During this presentation, you'll learn more about a method to manage cyber risk strategically. Organizations need to focus on the areas most at risk and where they can get the best value for their cyber security investments. Approaching this strategically allows the organization to engage with internal and external stakeholders about cyber risks.Read more >
Join us to review the emerging risks for 2015 as executives facing an environment of unprecedented volatility: market conditions change rapidly and new risks continue to proliferate. To navigate the continually changing and complex risk environment,
The webinar will be led by Ian Beale, Senior Director, CEB Risk
Risk and risk management is pervasive throughout organisations. There are many departments that manage risk and have their unique understanding, models, and views into risk. This makes enterprise and operational risk management a challenge. Organisations fail in enterprise risk management strategies when they force everyone into one flat view of risk, they also fail when they allow different views of risk but do not do risk normalisation and aggregation as they roll-up risk into enterprise reporting.
This webinar details how organisations need to take a federated approach to risk management that allows different departments some level of autonomy and supports their department level risk management strategies but also enable a common information and technology architecture to support overall risk management activities and reporting.
This ‘Expert’ presentation will address the following:
Where and how enterprise risk management fails
How to build an enterprise risk register and show interrelationships of risk
The value of an information and technology risk management architecture
Approaches to risk normalisation and aggregation for accurate enterprise risk reporting.
Organisations across all sectors are dealing with a growing array of third party/vendor relationships. Even obscure supplier relationships can have significant impact on security, risk and compliance. The Target credit card breach is one example in which a heating and air conditioning supplier was the doorway in to a significant breach of a point of sale system and theft of credit card data. Organisations have to manage risk across their third party supplier relationships but are limited in the resources they can devote to this.
This 'Expert' webinar will address the following:-
o Understand the growing array of third party relationships
o The impact of third party relationships on security, risk and compliance
o Elements of an effective, efficient, and agile vendor risk management process
o How other areas of the organisation can leverage a common approach to third party risk management
Attend this webinar if:-
o You are concerned by the growing number of third party supplier relationships
o You realise your risk and compliance exposure is growing because of these relationships
o You need to be able to manage supplier risk but cannot recruit more staff to do so
o You desire the need to know how to keep current in a dynamic environment of third party relationships
Regulations, examiners, internal and external auditors, as well as customers increasingly probe your business for details about your risk management practices. You are challenged to provide reports, Key Risk Indicators, status updates, and other evidence of IT Governance and risk management to satisfy them all in addition to the demands of your own management who wants to know what value all this effort returns to customers, shareholders, and stakeholders.
Will automation help you align your effort with those of IT Security, with operating goals, and with customers?
This discussion will identify what level of automation you need and when; what you can expect in results and experience, and how you can use automation to strengthen business alignment and contributed value through your risk program.
This presentation will discuss the challenges and benefits of developing and managing an Operational Risk Management Program (ORMP). With availability and BC/DR being key elements of operational risk the presentation will demonstrate how an effective ORMP can benefit the acceptance and visibility of BC/DR to management. The presentation will also include a process and approach that can form the basis for an organization's ORMP.Read more >
So, big data huh? Over the past twelve months it hasn't been hard to notice that "big data" has become a huge fad. In fact, the backlash against its use has already begun before most of us could even figure out how to take advantage of it.
This presentation is your chance to learn about how to successfully use big data and avoid big mistakes rolling out a "big data" program. Alex Hutton works in Risk & Security for a large financial institution. This F.I. has been utilizing a big (1.2 petabytes and counting) Data Warehouse for Security & Fraud for several years. He will discuss what it is, how to start a program, and how security organizations can start getting value from an investment in data and analytics.
Join Alex Hutton as he shares what makes an effective risk management program, how to set up a big data program that works and why risk management always fails.Read more >
How safe is your organization? With many recent, highly-publicized security breaches, it’s clear that we’re all at risk. Join Experis for a complimentary webinar designed to provide insights into some key underlying causes that link recent breaches. Plus, learn what strategies your organization can adopt to successfully manage information risks in this era of increasing breaches.
Hacking has literally become a global business, with personal data at the top of the list of commodities being put up for sale. With all the breaches in the news, many media outlets have focused on the susceptibility of companies to malware, while ignoring other critical flaws that likely contributed to the success of these breaches. Among these are failures in common IT processes such as change management, software release control, and access control to production environments. A common thread in these flaws is most often the lack of effective governance and oversight of the information risks inherent in these processes. Recognizing how they impact your organization, and taking appropriate actions, are critical steps in reducing your vulnerability to security breaches.
By participating in this webinar you will:
• Learn about some common flaws in security and IT practices that connect recent security breaches.
• Understand the critical role a partnership between Security and Internal Audit has in breach prevention.
• Recognize the evolving role of security governance and internal audit’s role.
• Identify some practical steps your information security and audit teams can take to reduce risk.
• Gain insights and recommendations to integrate proven security strategies in your organization.
Your experts for this informative webinar are Mike Gerdes, Director, Information Security Center of Expertise, Experis, and Molly Talafuse, Manager, IT Risk Advisory Practice, Experis.
Join us and discover the best in current risk reporting practices while also learning how to use common risk reporting tools. Find out, too, how to design a report that delivers the information your organisation really needs to enhance its decision makingRead more >
A great many enterprises leverage the Cloud Security Alliance Cloud Controls Matrix as a primary component for identifying cloud service provider risks. What’s also needed is a way to measure these risks. This session will focus on building a risk rating framework and on better quantifying and operationalizing risk management activities.
Presenter: Derick Fogt, IT Risk Management, Cisco Systems
Understand how Oracle Financial Services Model Risk Management provides enterprise-wide model information via a single instance and facilitates effective management of model risks by enabling identification and mitigation of risks. The Webcast will also discuss the major challenges that organizations are currently dealing with in regards to model risk management. It will also provide suggestions and examples of how organizations can appropriately address these challenges.Read more >
Managing cyber risk isn’t just about protecting your own house. As we’ve learned from Target and other major breaches, organizations must also be diligent in overseeing risks to vendors, business associates, and other third parties that have access to sensitive data or provide important services. For credit unions, regulatory pressure and cost concerns can make this a daunting task.
Fortunately, there are several cost-effective, proactive measures organizations immediately take to mitigate third party cyber risk. Join Jacob Olcott, VP of Business Development at BitSight Technologies as he discusses ways to get started on a vendor risk management program. Viewers will learn:
Five steps you can take immediately to mitigate third party cyber risk
The types of businesses in your supply chain that may pose risks
How BitSight Security Ratings streamline the process of vendor risk management
Information is both a risk and a critical resource when it comes to thinking about Business Continuity Management. A number of high profile data breaches have taken place recently that have hit the world’s media. They have occurred in many regions of the world and impacted millions of people. They involved public and private sector organisations and they resulted from accidents and losses as well as cyber attacks and security breaches. Less publicised and more numerous events seem to take place with regularity. They can involve information sources as diverse as hard copy files, electronic files, old hard discs, emails, text messages, x-rays, filing cabinets full of material and even the drives in photocopiers. In Europe organisations can be fined for such breaches and their names published on official websites, adding an additional cost of reputational damage to the pain felt. Also without accurate and up to date information it is nearly impossible to recover systems and processes quickly enough, something organisation and their customers have experienced in the recent past. Ask anyone in the UK and Ireland who couldn’t access their bank account a year or so ago how that impacted them and you will get an indication of the issue. These and other concerns surrounding the management of information related risks, including mitigation, and the use of information in recovery planning will be discussed at this webinar.Read more >
Sharing network access and sensitive information with your business
partners could be putting you at risk of third-party breach. These
breaches can be very damaging and may account for major losses in
data, time, and resources. If you’re looking for a better risk
management method, you’re not alone.
Watch this webinar to will learn more about:
- Security risks that could be facing your corporation today.
- How you can utilize selection criteria to build the best solution.
- Methods you can use to assess partner security risk.
- How to make better risk-based decisions by factoring in the security
posture of your organization.