Heartland Payment Systems and Business Continuity with the Keylight Platform
In 2014, Heartland Payment Systems discovered through a survey of its entire management team that one of its top two risks was business continuity. Addressing this issue was no small task. As one of the nation’s largest payment processors, Heartland employs more than 5,000 people in more than 50 facilities across the U.S., all of which required business continuity plans.
In this webinar, Ken Voiles, senior business continuity analyst at Heartland, along with Sam Abadir, Lockpath’s director of product management, will explain the steps Heartland took to develop BC plans in its U.S. operations. They will also highlight how the company used the Keylight Platform to minimize the risk of disruptive events on its business, and how the platform’s scalability will enable the company to expand the initiative to its global operations.
RecordedFeb 5 201852 mins
Your place is confirmed, we'll send you email reminders
As business risks and compliance mandates keep changing, audit teams are having a tougher time prioritizing audits, collecting information and performing analysis required to strengthen the business.
Businesses are facing more regulations and competitive pressures which increase the need for internal audit teams to provide an orderly approach for evaluating and improving the effectiveness of risk management, internal control, and governance processes to improve the organization.
Audit teams are being challenged by legacy audit processes that do not evolve at the same speed as business and regulations. These legacy audit processes include the use of spreadsheets, manual evidence requests, share drives and manual reports that often take weeks or months to complete.
In this live webinar, Lockpath’s Sam Abadir will share what audit management for 2020 and beyond looks like, including:
• What audit management encompasses
• How your organization can gain efficiency from proper audit management
• Advantages of managing audits and risk management efforts on an Integrated Risk Management or Governance Risk and Compliance platform
• Creating strategies for sustained growth in 2020 and beyond
Find out what you need to know to manage audit risk in 2020 and beyond by attending this educational webinar. Register now!
More than 80 percent of hacking-related breaches leverage stolen, default, or weak passwords, and compromising user credentials remains the easiest way for hackers to gain access to your systems and networks. The potential harm is even greater if those credentials belong to a privileged user.
So, what are leading organizations doing to manage this identity-related risk? The answer is Identity Risk Management – the process of integrating an IAM system with an Integrated Risk Management or GRC program. Identity Risk Management, when executed properly, allows for improved risk visibility, better risk-based decision making, and reduces enterprise risk management siloes.
In this 60-minute webinar, look into the future as leading identity and risk management experts explore how companies are utilizing this game-changing approach to manage critical identity risks. Our expert panel will outline the best practices for identity risk management, give you a behind-the-scenes look at how it works in the real world, and discuss strategies for overcoming some of the most common hurdles.
In this webinar, attendees will learn:
• The benefits of applying an integrated approach to identity risk
• The key strategies for overcoming common identity risk management
• How to integrate enterprise systems to more effectively manage identity risk
Complying with regulations, managing policies and controls demand that organizations be flexible to meet any requirement thrown at them. It’s imperative that organizations plan to advance compliance and policy management so it can adapt as requirements change. If they’re using manual office tools, like spreadsheets and email this can slow down the advancement process, causing unnecessary risk. In this live webinar, Lockpath’s, Sam Abadir will share what compliance and policy management for 2020 and beyond entails, including:
• How your organization can gain efficiency from compliance and policy management
• Strategies for collaborating across departments
• How streamlining processes can boost productivity
• Planning ahead for sustained growth
Discover the future for compliance and policy management by attending this educational webinar. Register now!
Tom Garrubba, Linda Tuck Chapman, Kelly White, Shane Deay
Managing vendors, third parties and business associates is one of the most challenging aspects of business. In this exclusive webinar, our panel of industry experts will share their perspectives of the current third-party risk management landscape and where it's headed. As an attendee you’ll learn the latest trends in third-party risk and top predictions in 2020. Discover the future of third-party risk management in this can't miss webinar.
Planning and managing for hardened, secure assets is a key requirement for managing IT Risk and is mandated by many compliance sources such as PCI, NIST, FISMA and HIPAA – yet many organizations are not fully assessing their IT hosts and applications for secure configuration. In this live webinar, Lockpath’s Sam Abadir will share what configuration compliance management for 2020 and beyond looks like, including:
•What configuration compliance management encompasses
•Who should care about secure configuration management
•Why organizations are not doing this today and how this impacts the business beyond IT
Discover the future for configuration compliance management by attending this educational webinar. Register now!
Sam Abadir, Vice President of Industry Solutions, Lockpath
Cloud computing offers massive scalability, availability and low-cost services as major benefits, but as with most new technologies, it introduces new risks. Because there is so much opportunity in the cloud, the cloud service provider network is continuously growing. Service providers are using different technologies, different standards, and like all companies have different competency levels.
A couple of the major challenges organizations have when using cloud computing is managing these third-party operational and security risks. As more technology is moved from your company’s infrastructure to cloud, understanding and management of these risks often overwhelms technology and procurement teams.
This can be managed if an effective third-party framework is put into place, appropriately managed and cross-organizational guidelines are being followed.
IT risk is always evolving, and in 2020 you need to be prepared what it may look like. New technologies and expanding trends such as cloud, digital transformation, and IT risk-related tasks being taken on directly by the business means IT risk will increase and potentially have greater impacts on the business without proper collaboration and management. Prepare for IT risk in 2020 and beyond by attending this live webinar led by Lockpath’s Sam Abadir. Topics to be discussed include:
· Evolution of IT landscapes and what it means to IT risk management
· IT risk management skillsets and disciplines
· Collaboration across departments and building consensus
· How organizational maturity impacts managing IT risk
· How to sustain growth in 2020 and beyond
Find out what you need to know to manage IT risk in 2020 and beyond by attending this educational webinar. Register now!
Today’s fast-paced business environment demands efficiency and agility. Digital transformation and relying on third parties can streamline business processes and boost productivity, but they also bring new types of risk. As products and services grow in number and complexity, traditional risk management methods can’t adapt and scale to keep up. In this live webinar, Lockpath’s Sam Abadir will share what risk management for 2020 and beyond involves, including:
-Critical capabilities for managing multiple types of risks
-Strategies for tying risks to business objectives
-Advantages of managing risk using a GRC platform
-Leveraging the value chain for integrated risk management
Discover the future for risk management by attending this educational webinar. Register now!
Jake Olcott, BitSight; Michael Marriot, Digital Shadows; Jannie Wentzel, Focal Point Data Risk; Sam Abadir, Lockpath
What a year 2018 has been, from indictments and data breaches to an increasing regulatory landscape and a greater focus on integrated risk management. What were the major risk trends in 2018 and what predictions can we make for 2019? In this can’t miss webinar, our panel of industry experts will recap 2018 and offer their views on what to expect in 2019 and beyond.
As an attendee, you’ll learn:
• The shift to a more integrated risk management
• The growing emphasis on supply chain cybersecurity
• The rise in data privacy and its impact on information security
Plan now to attend this special webinar on 2018 highlights and trends and predictions for 2019.
We talk a lot about risk management as part of an overall GRC security strategy, but today we'll focus on one specific area: configuration risk. Of all the types of security risks companies face, configuration risk is one of the most prevalent; it touches all company assets and affects all parts of the business, however, managing these risks is often deprioritized or overlooked. There are three main challenges organizations face when evaluating and managing misconfigurations: how to obtain a holistic and accurate view of company assets, how much risk does each misconfiguration pose to the company, and how to communicate these risks to other parts of the business for remediation escalation. Today’s 20/20 webcast explores these challenges in-depth and discusses how organizations can leverage existing GRC security strategies to address and reduce configuration risk.
There’s no question about it, risk and compliance management are complex. Requirements are always changing, there’s always something to review, and some item is inevitably overlooked creating new risks you don’t know about. When it’s time for an audit, it’s anyone’s guess where the information you need is stored, and if it’s the latest version. It requires a lot of time, resources, and effort to make sure responses are accurate.
Safety is job number one in many organizations and employee health is an ongoing concern for firms. Both highlight the vital importance of health and safety management and its impact on operational risk. If workers are injured, are exposed to dangers, or are absent, they can't do their jobs and it impacts margins and goals. In this live webinar, Lockpath's Sam Abadir will share the roadmap to smarter health and safety, including:
• Critical capabilities required for health and safety management
• Strategies for streamlining OSHA compliance and reporting
• Approaches for increasing accountability
• Ideas for leveraging data for operational risk management
Making health and safety management a higher priority at your company is possible. Discover the road to smarter health and safety by attending this educational webinar. Register now!
Operational risks are on the rise due to companies increasingly relying on digital processes and third parties. The issue is compounded by the fact that products and services are growing in number and complexity. Traditional operational risk management can't keep up. In this live webinar, Lockpath's Sam Abadir will share the roadmap to smarter operational risk management, including:
• Critical capabilities for managing digital process and third-party risks
• Strategies for tying operational risks to business objectives
• Advantages of managing operational risk using a GRC platform
• Leveraging the value chain for integrated risk management
Bring efficiency, effectiveness and agility to operational risk management. Discover the road to smarter operational risk management by attending this educational webinar. Register now!
Blacklight is a configuration analysis and asset discovery solution that surfaces and provides context to unseen risks. It consists of a cloud-based management portal, and on-premise agents that analyzes asset configuration states, reports how configurations differ from established benchmarks, and provides misconfiguration risk scores in real-time.
What insights can be gleaned from third-party risk management today? What are the top trends to watch out for in 2020? Get guidance from our panel of thought leaders on the leading edge of third-party risk management. Each panelist will answer a series of questions and share their viewpoints on a variety of topics, including:
•Top trends in third-party risk management
•Third-party risk ownership in an organization
•How privacy is affecting third-party relationships
•Role of continuous monitoring in business resiliency
•Top predictions for 2020
Plan now to attend this exclusive webinar. Or forward to risk management professionals tasked with managing third-party risk.
Lockpath, a leader in integrated risk management solutions, helps companies understand and manage risk. Subscribe to the Lockpath channel for educational webinars exploring a wide range of topics such as risk management strategies, information security best practices, industry and regulation insights, and more.