During this presentation, you'll learn more about a method to manage cyber risk strategically. Organizations need to focus on the areas most at risk and where they can get the best value for their cyber security investments. Approaching this strategically allows the organization to engage with internal and external stakeholders about cyber risks.Read more >
In this webinar we will review best practice risk reporting and how to design company-wide risk reporting that focuses on providing insight rather than data or information. These approaches provide enough detail to enable informed decision making at all levels without overburdening recipients with superfluous information.Read more >
This event is designed for Heads of ERM, ERM Directors, ERM Managers, and other direct reports of the Chief Risk Officer. It is designed to teach the basics and also best practices of conducting a successful risk assessment workshop plus tactics for impactful workshop facilitation. Participants will learn a number of tactical ERM practices that can be implemented immediately.Read more >
Join us to review the emerging risks for 2015 as executives facing an environment of unprecedented volatility: market conditions change rapidly and new risks continue to proliferate. To navigate the continually changing and complex risk environment,
The webinar will be led by Ian Beale, Senior Director, CEB Risk
Risk and risk management is pervasive throughout organisations. There are many departments that manage risk and have their unique understanding, models, and views into risk. This makes enterprise and operational risk management a challenge. Organisations fail in enterprise risk management strategies when they force everyone into one flat view of risk, they also fail when they allow different views of risk but do not do risk normalisation and aggregation as they roll-up risk into enterprise reporting.
This webinar details how organisations need to take a federated approach to risk management that allows different departments some level of autonomy and supports their department level risk management strategies but also enable a common information and technology architecture to support overall risk management activities and reporting.
This ‘Expert’ presentation will address the following:
Where and how enterprise risk management fails
How to build an enterprise risk register and show interrelationships of risk
The value of an information and technology risk management architecture
Approaches to risk normalisation and aggregation for accurate enterprise risk reporting.
Organisations across all sectors are dealing with a growing array of third party/vendor relationships. Even obscure supplier relationships can have significant impact on security, risk and compliance. The Target credit card breach is one example in which a heating and air conditioning supplier was the doorway in to a significant breach of a point of sale system and theft of credit card data. Organisations have to manage risk across their third party supplier relationships but are limited in the resources they can devote to this.
This 'Expert' webinar will address the following:-
o Understand the growing array of third party relationships
o The impact of third party relationships on security, risk and compliance
o Elements of an effective, efficient, and agile vendor risk management process
o How other areas of the organisation can leverage a common approach to third party risk management
Attend this webinar if:-
o You are concerned by the growing number of third party supplier relationships
o You realise your risk and compliance exposure is growing because of these relationships
o You need to be able to manage supplier risk but cannot recruit more staff to do so
o You desire the need to know how to keep current in a dynamic environment of third party relationships
Don't understand the ISO-27001 ISMS standard? Watch our video here for help.Read more >
Don't understand the DPA? Watch our video here for help.Read more >
Don't understand the PCI? Watch our video here for help.Read more >
Regulations, examiners, internal and external auditors, as well as customers increasingly probe your business for details about your risk management practices. You are challenged to provide reports, Key Risk Indicators, status updates, and other evidence of IT Governance and risk management to satisfy them all in addition to the demands of your own management who wants to know what value all this effort returns to customers, shareholders, and stakeholders.
Will automation help you align your effort with those of IT Security, with operating goals, and with customers?
This discussion will identify what level of automation you need and when; what you can expect in results and experience, and how you can use automation to strengthen business alignment and contributed value through your risk program.
This presentation will discuss the challenges and benefits of developing and managing an Operational Risk Management Program (ORMP). With availability and BC/DR being key elements of operational risk the presentation will demonstrate how an effective ORMP can benefit the acceptance and visibility of BC/DR to management. The presentation will also include a process and approach that can form the basis for an organization's ORMP.Read more >
So, big data huh? Over the past twelve months it hasn't been hard to notice that "big data" has become a huge fad. In fact, the backlash against its use has already begun before most of us could even figure out how to take advantage of it.
This presentation is your chance to learn about how to successfully use big data and avoid big mistakes rolling out a "big data" program. Alex Hutton works in Risk & Security for a large financial institution. This F.I. has been utilizing a big (1.2 petabytes and counting) Data Warehouse for Security & Fraud for several years. He will discuss what it is, how to start a program, and how security organizations can start getting value from an investment in data and analytics.
Join Alex Hutton as he shares what makes an effective risk management program, how to set up a big data program that works and why risk management always fails.Read more >
How safe is your organization? With many recent, highly-publicized security breaches, it’s clear that we’re all at risk. Join Experis for a complimentary webinar designed to provide insights into some key underlying causes that link recent breaches. Plus, learn what strategies your organization can adopt to successfully manage information risks in this era of increasing breaches.
Hacking has literally become a global business, with personal data at the top of the list of commodities being put up for sale. With all the breaches in the news, many media outlets have focused on the susceptibility of companies to malware, while ignoring other critical flaws that likely contributed to the success of these breaches. Among these are failures in common IT processes such as change management, software release control, and access control to production environments. A common thread in these flaws is most often the lack of effective governance and oversight of the information risks inherent in these processes. Recognizing how they impact your organization, and taking appropriate actions, are critical steps in reducing your vulnerability to security breaches.
By participating in this webinar you will:
• Learn about some common flaws in security and IT practices that connect recent security breaches.
• Understand the critical role a partnership between Security and Internal Audit has in breach prevention.
• Recognize the evolving role of security governance and internal audit’s role.
• Identify some practical steps your information security and audit teams can take to reduce risk.
• Gain insights and recommendations to integrate proven security strategies in your organization.
Your experts for this informative webinar are Mike Gerdes, Director, Information Security Center of Expertise, Experis, and Molly Talafuse, Manager, IT Risk Advisory Practice, Experis.
Join us and discover the best in current risk reporting practices while also learning how to use common risk reporting tools. Find out, too, how to design a report that delivers the information your organisation really needs to enhance its decision makingRead more >