its executives. The key to managing a crisis is to have a plan in place beforehand—and that includes the critical issue of communications, both internally and externally. At this webinar, our experts will talk about crisis communications and how to mitigate the damage when your organization’s worst nightmare comes true. We’ll show you how to craft key messages, how to choose the right spokesperson, how to respond to the media and take control of an interview. We’ll help you determine if and how you should respond to the media, and we’ll explore the critical top ten list for handling crisis communications within your organization. This webinar will not only provide valuable information to the internal auditors but also
      •discuss how internal auditors can prepare the organizations and executives they work with to prepare for and respond to the media in a crisis,
      •the importance of developing a crisis communications plan and key steps to take before and after a crisis hits. This should be information they can use to audit the readiness and effectiveness of their organizations crisis communications preparation.

      Read more >
    • Physical Security Governance:  A Metrics Based Approach Physical Security Governance: A Metrics Based Approach Pierre Bourgeix and Matt Neely Recorded: Dec 18 2015 5:00 pm UTC 60 mins
    • Physical Security is often ignored but continues to be a key component of the overall information security strategy. This webinar will be centered on Physical Security Governance and the ability to take a holistic view of security components and apply them to the policies and procedures established within business units. This ensures that security exists to mitigate risk. Through the use of metrics we can then measure risk and once the information has been attained, then and only then can a proper security program be developed with security risk at its center point. The use of metrics will ensure also that there are checks and balances allowing an audit or assessment to succeed. Finally security governance will make sure that you have the proper people, processes, and technology in place to protect the business and take a risk-based approach to ensuring you have the proper level of protection.

      Matt Neely is the Director of Strategic Initiatives at SecureState. His main focus is helping clients understand and address security risks to foster business innovation. Matt has over 15 years of experience working in the physical and cybersecurity industry focused on risk management, penetration testing, and incident response. He is also the author of the book Wireless Reconnaissance in Penetration Testing.

      Pierre Bourgiex is the VP Business Development at SecureState. He has over 14 years of experience in security with a variety of companies such as, Tyco Integrated Security, ADT and Hysecurity. His primary focus is on creating, implementing and improving the mindset and strategy of an organization

      Read more >
    • Organizational Governance and Risk Mitigation in a Digital World Organizational Governance and Risk Mitigation in a Digital World Mohan Tanniru. Ph.D. Recorded: Oct 20 2015 4:00 pm UTC 60 mins
    • Senior executives in the Forbes/Deloitte survey mentioned the following as their biggest concerns: Social media; Data mining and analytics; Mobile applications; Cloud computing; and Cyber attacks. Rethinking governance in the digital age, according to Deloitte, is moving from value protection to value creation. Such a value creation calls for a better management of customer journey, according to McKinsey, and this calls for a careful understanding of on-line presence, managing the digital media process, and engaging customer carefully to both recognize and address various risks. The digital services developed to support such a customer journey calls for an agile information system architecture, and this architecture has to be closely tied to an agile business architecture that is not just governing internal and external stakeholders relationships and addressing risks, but enabling the firm to creating value. Examples in health care are used to illustrate this approach.

      Dr. Mohan Tanniru is the Professor of MIS in the Decision and Information Science Department of the School of Business Administration at Oakland University. He has published extensively in information technology research for the last 30 years in areas such as IT strategy, knowledge base/expert systems, decision support and business analytics, and health care delivery management. His work has appeared in journals such as ISR, MIS Quarterly, Decision Sciences, DSS, JMIS, IEEE Transactions in Eng. Management, Expert Systems and Applications, Information and Management and Communications of ACM. He has taught at the University of Arizona, Syracuse, and the University of Wisconsin-Madison, and was the Dean of the School of Business Administration and the founding director of the Applied Technology of Business Program at Oakland University.

      Read more >
    • Auditing Windows event log Auditing Windows event log Richard Cozart Recorded: Sep 24 2014 4:00 pm UTC 58 mins
    • Richard Cozart will provide insights into the mysteries of windows logs. He will discuss the following:

      •Configuring Audit Policies
      •What information is contained in windows logs?
      •How to interpret the windows logs?
      •Recommendations for event monitoring
      •Security Information & Event Management (SIEM) Software

      We all have heard that everyone should review logs, this is your chance to get details on how to do it.

      Read more >
    • Are You Safe?  Managing Risks in the Age of Security Breaches Are You Safe? Managing Risks in the Age of Security Breaches Michael Gerdes, CISSP and Molly Talafuse CISA, CRISC Recorded: Feb 4 2015 5:00 pm UTC 64 mins
    • How safe is your organization? With many recent, highly publicized security breaches, it’s clear that we’re all at risk. Hacking has literally become a global business with personal data at the top of the list of commodities up for sale. With all the breaches in the news, many media outlets have focused on the susceptibility of companies to malware, while ignoring other critical flaws that likely contributed to the success of these breaches. Among these are failures in common IT processes such as change management, software release control, and access control to production environments. A common thread in these flaws is most often the lack of effective governance and oversight of the information risks inherent in these processes. This webinar will help you 1) learn about some common flaws in security and IT practices, 2) understand the critical role a partnership between security and Internal Audit has in breach prevention, and 3) identify some practical steps your information security and audit teams can take to reduce risks.

      Read more >
    • Auditing the Incident Response Program Auditing the Incident Response Program Edward Napoleon Recorded: Apr 23 2014 4:00 pm UTC 54 mins
    • From political hacktivists to international cybercrime organizations, enterprise security has been under a barrage of attacks that run the gamut of complexity. Security breaches now seem inevitable even at organizations that invest heavily in their information security operations. With numerous recent examples of cybercriminals and malware penetrating corporate networks almost at will, the role of incident response teams has been thrust into the spotlight. In this presentation I will discuss the fundamentals of incident response planning and the critical role audit has in reviewing incident response plans, documentation and the plan testing process.
      At the end of this session:
      You will understand:
      -incident response
      -identify the different types of incidents
      -planning process
      -roles and responsibilities
      -team activation process
      -response process flows
      -response scenarios, and
      -auditing incident response

      Read more >