Hi [[ session.user.profile.firstName ]]

ISO Compliance

ISO compliance can be tedious, labor-intensive and an on-going task of managing processes. Learn how the Keylight Platform is the solution you need for ISO compliance.
Recorded Mar 14 2019 3 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Presentation preview: ISO Compliance

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Audit Management for 2020 and Beyond May 16 2019 4:00 pm UTC 60 mins
    Sam Abadir, Lockpath
    As business risks and compliance mandates keep changing, audit teams are having a tougher time prioritizing audits, collecting information and performing analysis required to strengthen the business.

    Businesses are facing more regulations and competitive pressures which increase the need for internal audit teams to provide an orderly approach for evaluating and improving the effectiveness of risk management, internal control, and governance processes to improve the organization.

    Audit teams are being challenged by legacy audit processes that do not evolve at the same speed as business and regulations. These legacy audit processes include the use of spreadsheets, manual evidence requests, share drives and manual reports that often take weeks or months to complete.

    In this live webinar, Lockpath’s Sam Abadir will share what audit management for 2020 and beyond looks like, including:

    • What audit management encompasses
    • How your organization can gain efficiency from proper audit management
    • Advantages of managing audits and risk management efforts on an Integrated Risk Management or Governance Risk and Compliance platform
    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage audit risk in 2020 and beyond by attending this educational webinar. Register now!
  • Improve Your PCI DSS Management Effectiveness May 15 2019 4:00 pm UTC 60 mins
    Sam Abadir, Lockpath
    Payment Card Industry Data Security Standard (PCI DSS) pushes organizations to achieve six distinct goals in the aim of protecting payment systems from breaches and theft of cardholder data. The requirements supporting the goals force organizations to manage, govern and integrate different departments within the business including IT, security, compliance, risk, incident response, and policy management.

    Those managing this effort quickly realize that the effort to achieve the goals effectively and in a timely manner requires PCI DSS to be a day-to-day part of your business executed with purposeful coordination and immediate access to information to continuously assess the PCI DSS environment, remediate vulnerabilities and report required information.

    In this live webinar, Lockpath’s Sam Abadir will share what a PCI DSS solution looks like, including:

    • Best practices for effectively managing PCI DSS
    • How your organization can gain efficiency from proper a PCI DSS solution
    • Maintaining a strong vulnerability management program with PCI DSS
    • Advantages of managing PCI DSS solutions efforts on a Governance, Risk and Compliance or Integrated Risk Management platform

    Find out what you need to know to better manage your PCI DSS solution by attending this educational webinar. Register now!
  • A New Approach to Managing "Identity Risk" May 2 2019 4:00 pm UTC 60 mins
    Focal Point Data Risk, Lockpath, SailPoint
    More than 80 percent of hacking-related breaches leverage stolen, default, or weak passwords, and compromising user credentials remains the easiest way for hackers to gain access to your systems and networks. The potential harm is even greater if those credentials belong to a privileged user.

    So, what are leading organizations doing to manage this identity-related risk? The answer is Identity Risk Management – the process of integrating an IAM system with an Integrated Risk Management or GRC program. Identity Risk Management, when executed properly, allows for improved risk visibility, better risk-based decision making, and reduces enterprise risk management siloes.

    In this 60-minute webinar, look into the future as leading identity and risk management experts explore how companies are utilizing this game-changing approach to manage critical identity risks. Our expert panel will outline the best practices for identity risk management, give you a behind-the-scenes look at how it works in the real world, and discuss strategies for overcoming some of the most common hurdles.

    In this webinar, attendees will learn:

    • The benefits of applying an integrated approach to identity risk
    • The key strategies for overcoming common identity risk management
    • How to integrate enterprise systems to more effectively manage identity risk
  • Optimize Your Third-Party Protection Program Apr 25 2019 4:00 pm UTC 60 mins
    Bob Maley, Normshield; Tony Rock, Lockpath
    Interaction between the financial industry and third-parties has become more complicated due to the combined risk of the financial industry's rapid growth and an increase in third-party relationships.

    In this exclusive webinar, Bob Maley, Chief Security Officer of Normshield, Inc., who designed information security programs from the ground up for major financial services organizations, will share his perspective of third-party risk in the financial services industry. He’ll discuss common financial third-party risk challenges and trends in the market, best practices and challenging scenarios from his career and how he resolved them.

    As an attendee you’ll learn how his real-world third-party risk examples, best practices and recommendations can apply to your organization’s unique needs. Discover how to build and mature a successful third-party risk program in financial services by attending this educational webinar.

    Register now!
  • Compliance and Policy Management for 2020 and Beyond Recorded: Apr 18 2019 43 mins
    Sam Abadir, Lockpath
    Complying with regulations, managing policies and controls demand that organizations be flexible to meet any requirement thrown at them. It’s imperative that organizations plan to advance compliance and policy management so it can adapt as requirements change. If they’re using manual office tools, like spreadsheets and email this can slow down the advancement process, causing unnecessary risk. In this live webinar, Lockpath’s, Sam Abadir will share what compliance and policy management for 2020 and beyond entails, including:

    • How your organization can gain efficiency from compliance and policy management
    • Strategies for collaborating across departments
    • How streamlining processes can boost productivity
    • Planning ahead for sustained growth

    Discover the future for compliance and policy management by attending this educational webinar. Register now!
  • Keylight Platform Overview Recorded: Apr 4 2019 4 mins
    Learn how Keylight's approach to integrated risk management can help your organization and improve your business decision-making.
  • Third-Party Risk Management Trends & Predictions Recorded: Mar 28 2019 63 mins
    Shawn Malone, Linda Tuck Chapman, Kelly White, Shane Deay
    Managing vendors, third parties and business associates is one of the most challenging aspects of business. In this exclusive webinar, our panel of industry experts will share their perspectives of the current third-party risk management landscape and where it's headed. As an attendee you’ll learn the latest trends in third-party risk and top predictions in 2020. Discover the future of third-party risk management in this can't miss webinar.
  • Implementing a NIST Framework for Adaptive Cybersecurity Recorded: Mar 21 2019 79 mins
    Colin Whittaker, with Sam Abadir, Lockpath; Allan Liska, Recorded Future; and Gina Mahin, Lynx TP; David McNeely, Centrify
    In an age where cybersecurity threats are an everyday fact of life, organizations are looking for solutions that enable them to predict, prepare and react to the shifting landscape of cyber threats, and implementation of adaptive cyber security strategies is becoming inevitable to achieve that goal.

    Adaptive cyber security methods allow for the simultaneous defense of multiple attack surfaces against this new wave of advanced cyber attacks targeting businesses and services. The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security. Attend this CPE webinar to gain insights on:

    - Getting a clear picture of the current health of your organizations' defenses
    - Defining your security road map using NIST CSF as a framework
    - Conducting gap analysis and executing remediation actions
    - Mapping the NIST CSF with security controls and built-in reporting templates that align with the framework.
  • Configuration Compliance Management for 2020 and Beyond Recorded: Mar 20 2019 40 mins
    Sam Abadir, Lockpath
    Planning and managing for hardened, secure assets is a key requirement for managing IT Risk and is mandated by many compliance sources such as PCI, NIST, FISMA and HIPAA – yet many organizations are not fully assessing their IT hosts and applications for secure configuration. In this live webinar, Lockpath’s Sam Abadir will share what configuration compliance management for 2020 and beyond looks like, including:

    •What configuration compliance management encompasses
    •Who should care about secure configuration management
    •Why organizations are not doing this today and how this impacts the business beyond IT

    Discover the future for configuration compliance management by attending this educational webinar. Register now!
  • ISO Compliance Recorded: Mar 14 2019 3 mins
    ISO compliance can be tedious, labor-intensive and an on-going task of managing processes. Learn how the Keylight Platform is the solution you need for ISO compliance.
  • Third-Party Cloud Management Recorded: Feb 28 2019 53 mins
    Sam Abadir, Vice President of Industry Solutions, Lockpath
    Cloud computing offers massive scalability, availability and low-cost services as major benefits, but as with most new technologies, it introduces new risks. Because there is so much opportunity in the cloud, the cloud service provider network is continuously growing. Service providers are using different technologies, different standards, and like all companies have different competency levels.

    A couple of the major challenges organizations have when using cloud computing is managing these third-party operational and security risks. As more technology is moved from your company’s infrastructure to cloud, understanding and management of these risks often overwhelms technology and procurement teams.

    This can be managed if an effective third-party framework is put into place, appropriately managed and cross-organizational guidelines are being followed.
  • IT Risk Management for 2020 and Beyond Recorded: Feb 21 2019 40 mins
    Sam Abadir, Lockpath
    IT risk is always evolving, and in 2020 you need to be prepared what it may look like. New technologies and expanding trends such as cloud, digital transformation, and IT risk-related tasks being taken on directly by the business means IT risk will increase and potentially have greater impacts on the business without proper collaboration and management. Prepare for IT risk in 2020 and beyond by attending this live webinar led by Lockpath’s Sam Abadir. Topics to be discussed include:

    · Evolution of IT landscapes and what it means to IT risk management

    · IT risk management skillsets and disciplines

    · Collaboration across departments and building consensus

    · How organizational maturity impacts managing IT risk

    · How to sustain growth in 2020 and beyond

    Find out what you need to know to manage IT risk in 2020 and beyond by attending this educational webinar. Register now!
  • PCI DSS Compliance Recorded: Feb 4 2019 2 mins
    Complying with PCI DSS (PCI) can be a burden on an organization. See how the Keylight Platform is the solution you need for PCI DSS compliance.
  • Risk Management for 2020 and Beyond Recorded: Jan 29 2019 50 mins
    Sam Abadir, Lockpath
    Today’s fast-paced business environment demands efficiency and agility. Digital transformation and relying on third parties can streamline business processes and boost productivity, but they also bring new types of risk. As products and services grow in number and complexity, traditional risk management methods can’t adapt and scale to keep up. In this live webinar, Lockpath’s Sam Abadir will share what risk management for 2020 and beyond involves, including:

    -Critical capabilities for managing multiple types of risks

    -Strategies for tying risks to business objectives

    -Advantages of managing risk using a GRC platform

    -Leveraging the value chain for integrated risk management

    Discover the future for risk management by attending this educational webinar. Register now!
  • GDPR Compliance Recorded: Jan 15 2019 2 mins
    GDPR compliance is a big challenge for organizations doing business with, or in the EU. See how the Keylight Platform is the solution you need for GDPR compliance.
  • The 7 Step Guide to Third-Party Risk Management Recorded: Dec 27 2018 1 min
    A brief overview of what our guide to Third-Party Risk Management
  • GRC Buyer's Guide Recorded: Dec 27 2018 1 min
    Brief ad highlighting the benefits of the guide.
  • 2019 Risk Trends and Predictions Recorded: Dec 13 2018 59 mins
    Jake Olcott, BitSight; Michael Marriot, Digital Shadows; Jannie Wentzel, Focal Point Data Risk; Sam Abadir, Lockpath
    What a year 2018 has been, from indictments and data breaches to an increasing regulatory landscape and a greater focus on integrated risk management. What were the major risk trends in 2018 and what predictions can we make for 2019? In this can’t miss webinar, our panel of industry experts will recap 2018 and offer their views on what to expect in 2019 and beyond.

    As an attendee, you’ll learn:

    • The shift to a more integrated risk management
    • The growing emphasis on supply chain cybersecurity
    • The rise in data privacy and its impact on information security

    Plan now to attend this special webinar on 2018 highlights and trends and predictions for 2019.
  • Configuration Risk Recorded: Nov 6 2018 33 mins
    Sam Abadir
    We talk a lot about risk management as part of an overall GRC security strategy, but today we'll focus on one specific area: configuration risk. Of all the types of security risks companies face, configuration risk is one of the most prevalent; it touches all company assets and affects all parts of the business, however, managing these risks is often deprioritized or overlooked. There are three main challenges organizations face when evaluating and managing misconfigurations: how to obtain a holistic and accurate view of company assets, how much risk does each misconfiguration pose to the company, and how to communicate these risks to other parts of the business for remediation escalation. Today’s 20/20 webcast explores these challenges in-depth and discusses how organizations can leverage existing GRC security strategies to address and reduce configuration risk.
  • Keylight Team Edition Overview Recorded: Nov 5 2018 5 mins
    There’s no question about it, risk and compliance management are complex. Requirements are always changing, there’s always something to review, and some item is inevitably overlooked creating new risks you don’t know about. When it’s time for an audit, it’s anyone’s guess where the information you need is stored, and if it’s the latest version. It requires a lot of time, resources, and effort to make sure responses are accurate.
Put risk under new management.
Lockpath, a leader in integrated risk management solutions, helps companies understand and manage risk. Subscribe to the Lockpath channel for educational webinars exploring a wide range of topics such as risk management strategies, information security best practices, industry and regulation insights, and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: ISO Compliance
  • Live at: Mar 14 2019 12:20 pm
  • Presented by: Lockpath
  • From:
Your email has been sent.
or close