Hi [[ session.user.profile.firstName ]]
Sort by:
    • Crucial Components of Digital Risk Monitoring
      Crucial Components of Digital Risk Monitoring Nick Hayes - Forrester Research, Security and Risk Analyst, Forrester Research - Arian Evans - VP Product Strategy Recorded: Nov 1 2016 1:25 pm UTC 59 mins
    • RiskIQ Webinar feature Forrester Research

      The network perimeter that organizations have long relied on for protection from cyber-threats has evaporated. Businesses are engaging with their customers, vendors and partners across web, social and mobile channels. Threat actors are following suit, increasing the digital risk that organizations face. According to The Forrester Wave™: Digital Risk Monitoring, Q3 2016 (which cited RiskIQ as a Leader):,”Without comprehensively and persistently monitoring risk in digital channels, companies remain susceptible to a wide variety of brand, cyber, and physical risk events”. Every CISO and security leader must consider implementing a Digital Risk Monitoring strategy, or be at risk due to their expanding attack surface.

      In this one-hour presentation RiskIQ VP of Product Strategy Arian Evans and guest Forrester Research analyst Nick Hayes will cover:

      * Expanding threat landscape via digital—web, social and mobile—channels
      * Requirements for a comprehensive digital risk monitoring (DRM) strategy
      * Necessary security technology elements for DRM program implementation
      Join this live webinar to learn more about this growing digital risk landscape, and how you can help better protect your organization’s most critical assets, its customers, and brand.

      Read more >
    • Workshop: Mastering Operational Risk - Theory and Practice in a single package
      Workshop: Mastering Operational Risk - Theory and Practice in a single package Boris Agranovich, Calvin Lee Recorded: Jul 5 2017 6:05 am UTC 66 mins
    • This workshop is designed for busy risk professionals who are interested in studying both theoretical and practical application of ORM but don’t have time to attend in-person classes.

      During the workshop we cover:

      1. 3 things most organizations are focusing on right now.
      2. What are the major steps to take control of operational risks.
      3. How to use Collaborative Risk Management tools to conduct your ORM operations and why traditional risk management practices involving risk registers and Excel are not effective anymore.

      The goal is three-fold:

      1. Existing students will be able to understand more on how to work with the RISKID tool and get an opportunity to ask questions about the subject matter.
      2. People who are planning to join the course will get some explanation in what is the course about, how the e-learning system works.
      3. People who are just interested to know more about ORM

      Read more >
    • Mastering Operational Risk. Theory and Practice in a single package.
      Mastering Operational Risk. Theory and Practice in a single package. Boris Agranovich, Calvin Lee Recorded: Jun 27 2017 2:00 pm UTC 62 mins
    • Join me and our guest, Calvin Lee, Operations Director at RISKID, for a lively discussion as we aim to dispel confusion surrounding many of the elements of the Operational Risk framework.


      Operational risk is perhaps the most significant risk organizations face. Virtually every major loss that has taken place during the past 30 years, from Enron, Worldcom and Baring's Bank to the unauthorized trading incident at Société Générale and the subprime credit crisis, has been driven by operational failures.

      Many financial institutions have spent millions of dollars trying to develop a robust framework for measuring and managing operational risk. Yet, in spite of this huge investment, for many firms developing a viable operational risk management (ORM) program remains an elusive goal.

      This webinar is designed for both current students of the “Mastering Operational Risk” - http://www.globalriskacademy.com/p/orm online course and for other busy risk professionals who are interested in studying both theoretical and practical application of ORM but don’t have time to attend in-person classes.

      The goal is three-fold:

      1. Existing students will be able to understand more on how to work with the RISKID tool and get an opportunity to ask questions about the subject matter.
      2. People who are planning to join the course will get some explanation in what is the course about, how the e-learning system works.
      3. People who are just interested to know more about ORM

      During the webinar we will cover:

      1. 3 things most organizations are focusing on right now.
      2. What are the major steps to take control of operational risks.
      3. How to use Collaborative Risk Management tools to conduct your ORM operations and why traditional risk management practices involving risk registers and Excel are not effective anymore.

      Read more >
    • Why is Vulnerability Risk Management a BOD Issue?
      Why is Vulnerability Risk Management a BOD Issue? Humphrey Christian, VP of PM, Bay Dynamics with Guest Speaker, Forrester Sr. Security & Risk Analyst, Josh Zelonis Upcoming: Sep 27 2017 7:00 pm UTC 60 mins
    • Corporate directors have a fiduciary duty to comprehend and oversee the cyber security and risk of their organizations. The risk from software vulnerabilities, usually an IT Operations concern, is much higher when critical data and systems are involved. A more pragmatic approach leveraging new data enriched central analytics technologies delivers a needed holistic view of risk. The ability to quantify risks, communicate those risks, and make informed decisions will be the difference between success and failure for many modern enterprises.
       
      Join this fireside chat with guest speaker, Forrester Senior Security & Risk Analyst, Josh Zelonis and Bay Dynamics Director of Product Management, Humphrey Christian. This interactive session will address the challenges posed by vulnerability risk management. Learn a preemptive approach to elevate cyber security from the ancillary IT concern it is now, to the core enterprise-wide risk management item it should be.

      Read more >
    • Managing Risk Across Different Departments with Different Needs
      Managing Risk Across Different Departments with Different Needs GRC Pundit Michael Rasmussen, GRC 20/20 accompanied by Richard Hibbert, CEO, SureCloud Recorded: Nov 3 2015 3:00 pm UTC 47 mins
    • Risk and risk management is pervasive throughout organisations. There are many departments that manage risk and have their unique understanding, models, and views into risk. This makes enterprise and operational risk management a challenge. Organisations fail in enterprise risk management strategies when they force everyone into one flat view of risk, they also fail when they allow different views of risk but do not do risk normalisation and aggregation as they roll-up risk into enterprise reporting.

      This webinar details how organisations need to take a federated approach to risk management that allows different departments some level of autonomy and supports their department level risk management strategies but also enable a common information and technology architecture to support overall risk management activities and reporting.

      This ‘Expert’ presentation will address the following:
      Where and how enterprise risk management fails
      How to build an enterprise risk register and show interrelationships of risk
      The value of an information and technology risk management architecture
      Approaches to risk normalisation and aggregation for accurate enterprise risk reporting.

      Read more >
    • Third Party Risk Management: an effective, efficient, and agile approach
      Third Party Risk Management: an effective, efficient, and agile approach Michael Rasmussen, The GRC Pundit, GRC 20/20 and Nick Rafferty, Chief Operating Officer, SureCloud Recorded: Jul 21 2015 1:00 pm UTC 43 mins
    • Organisations across all sectors are dealing with a growing array of third party/vendor relationships. Even obscure supplier relationships can have significant impact on security, risk and compliance. The Target credit card breach is one example in which a heating and air conditioning supplier was the doorway in to a significant breach of a point of sale system and theft of credit card data. Organisations have to manage risk across their third party supplier relationships but are limited in the resources they can devote to this.

      This 'Expert' webinar will address the following:-

      o Understand the growing array of third party relationships
      o The impact of third party relationships on security, risk and compliance
      o Elements of an effective, efficient, and agile vendor risk management process
      o How other areas of the organisation can leverage a common approach to third party risk management

      Attend this webinar if:-

      o You are concerned by the growing number of third party supplier relationships
      o You realise your risk and compliance exposure is growing because of these relationships
      o You need to be able to manage supplier risk but cannot recruit more staff to do so
      o You desire the need to know how to keep current in a dynamic environment of third party relationships

      Read more >
    • Tips and Tricks For Tackling Vendor Risk
      Tips and Tricks For Tackling Vendor Risk Andrew Calo, Manager of Technology Risk Recorded: Aug 11 2016 3:00 pm UTC 48 mins
    • With so many moving parts pushing an organization forward, companies today must know who has access to their data—making vendor risk management (VRM) a critical business practice. Unfortunately, not all organizations have the resources to staff full-time vendor risk managers. Security professionals now must wear multiple hats in order to reduce operating risk for their organizations. Even if vendor risk management isn’t a primary focus, there are techniques and tools security professionals can implement to make it an efficient and valuable process for your company.

      In this webinar, join Andrew Calo, Manager of Technology Risk at BitSight as he offers tips and techniques to efficiently manage and assess vendor risk. Attendees will learn about:

      -Basic questions you need to ask all vendors
      -The top risk vectors and configurations to look at it
      -The value and impact of continuous risk monitoring software

      Read more >
    • Internal Audit and Third Party Risk
      Internal Audit and Third Party Risk Tim Leitz, Regional Practice Leader for Risk Advisory Services, Experis Finance Recorded: Nov 16 2016 5:00 pm UTC 63 mins
    • Regulators acknowledge the risks associated with vendor relationships and have demanded that business leaders monitor and take responsibility for the actions of their vendors through various laws and standards such as the Sarbanes-Oxley Act, the Gramm-Leach-Bliley Act, the FCPA, the Health Insurance Portability and Accountability Act, as well as the Payment Card Industry Data Security Standard (PCI DSS) requirements and CFPB guidance.

      Consequently, vendor management is currently at the forefront of organizational risk management priorities and Internal Audit needs to address vendor management and third party risk in their audit planning and execution.

      In this presentation, you will:
      - Gain an understanding of the potential risks that may arise from the use of third party service providers
      - Identify the basic elements of an effective third party risk management program

      Read more >
    • From Asset Allocation to Risk Allocation - The Introduction to a new Course
      From Asset Allocation to Risk Allocation - The Introduction to a new Course William Goodwyn Ferrell Recorded: Jul 6 2017 2:05 pm UTC 6 mins
    • In this short video, William G. Ferrell will show in a very illustrious way what his upcoming course will be all about.

      If you are a risk manager or a professional investor, your main goal is to increase returns in good times and protect your assets during the bad times.

      Listen to the introductory video and check out the upcoming course
      at www.globalriskacademy.com/p/riskallocation

      Use the attachment tab inside the webinar viewer.

      This course will teach you that traditional notions of portfolio diversification are no longer effective tools. By replacing Asset Allocation with Risk Allocation you will achieve much more effective means for managing your investment portfolio.

      Read more >
    • Risk Based Security in a Hyper-Connected World
      Risk Based Security in a Hyper-Connected World Dr. Pierre Tagle, Head of Governance and Risk for SecureWorks for Asia South Recorded: Oct 24 2016 11:00 pm UTC 61 mins
    • For many organisations, investments in new processes and technologies is on top of the priorities list. From behavioral analytics, big data solutions, and "one touch" processes that require no manual intervention, companies are always on the lookout for technology innovations that can achieve a considerable return on investment. When companies consider cybersecurity in such a technology dependent world, most ask, "How can we secure our business and comply with the changing legal and regulatory standards?" instead of, "How do we make business focused, intelligent investments given the cyber security risks we face?"

      In this webcast, Dr. Pierre Tagle, Head of Governance and Risk for SecureWorks for Asia South, will discuss the risk-based cybersecurity operating model to help companies identify and protect their most critical information assets and business processes. Dr. Tagle will focus on the most critical actions for any organisation building a risk-based security program.

      Key topics covered include:

      - Prioritising information assets based on value to the organisation
      - Identifying and prioritisng risks to the assets
      - Reduce risks with quick wins
      - Build and deliver a security plan that aligns business and technology
      - Ensure continuous business engagement on the topic of cyber security

      Read more >
    • Quarterly Insights: Managing Pension Risks in a Low Rate Environment
      Quarterly Insights: Managing Pension Risks in a Low Rate Environment Dan Kutliroff, Sr. Retirement Solutions Strategist; Jessica Hart, Practice Lead; Armand Yambao, Dir. - Pension Risk Strategy Recorded: Nov 2 2016 7:00 pm UTC 29 mins
    • Thinking strategically in an environment that requires constant tactical reaction, has become increasingly difficult. And when you’re managing a pension plan, we understand the importance of constantly addressing both. In an effort to help in this process, our investment experts have created a new quarterly webinar series designed to discuss the key market events and regulatory items that specifically affect retirement plans and provide actionable ways to address them.

      In our inaugural webcast will focus on three key areas:
      1.Market Update – navigating the low interest environment
      2.Regulatory Review – understanding the latest Pension Protection Act provisions
      3.Case Studies – Innovative ways to increase duration

      Speakers:
      •Dan Kutliroff, Senior Retirement Solutions Strategist
      •Jessica Hart, Practice Lead, Retirement
      •Armand Yambao, FSA, EA, CFA, Director of Pension Risk Strategy

      Register now for this quick, yet informative, 30 minute update to explore the most pressing items impacting retirement plan management.

      Read more >