Hi [[ session.user.profile.firstName ]]

Applying Key Business Continuity Techniques to Operational Risk Management

In this fast-paced webinar led by Troy Harris, CBCP and leader of RSM’s Business Continuity Planning consulting practice, you’ll learn strategies for managing operational risk through the lens of business continuity planning. Specifically, you’ll learn:

BCP strategies for improving operational risk management
RSM’s methodology for BCP
The five phases of business continuity planning
How a GRC platform plays a role in business interruption planning
Don’t miss this opportunity to view operational risk management from the perspective of business continuity planning and the insights attendees will gain in this one-hour webinar.
Recorded Dec 22 2017 50 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Troy Harris - RSM; Sam Abadir - Lockpath
Presentation preview: Applying Key Business Continuity Techniques to Operational Risk Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Making Risk Meaningful May 24 2018 4:00 pm UTC 60 mins
    Adam Billings, Lockpath
    How do you make sense of all that risk data your organization collects? Imagine not only analyzing risk data more efficiently but also bringing meaning to risk. It's possible. It takes leadership, alignment, standardization, and a clear risk methodology to discover connections in data. In this webinar, we'll share how to go about making risk meaningful. You'll learn:

    · Common methodologies for interpreting risk

    · Status of risk management in your organization

    · Frameworks and strategies for seeing risk in a new light

    · Keys to success in advancing your risk program

    There's no shortage of data collected. What's in short supply is, what does it all mean? Explore what works and what's possible in this educational webinar.
  • Roadmap to Smarter Vendor Risk Management May 3 2018 4:00 pm UTC 60 mins
    Vendors are essential to your company's success; however, they also add a layer of risk. A data breach is often traced to a service provider. A supplier botches a shipment and upsets a key customer. For risk challenges with vendors, the answer is proactive vendor risk management. In this webinar, you'll learn the roadmap to smarter vendor risk management, including:

    · Guidance on managing collected vendor data
    · Time-saving features with assessments
    · Tips on spotting trends and high-risk vendors
    · Pros and cons of continuous monitoring
    · Impact of vendor risk on operational risk

    Don't wait for an incident or a high-level exec questioning your vendor risk management processes to get smarter about vendor risk management. Learn smart strategies for the road ahead in VRM. Register for this webinar.
  • 7 Ways the Digital Risk Revolution Changes Risk and Compliance Apr 25 2018 4:00 pm UTC 60 mins
    James Chappell - Digital Shadows; Tony Rock - Lockpath
    Organizations are embracing digital transformation to deliver new revenue opportunities to their businesses. Alongside these new opportunities are new digital risks that are emerging as more corporate information is managed beyond the traditional network boundary. This changing business landscape is leading organizations to rethink compliance and security for employees, business partners and customers alike.

    Traditional approaches to threat intelligence focus on the technical criteria and are used in combination with other technical security tools such as Security Incident & Event Management (SIEMs.) While a step in the right direction, SIEMs are often applied within the network perimeter and do not effectively support a robust corporate risk and compliance program in managing these new digital risks.

    To meet regulatory mandates from SOX, PCI DSS, HIPAA, GDPR and others that address these new risks, organizations need to take a different approach to understanding threats, data loss, and vulnerabilities across this new digital domain.

    In this webinar, Digital Shadows’ James Chappell discusses current digital risk trends and challenges, and Lockpath’s Tony Rock will explore how applying existing governance, risk management and compliance (GRC) frameworks and integrations can be effective.

    During this session, attendees will learn:

    · The building blocks of digital risk management: data loss, cyber threats, brand and social media exposure, VIP risks, third party exposure, physical exposure and infrastructure exposure

    · How people, processes and technologies can stay on top of emerging threats

    · Best practices and use cases for digital risk management and compliance

    · How a GRC platform enables better risk assessment and mitigation
  • Roadmap to Smarter IT Risk Management Recorded: Apr 5 2018 47 mins
    Sam Abadir - Lockpath
    The latest data breach or vulnerability may capture headlines and prompt speculation, but where the rubber meets the road is being smarter about IT risk management (ITRM). In this webinar, you'll learn what being wiser entails, including:

    · What IT and security disciplines ITRM encompasses
    · How to tailor your ITRM message to different departments
    · Strategies for working with cross-functional teams
    · Advantages and disadvantages of using spreadsheets
    · Quick wins and ideas for sustained growth

    Don't wait for a breach or a vulnerability to get smarter about ITRM. Learn what you need to know to get where you're going. Register for this webinar.
  • Reg Watch: Cyber Risk in the Supply Chain - NERC CIP-013-1 Recorded: Apr 3 2018 60 mins
    Patrick Miller - Archer Energy Solutions; Tony Rock - Lockpath
    Managing cyber risk in the supply chain is a requirement for protecting our critical infrastructure. As a result, the North American Electric Reliability Corporation (NERC) has introduced reliability standard CIP-013-1 to help Utilities and their vendors understand and mitigate these risks. In this webinar presented by Archer Energy Solutions and Lockpath, we'll explore strategies and best practices for managing supply chain risk and how you can prepare for when CIP-013-1 is enacted. As a webinar attendee, you'll learn:

    · Potential impact CIP-013-1 will have on both utilities and their vendors
    · Risk program maturity requirements for advanced cybersecurity
    · Strategies for managing supply chain risk holistically
    · Steps to take now to strengthen your supply chain cyber security

    Whether you are a utility provider or provide for utilities, discover what you should know and do about NERC CIP-013-1 and supply chain cyber risk in this webinar.
  • Innovation in User Experience: Keylight Bulk Operations Recorded: Mar 27 2018 38 mins
    Michael Rasmussen - GRC 20/20, Sam Abadir - Lockpath
    Join the GRC Pundit, Michael Rasmussen and Lockpath’s Sam Abadir for a 60-minute webinar as we review the capabilities of Lockpath’s Bulk Operations solution, winner of the 2015 GRC 20/20 Award for Innovation in User Experience for IT GRC.

    Information security operations often are encumbered by processes that take extensive time to modify and update. When mass changes need to take place, it is time consuming to go into each record and modify and manipulate data. For example, when vulnerability scanners report finding assets that are about to be decommissioned, action items in remediation will be a waste of time. Another example is when a business division splits or is dissolved and IT assets and security records needs to be reassigned to one division or another. Lockpath’s Bulk Operations is an innovative solution that makes it easy and intuitive for organizations to manage bulk changes to IT GRC data. Lockpath clients can now easily identify data that needs some sort of change, whether it’s a change in the value of a single or multiple fields, the addition of new fields, the removal/deletion of existing fields, or shifting workflow and tasks. This saves organizations hours of work because the feature is built into the ad hoc reporting engine, organizations can easily and quickly filter data sets they want to edit.
  • Innovation in GRC 360 Contextual Awareness: Lockpath Keylight Ambassador Recorded: Mar 20 2018 28 mins
    Michael Rasmussen - GRC 20/20, Sam Abadir - Lockpath
    Join the GRC Pundit, Michael Rasmussen and Lockpath’s Sam Abadir for a 60-minute webinar as we review the capabilities of the Lockpath Keylight Ambassador, winner of the 2015 GRC 2020 Award for Technology Innovation in Enterprise GRC Integration.

    Organizations need to move beyond the concept of a GRC platform and focus on an integrated view of GRC data and systems through a GRC architecture that is a cohesive part of the broader business fabric of the organization. This is what GRC 20/20 refers to as 360° GRC contextual awareness. Where risk and compliance is monitored and understood in the course of business operations, changing risks and regulations, and interactions. Delivery of GRC contextual awareness requires that GRC be a central nervous system to capture signals found in processes, data, and transactions as well as changing risks and regulations for interpretation, analysis, and holistic awareness of risk in the context of business. Lockpath Keylight Ambassador is a GRC solution that offers a hybrid agent architecture that enables organizations to collect distributed GRC related data from applications installed across the organization and in the cloud. Keylight’s Ambassador innovation and advancement of GRC technology is its ability to securely and automatically transmit on premise data to the cloud from business systems and information security tools.
  • Mature Compliance: Increase GRC User Adoption Recorded: Mar 14 2018 39 mins
    Deborah Cheek - CRFS, Sam Abadir - Lockpath
    Prior to the implementation of the Keylight Platform, Claims Recovery Financial Services’s (CRFS) policies and procedures were scattered throughout the organization’s networks. With a vast number of compliance requirements and multiple client audits each year, the company’s existing policy and compliance management process was inefficient and costly.

    In this 60-minute webinar, Deborah Cheek, CISO at CRFS, will discuss with Sam Abadir how implementing the Lockpath Keylight Platform transformed CRFS’ policy management and compliance program, streamlined its internal policy management process, increased user adoption of its GRC program, and ultimately helped the company gain a competitive advantage.
  • Roadmap to Smarter Compliance & Policy Management Recorded: Mar 8 2018 45 mins
    Sam Abadir - VP of Industry Solutions, Lockpath
    In our uncertain regulatory climate, complying with regulations and managing policies demand that organizations be adaptable. For firms that are still using office tools like word processors, spreadsheets and emails, the challenge to adapt is even greater. In this live webinar, Lockpath’s Sam Abadir will share a roadmap to smarter compliance and policy management.

    Attendees will learn:

    • What compliance and policy management encompasses
    • Communication strategies for working with cross-functional teams
    • How organizations are bringing automation to manual processes
    • Low-hanging fruit for quick wins and ideas for sustained growth

    The road ahead is uncertain and demands that organizations adapt. Why stop there? Keep going to reach a better place with your compliance and policy management program. Explore what you need to know in this educational webinar.
  • Determining the Right Level of Security Recorded: Feb 28 2018 26 mins
    Brandy Peterson - GuidePoint Security; Sam Abadir - Lockpath
    In the era of cloud computing, organizations are moving their IT workloads to various cloud providers at an increasing pace. However, there remain many cybersecurity concerns to cloud adoption that prevent organizations from fully leveraging the benefits of the cloud. Your due diligence should include compliance requirements, frameworks and guidance, controls, cloud security architecture and cloud deployment model. In this webinar, we will explore key questions that organizations should answer before moving to the cloud and the steps to ensure a successful transition to the cloud.
  • How to Buy a GRC Platform Recorded: Feb 22 2018 57 mins
    Adam Billings - Principal Consultant, Lockpath
    Buying a GRC platform isn’t so much about sizing up the options as it is about analyzing your company’s needs. After that, it’s about knowing which questions to ask vendors and how to evaluate their offerings while keeping business processes front and center. In this webinar, we’ll share how to self assess needs and benchmark your GRC maturity. Throughout the hour, we’ll offer buyer’s tips and empower you to buy the GRC platform that’s right for your company.

    In this webinar, you will discover:

    • How to assess your organization and determine what type of platform is right for you
    • What questions to ask when evaluating GRC vendors
    • Tips for building a business case for a GRC platform and estimating potential ROI

    In our increasingly competitive and digital world, organizations need to evolve to be more competitive. For many, an untapped resource is GRC and its role in increasing efficiency and organizational resiliency. Explore what’s possible in this educational webinar.
  • You are PCI compliant, but are you secure? Recorded: Feb 20 2018 61 mins
    Paul Calatayud
    You’ve fulfilled the minimum requirements to comply with PCI DSS. But guess what? You still might be vulnerable to a credit card data breach. As we’ve witnessed with recent high-profile cases, companies that are PCI compliant are not necessarily immune to attacks.

    So if compliance isn’t enough to guarantee security, how do companies minimize the risk of a data breach?
    Join us for a one-hour webinar led by Paul Calatayud, chief information security officer at SureScripts and information security instructor for the SANS Institute. This free session will explain why compliance doesn’t necessarily mean your organization’s PCI data is secure.

    The session will also cover the following areas:

    Determining who’s responsible for PCI security
    Third-party security practices
    How a risk-based security approach augments compliance
  • Achieving Compliance Agility with a Harmonized Controls Framework Recorded: Feb 15 2018 60 mins
    Lynn Heiberger - Unified Compliance; Sam Abadir - Lockpath
    In our uncertain regulatory climate, it’s essential for compliance to remain flexible. One way to achieve this is by implementing a harmonized controls framework. In this webinar, Lockpath and Unified Compliance will explore the growing need for harmonized controls and how this type of controls framework can bring agility to compliance--a necessity in a time of regulatory uncertainty.

    Attendees will learn:
    • The concept and reasons for using a single controls framework
    • How one organization quickly addressed updated regulatory guidance using a harmonized controls framework
    • How to achieve compliance agility with harmonized controls and an integrated risk management platform
  • Guidance for Third Parties in Business Continuity Plans Recorded: Feb 13 2018 54 mins
    Tom Garrubba - Shared Assessments; Sam Abadir - Lockpath
    Vendors and third parties are extensions of an organization and thus, business continuity and third-party risk management are intertwined. Companies of all sizes need to ensure their essential business functions remain available during disruptive events, especially when those functions depend on vendors and third parties. Furthermore, an organization’s business continuity plan must include scenarios when crisis events may impact its ability to exchange information or provide services to third parties.

    In this 60 minute webinar, Tom Garrubba, Senior Director, Shared Assessments, and Lockpath’s Sam Abadir provide an overview of why vendors pose a business continuity risk. The session will include strategies and best practices for including vendors in business continuity plans and questions organizations should be asking third parties to prepare their BC plans.
  • Vendor Risk Management with the Lockpath Keylight Platform Recorded: Feb 9 2018 2 mins
    Keylight from Lockpath empowers you to manage the entire third-party lifecycle in one platform.
  • OCC Bulletin: Risk Management Principles Recorded: Feb 8 2018 38 mins
    Sam Abadir - Lockpath
    Introducing new products and services or modifying existing ones is the lifeblood of any bank. That said, a recent OCC Bulletin conveys a related urgency. Products and services should not just follow plans and strategies but also utilize sound risk management principles. In this webinar, we’ll dive into those principles and the implications of the bulletin.

    As an attendee, you’ll learn:
    • Overview and ramifications of OCC Bulletin 2017-43
    • Risk management principles applicable to bank products and services
    • Key themes and trends related to banking innovation and customer preferences
    • Challenges banks face in addressing key themes/trends
    • How GRC technology supports a bank’s integrated risk management program

    2018 will be a banner year for banks to introduce new or updated products and services. How well you manage risk, be it strategic, reputational, credit, liquidity, operational, or compliance, will greatly determine the degree of success. Learn to manage bank risk in this webinar.

    Register now.
  • Heartland Payment Systems and Business Continuity with the Keylight Platform Recorded: Feb 5 2018 52 mins
    Ken Voiles - Heartland; Sam Abadir - Lockpath
    In 2014, Heartland Payment Systems discovered through a survey of its entire management team that one of its top two risks was business continuity. Addressing this issue was no small task. As one of the nation’s largest payment processors, Heartland employs more than 5,000 people in more than 50 facilities across the U.S., all of which required business continuity plans.

    In this webinar, Ken Voiles, senior business continuity analyst at Heartland, along with Sam Abadir, Lockpath’s director of product management, will explain the steps Heartland took to develop BC plans in its U.S. operations. They will also highlight how the company used the Keylight Platform to minimize the risk of disruptive events on its business, and how the platform’s scalability will enable the company to expand the initiative to its global operations.
  • Business Continuity Management with the Lockpath Keylight Platform Recorded: Feb 5 2018 2 mins
    Create detailed, up-to-date business continuity and disaster recovery plans for business interruptions all in one platform with Keylight from Lockpath.
  • A New Approach to IT Risk Identification Recorded: Jan 30 2018 24 mins
    Sam Abadir - VP of Industry Solutions, Lockpath
    Risk management often takes on different forms throughout the business. Some approaches are very strategically focused, some are very technology focused and some are even missing. During this webinar, Lockpath’s Sam Abadir will discuss how IT departments can identify risks in a way that is not only meaningful to their operations but also meaningful to other parts of the business. Abadir will talk about how this approach not only improves risk management but also makes IT a more valued part of the business.
  • OCC 2018 Part 3: Change Management to Address New Regulations Recorded: Jan 25 2018 31 mins
    Sam Abadir, Director of Product Management, Lockpath
    The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. A top priority is change management to address new regulation requirements. Whether you’re a banker or service provider to the financial industry, you may be aware of updated or new regulations like the National Flood Insurance Reform Act of 1994, the Military Lending Act, and the Prepaid Card Rule. In this webinar, you’ll learn what OCC’s Compliance and Community Affairs (CCA) Department intends to focus on and the role of technology in managing compliance and risk.

    Attendees will learn:

    • What to consider when designing, operating or improving their change management process
    • The increased focus on fair lending from a quantity and quality perspective
    • Policies, procedures, and processes for credit offered under the Military Lending Act
    • What CCA examiners are looking for with banks relying on third-party relationships
    • How GRC technology supports compliance and integrated risk management programs

    Don’t miss this future focused webinar on an OCC priority for 2018. Make plans now to attend.
Put risk under new management.
Lockpath, a leader in integrated risk management solutions, helps companies understand and manage risk. Subscribe to the Lockpath channel for educational webinars exploring a wide range of topics such as risk management strategies, information security best practices, industry and regulation insights, and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Applying Key Business Continuity Techniques to Operational Risk Management
  • Live at: Dec 22 2017 1:40 pm
  • Presented by: Troy Harris - RSM; Sam Abadir - Lockpath
  • From:
Your email has been sent.
or close