Bringing Order to the Chaos of Operational Risk Management
Operational risk management (ORM) is a growing discipline within an organization’s integrated risk management programs. Its practices identify how the daily managed activities in businesses and external events impact strategic goals, value creation and operations. In this fast-paced webinar, Lockpath’s Sam Abadir will share how to get the most from your ORM programs. Specifically, you’ll learn how:
• Current trends and challenges in risk management are addressed with ORM processes
• Daily managed activities and external events impact overall business operations and strategic goals
• One organization is using a governance, risk management and compliance (GRC) solution to create value
• You can leverage a GRC platform to bring order to all this chaos.
RecordedJan 2 201855 mins
Your place is confirmed, we'll send you email reminders
Audits provide a vital checks and balances function in an organization. But what if audit's role as the third line of defense was more efficient and strategic? Doing so would enhance the role of the internal auditor. In this live webinar, Lockpath's Sam Abadir will share the roadmap to smarter audits, including:
• Critical capabilities required for the audit process
• Importance of customizing messaging to stakeholder audiences
• The pros and cons of current audit management strategies
• Strategic, effective audits that can scale with future growth
More strategic and effective audits won't come from current processes. Discover the road to smarter audits by attending this educational webinar. Register now!
General Communication Inc. (GCI), a telecommunications company based in Alaska, spent a year building its security compliance program from the ground up. In this webinar, you'll see how GCI did it, starting with one person using the Keylight Platform, through challenges like creating new process and tearing down silos, to where they are by year-end: a fully engaged team leveraging Keylight to manage security compliance.
As a webinar attendee, you'll learn GCI's secret to:
* Finding and training IT and security professionals
* Developing new or streamlining existing processes
* Scaling Keylight to address security compliance requirements.
Regardless of your program's status, hearing GCI's lessons learned can inspire and guide you in building or improving your company's security compliance program. Register for this educational webinar today.
Organizations with mature, enterprise-wide information security risk management programs enjoy a competitive advantage, thanks to ISO 27001 certification that signifies an international standard for safeguarding information. In this webinar, Lockpath's Jason Eubanks, a governance, risk management, and compliance (GRC) consultant and former ISO auditor, will share the business case for earning ISO 27001 certification and the critical role of a GRC platform in implementing a successful information security management system (ISMS).
• Challenges and pitfalls with ISO 27001 certification
• Tips on establishing and maturing an ISMS
• Strategies for preparing and passing ISO audits
• Technology's role in earning and maintaining certification
Learn how ISO 27001 can give you a competitive advantage and strategies for earning certification. Register now to attend this educational webinar.
Vendor risk management programs are under intense pressure due to the growing reliance on third parties and the increased regulatory focus on privacy and cybersecurity. Our expert panel discussed the current challenges and opportunities with managing third parties. They brought a regulated industry perspective and shared how users can get more from Keylight.
Business interruptions can upset customers, cost sales, and put companies in a bad light. That's where business continuity management (BCM) comes in. A BCM plan details the impact of various disaster scenarios and formalizes steps for ensuring critical operations remain open during a crisis. In this live webinar, Lockpath's Sam Abadir will share a roadmap to smarter business continuity management.
* The role of business continuity management on operations
* How to identify risks that could potentially lead to disruptions
* Strategies for modeling the business impact of various disasters
* Importance of mapping plans to risk, controls, processes, and vendors
Learn how to better prepare your recovery plans by attending this webinar on smarter business continuity management. Register now!
After your organization has identified an event, how do they identify and record the actual playbook response? In this session, you will see an incident response program intended to reflect the defined example playbooks for common information security based incidents, as well as related or dependent processes that support other GRC processes.
Lack of control over privileged access to systems and data presents a significant risk to almost every organization. What is required to protect privileged accounts? Are you in control? Do you have an effective Privileged Access Management (PAM) program? This session discussed how to assess the current state of your PAM program, develop a road map to meet your desired target state, and select the right PAM solution to help you gain better control over privileged access.
Tom Garrubba - Santa Fe Group / Shared Assessments
The role of third party vendors in the operations of organizations is expanding and the industry stresses that data protections and privacy is paramount. This session discussed current threats and how your organization and third-party vendors should address those risks while meeting or surpassing compliance and regulatory expectations, technological challenges, due diligence prior to your business relationships with vendors, and understanding the potential risks services providers present as well as the steps to minimize your data risk.
Scott Breece - Community Health Systems, Sam Abadir - Lockpath
In this webinar, Lockpath’s Sam Abadir and Community Health System’s Scott Breece will discuss the unique IT landscape of the healthcare industry and the challenges this presents for IT risk management.
Abadir and Breece will discuss common strategies for identifying and managing IT risks including risk assessment methodologies, best practices for assessing business associates and third parties, incident response plans, and available toolsets to support these activities.
Scott Steinhardt - Kinney Services, Chris Swift, Lockpath
For healthcare providers that receive Medicare and Medicaid reimbursements, managing exclusion risk is critical. Employees, business associates, suppliers, and more who land on state exclusion lists while employed or engaged by a provider can result in severe regulatory penalties. In this educational webinar, Lockpath and Kinney Services will guide you through the world of exclusion risk and point out what you need to know.
Attendees will learn:
* A definition of exclusion risk with real-world examples
* Challenges encountered with managing exclusion risk
* Strategies for implementing a consistent, repeatable review process
* Technology's role in streamlining exclusion risk management
Are you continually reviewing the exclusion status of employees and business entities? If not or reviews are conducted haphazardly, you run the risk of regulatory penalties and a potential crisis in the reimbursement process. Discover what you need to know to managing exclusion risk in this educational webinar.
Lockpath, a leader in integrated risk management solutions, helps companies understand and manage risk. Subscribe to the Lockpath channel for educational webinars exploring a wide range of topics such as risk management strategies, information security best practices, industry and regulation insights, and more.