Hi [[ session.user.profile.firstName ]]
Sort by:
    • Roadmap to Smarter Compliance & Policy Management
      Roadmap to Smarter Compliance & Policy Management Sam Abadir - VP of Industry Solutions, Lockpath Recorded: Mar 8 2018 5:00 pm UTC 45 mins
    • In our uncertain regulatory climate, complying with regulations and managing policies demand that organizations be adaptable. For firms that are still using office tools like word processors, spreadsheets and emails, the challenge to adapt is even greater. In this live webinar, Lockpath’s Sam Abadir will share a roadmap to smarter compliance and policy management.

      Attendees will learn:

      • What compliance and policy management encompasses
      • Communication strategies for working with cross-functional teams
      • How organizations are bringing automation to manual processes
      • Low-hanging fruit for quick wins and ideas for sustained growth

      The road ahead is uncertain and demands that organizations adapt. Why stop there? Keep going to reach a better place with your compliance and policy management program. Explore what you need to know in this educational webinar.

      Read more >
    • Road to GDPR: Critical Data Privacy Compliance
      Road to GDPR: Critical Data Privacy Compliance Ilanko Subramaniam, Director - Risk, Compliance and Data Protection, Templar Shield; Shane Westrup, Manager, Lockpath Recorded: Nov 9 2017 5:00 pm UTC 57 mins
    • GDPR compliance designed to protect personal information of EU citizens will be a complex and time-consuming undertaking for most organizations. The challenge is interpreting the regulation and incorporating the appropriate processes and technologies to protect personal data of EU employees. The discussions will start with establishing a Privacy program to support data strategy and drive a compliance roadmap. In this webinar, Templar Shield’s Ilanko Subramaniam and Lockpath’s Shane Westrup will discuss the basic tenets of the General Data Protection Regulation, building out a data privacy and security program, and utilizing tools to help your organization establish the necessary framework to comply with this regulation.

      -----------------------------------------------------------------------------

      Disclaimer/No Attorney-Client Relationship/No Legal Advice
      The information presented is not legal advice or a legal opinion, and it may not necessarily reflect the most current legal developments. You should seek the advice of legal counsel of your choice before acting upon any of the information presented

      Read more >
    • A CISO, CIO, and Compliance Officer Grab Coffee
      A CISO, CIO, and Compliance Officer Grab Coffee Paul Chapman CIO, Box Joel De La Garza CISO, Box Crispen Maung VP Compliance, Box Recorded: Mar 11 2018 2:10 pm UTC 47 mins
    • Straight talk on security and compliance in the cloud.

      What are the best ways to keep your cloud stack secure, your business compliant, and your users safe? Getting straight (and useful) answers to these simple questions isn't always easy.

      Join us for a candid discussion with Box CIO Paul Chapman and his counterparts in Security and Compliance as they reveal how they work together every day to tackle the complex security and compliance challenges every global business faces today. They'll share best practices, pitfalls to avoid, and answer your hardest questions.

      This isn't your typical webinar. No slides. No pitches. No filters. Just a candid discussion with the guys who are safeguarding the data for over 80,000 businesses — including 67% of the Fortune 500 — as they share best practices and insights.

      Here's what they'll discuss:
      - How to get executives and users to care about security and compliance
      - Top of mind security or compliance issues (and tackling them)
      - The toughest challenges they faced

      Read more >
    • Automated Compliance Assessment for RBI Cyber Security Guidelines
      Automated Compliance Assessment for RBI Cyber Security Guidelines Shailesh Athalye, Senior Manager, Compliance Research & Analysis, Qualys Recorded: May 3 2017 5:30 am UTC 56 mins
    • Perimeterless IT infrastructure and its security is now an integral part of the operational strategies of India’s financial institutions. But the number, frequency, and impact of cyber attacks on Indian financial institutions have increased substantially, underlining the urgent need for banks to develop robust cyber security measures, and assess their security posture on a continuous basis.

      The RBI Guidelines for Cyber Security assist financial institutions to achieve this through a new-era preventative security baseline.

      During this webcast, Shailesh Athalye, Qualys Senior Manager, Compliance Research and Analysis, will discuss how financial institutions can easily address both the technical & procedural elements of the RBI Guidelines for Cyber Security in an automated manner using the highly scalable Qualys Cloud Platform.

      This webcast will include a live Q&A session.

      Read more >
    • A CISO, CIO, and Compliance Officer Grab Coffee
      A CISO, CIO, and Compliance Officer Grab Coffee Paul Chapman, Chief Information Officer | Joel De La Garza, Chief Information Security Officer | Crispen Maung, VP Compliance Recorded: Apr 24 2018 5:05 pm UTC 47 mins
    • What are the best ways to keep your cloud stack secure, your business compliant, and your users safe? Getting straight (and useful) answers to these simple questions isn't always easy.

      Watch a candid discussion with Box CIO Paul Chapman and his counterparts in Security and Compliance as they reveal how they work together every day to tackle the complex security and compliance challenges every global business faces today. They'll share best practices, pitfalls to avoid, and answer your hardest questions.

      This isn't your typical webinar. No slides. No pitches. No filters. Just a candid discussion with the guys who are safeguarding the data for over 80,000 businesses — including 67% of the Fortune 500 — as they share best practices and insights.

      Here's what they'll discuss:
      -How to get executives and users to care about security and compliance
      -Top of mind security or compliance issues (and tackling them)
      -The toughest challenges they faced

      Read more >
    • IBM, Cloud Raxak, and Intel Secure the Hybrid Cloud with Automated Compliance
      IBM, Cloud Raxak, and Intel Secure the Hybrid Cloud with Automated Compliance Heather Hinton, CTO for IBM Security & Compliance; Sesh Murthy, Cloud Raxak CTO; Raghuram Yeluri, Principal Engineer Recorded: Jan 19 2016 6:00 pm UTC 62 mins
    • Heather Hinton, CTO for IBM Security and Compliance Architecture & Innovation, Sesh Murthy, Cloud Raxak CTO, and Raghuram Yeluri, Intel Security Architect, will discuss how to secure applications across the hybrid cloud through automated compliance. Automated security compliance can reduce cloud security costs up to 50% while also reducing the risk of a security breach. They will discuss the best ways to leverage cloud computing, while staying compliant with the security requirements of regulated industries including financial services, retail, healthcare, and more.

      The Hybrid cloud is being embraced by a majority of enterprises of all sizes. A recent survey shows that 74% of enterprises have a hybrid cloud strategy, and 94% of enterprises are using some form of XaaS--software, platform, and infrastructure as a service.

      The challenge in moving workloads to the Cloud, has been the cost and complexity of ensuring initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical to maintaining positive ROI.

      Raxak Protect is an automated security compliance SaaS platform and managed service, that enables cloud apps to be deployed securely, quickly, cost-effectively, and without human error, across both private and public clouds.

      In this webinar, IBM and Cloud Raxak will describe how:

      1. To secure IBM dedicated and shared hybrid cloud solutions using Raxak Protect automated compliance.

      2. To deliver audit-ready evidence of security compliance for any workload including regulated workloads in finance (FFIEC), healthcare (HIPAA) and Retail (PCI).

      3. Raxak Protect leverages hardware features like Intel Cloud Integrity Technology to create an immutable root of trust for assured compliance.

      Reserve your seat today!

      Read more >
    • Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe
      Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe Armin Schneider ; Olaf Mischkovsky Upcoming: Jul 13 2018 9:00 am UTC 75 mins
    • Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe, schaffen Sie Transparenz und sparen Sie wertvolle Zeit

      Symantec Control Compliance Suite liefert geschäftsrelevante Sicherheits- und Risikoinformationen, mit denen Sie Prioritäten für die Bereiche Sicherheit, IT-Betrieb und Compliance effektiv abstimmen können. Bewertungen erfolgen fortlaufend und automatisiert. Sie erhalten damit eine Gesamtübersicht über Sicherheitskontrollen und Sicherheitslücken. Auf diese Weise sind Sie in der Lage, das Rechenzentrum zu härten, die Behebung von Sicherheitsvorfällen zu priorisieren, sicher auf ein Software-Defined Data Center umzustellen sowie kontinuierliche Bewertungen für die Cyber-Sicherheit und die fortlaufende Überwachung zu unterstützen

      Read more >
    • The Importance of Information Governance for Compliance Departments
      The Importance of Information Governance for Compliance Departments Bill Coffin, Editor-in-Chief, Compliance Week and John Pepe, eDiscovery, Compliance, and Analytics Specialist, HPE Recorded: Oct 25 2016 6:00 pm UTC 59 mins
    • The emerging practice of Information governance (IG) is becoming increasingly important to the role of compliance personnel—much in the same way that cyber-security has in recent years. In the first survey of its kind, Hewlett Packard Enterprise, in conjunction with Compliance Week, examined the costs, challenges, and opportunities facing IG compliance and would like to share this data with you.

      Join Compliance Week editor-in-chief Bill Coffin and John Pepe, Hewlett Packard Enterprise eDiscovery, compliance, and analytics specialist, as they discuss the results and implications of this survey. They’ll look at the nature of IG risk organizations face; the average annual economic cost resulting from IG non-compliance; what resources organizations devote toward IG; and what organizations felt they needed to manage IG more efficiently. They’ll further share the IG nuances between those organizations that reported fines and sanctions and those who received none.

      Please note: CPE credit is not available with this recording.

      Read more >
    • How well is your sanctions compliance process working?
      How well is your sanctions compliance process working? Huntswood, SWIFT Recorded: Jun 14 2018 12:00 pm UTC 60 mins
    • Join SWIFT and Huntswood for an interactive discussion to help you address your sanctions compliance challenges.

      In many markets regulators now require you to screen transactions and customers against a number of rapidly evolving sanctions lists.

      Automated filtering tools, while effective, will generate false positives and false negatives. Follow up investigations must be conducted manually, which is time consuming and risky.

      This webinar will explain how implementing best practices can help you fulfil auditing and transparency requirements while also improving operational efficiency and reducing costs.

      In addition, we will cover how to:

      - Address evolving sanctions regulatory requirements
      - Simplify conversations with regulators
      - Balance internal resources for effectiveness and efficiency
      - Optimise global and internal list management
      - Upgrade your screening platforms without disrupting business operations

      Meet the panellists

      - Graham Hooper, Huntswood FCR Advisory Panel Member (formerly Director of Financial Crime Risk at Lloyds Banking Group)
      - Stephen Elliot, Managing Director of Financial Crime, Information and Payments, Huntswood
      - Tony Wicks, Head of AML and Fraud Prevention Initiatives, SWIFT (moderator)

      Date: Thursday, 14th June | Time: 13:00 GMT

      Not sure you can join? You can still register as we will be sharing the recording following the event.

      Read more >
    • The A-Z of Cloud Compliance: Privacy Shield. EU GDPR. HIPAA. ISO 27001 & SOC2
      The A-Z of Cloud Compliance: Privacy Shield. EU GDPR. HIPAA. ISO 27001 & SOC2 Frank Krieger, Director of Compliance, & Dante Orsini, SVP of Business Development Recorded: Jan 26 2017 4:00 pm UTC 54 mins
    • Safe Harbour. EU GDPR, Privacy Shield. Brexit. Model Contract Clauses. And that’s just the international data. HIPAA, SOC2, ISO 270001, PCI.

      You’re just trying to keep the systems running and it seems like regulations are changing every day. And, if you’re like 60% of businesses, conservatively, that get audited each year, this may be your lucky year to open those IT books and prove you’ve been compliant all along.

      Quickly, your cloud footprint becomes critical. Whether running workloads on the cloud or ensuring your DRaaS meets compliance needs, this extension to your operating environment could land you in trouble if you’re not prepared.

      How can you set yourself up for success?
      Understand the rules up front – and the ways you can operate within them
      Set yourself up with the right documentation to address auditor questions
      Arm yourself with a team that has your back

      Don’t be the one caught in the audit net. iland’s Director of Compliance, Frank Krieger, has done everything from HIPAA attestations, international Privacy Shield structuring to Model Contract clauses and works with customers every day to ensure their cloud is always audit-ready. He’s joining us in a webinar!

      Read more >
    • GDPR: The Intersection of Compliance and Customer Satisfaction
      GDPR: The Intersection of Compliance and Customer Satisfaction Lewis Barr, General Counsel and VP, Privacy at Janrain, David Fowler, Head of Digital Compliance at Act-On Software Recorded: Aug 17 2017 8:00 pm UTC 57 mins
    • In the age of the customer and data hacks a brand’s reputation can come down to their ability to protect customer data. The transparency that will develop between brand and consumer with the upcoming General Data Protection Regulation (GDPR) will provide organizations with an opportunity to empower and build trust with their customer.

      Armed with a unified and single view of the customer, brands will be able to truly personalize the customer journey while maintaining compliance and securing customer data.

      Hear from Lewis Barr and David Fowler as they discuss how to turn the GDPR into business opportunity while focusing on the following topics:
      - Heightened consent requirements and consent lifecycle management
      - Expanded privacy notice requirements
      - Data subject access rights (SARs) and fulfillment requirements
      - Business exposure and liability for failing to meet these GDPR requirements
      - Practical next steps to achieve operational readiness

      About the Presenters:
      Lewis manages Janrain’s legal compliance and privacy functions as the company continues its international expansion. He brings more than 15 years of leadership in a wide range of legal and privacy-related matters for growing technology companies. Lewis also utilizes his diverse background as a litigator in private practice, federal appeals court staff attorney, and teacher.

      David is the Head of Digital Compliance at Act-On Software and is responsible for all issues pertaining to digital compliance, including email deliverability, privacy compliance, and industry stewardship in regard to our customers and our corporate objectives. David has over 20 years’ experience providing senior leadership in the marketing industry. In the last nine years, he has been strictly focused on issues associated with email marketing, deliverability, digital marketing, and privacy compliance.

      Read more >
    • How GCI Built Its Security and Compliance Program
      How GCI Built Its Security and Compliance Program Lisa Hartford - GCI, Sam Abadir - Lockpath Upcoming: Aug 2 2018 5:00 pm UTC 60 mins
    • General Communication Inc. (GCI), a telecommunications company based in Alaska, spent a year building its security and compliance program from the ground up. In this webinar, you'll see how GCI did it, starting with one person using the Keylight Platform, through challenges like creating new process and tearing down silos, to where they are by year-end: a fully engaged team leveraging Keylight to manage security and compliance.

      As a webinar attendee, you'll learn GCI's secret to:

      * Finding and training IT and security professionals
      * Developing new or streamlining existing processes
      * Scaling Keylight to address security and compliance requirements.

      Regardless of your program's status, hearing GCI's lessons learned can inspire and guide you in building or improving your company's security and compliance program. Register for this educational webinar today.

      Read more >
    • Streamlining Compliance Programs for Operational Security
      Streamlining Compliance Programs for Operational Security Tim White, Director of Product Management, Qualys Recorded: Apr 5 2018 5:00 pm UTC 52 mins
    • Learn to effectively navigate the security risks, new regulations, and new technologies on your journey to a secure and compliant digital transformation by participating in this Qualys webcast series.

      In this episode, Tim White, Director of Product Management at Qualys, will highlight the latest IT security and compliance challenges and discuss best practices to streamline compliance and risk programs using the Qualys Cloud Platform and its integrated Apps.

      You will learn some best practices on efficient ways to:
      -Assess security configurations of IT systems, wherever they reside
      -Log and track file changes across IT systems globally
      -Help security teams implement the CIS 20 Critical Security Controls
      -Automate collection and reporting of compliance data for both technical and non-technical controls
      -Automate and standardize vendor risk assessment

      Read more >