Hi [[ session.user.profile.firstName ]]

Admitting Defeat: When to Know Its Time to Supplement your IT GRC Legacy Systems

For many large organizations, balancing the beleaguering process of managing a heavy GRC platform with the past investments in time and money made to stand it up can be challenging. As CISOs of global organizations are finding, these systems are falling short in the slew of new functionality that information security organizations require in today's business environment.

In this talk, CyberSaint Principal Solutions Architect Steve Torino dives into the stories of those who have come to terms with the need to augment their legacy systems, what they were looking for, the process they took for finding something new, and how they stood the new solution up alongside their existing GRC stack.
Recorded Feb 25 2021 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Steve Torino, Principal Solutions Architect
Presentation preview: Admitting Defeat: When to Know Its Time to Supplement your IT GRC Legacy Systems

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Adopting a Growth Mindset in Cybersecurity: Advice for CISOs and CEOs Jun 17 2021 5:00 pm UTC 45 mins
    Padraic O'Reilly, Chief Product Officer and Co-Founder | Deidre Diamond, Founder and CEO, CyberSN
    It's a common train of thought that a CISO is one cyber event away from losing their job. Yet, according to Gartner, the average CISO tenure is three years. Combined with the elevation within the C-suite in the digital age, CISOs need to shift their mindset from being a misunderstood technical leader to an empowered business enabler. CISOs need to transition from a fixed to a growth mindset.

    In this conversation, CyberSaint Chief Product Officer Padraic O'Reilly sits down with Virsec CEO Dave Furneaux to discuss what CISOs should be doing to adopt a growth mindset as well as what CEOs can do to help CISOs along that journey. In this talk Padraic and Dave will cover:

    - Why a growth mindset is critical for CISOs in the digital age
    - How we got here and what CISOs can do to move beyond it
    - Why CEOs need to care about their CISOs mental health to ensure business success
  • How Continuous Control Automation is Solving One of the Biggest Risks in Cloud Jun 10 2021 5:00 pm UTC 30 mins
    Ethan Bresnahan, Marketing Manager
    With the shift to cloud technologies, the risk configurations are different. According to Gartner, by 2023, 75% of cloud security failures will result from inadequate management of identities, access, and privileges, up from 50% in 2020. One of the greatest challenges for security managers regarding entitlements is the vast amounts of data related to the humans, programs, and systems that have access to a given instance. While it can prove too much for a single or team of humans to review, AI-powered technologies such as CyberStrong are up to the task.

    Join us as we dive into:
    - How organizations are trying to solve for cloud identity and access management today
    - Predictions on how the rapid adoption of digital technologies and digital transformation initiatives will impact an organization's ability to monitor its cloud instances manually
    - How AI and NLP, among other new technologies, will be able to support and augment human teams for cloud entitlements
  • Putting Risk First in Cybersecurity & IRM Adoption Jun 3 2021 5:30 pm UTC 30 mins
    Hayley Pruett, Senior Customer Advisor | Bob Delfin, Senior Sales Engineer
    As many organizations begin to take a risk-first approach to risk and compliance management, we are increasingly seeing organizations forced to rethink their organizational design and the products they use to support these teams.

    Join CyberSaint Senior Customer Advisor Hayley Pruett and Senior Sales Engineer Bob Delfin as they dive into the organizational and product shifts underway as organizations prepare for the future. In this talk, we'll cover:

    - Why risk-based approaches to cybersecurity program management are essential for the digital age
    - The ripple effects that taking a risk-based approach has on the organization
    - How product needs change in the face of a risk-based approach
  • Putting Risk First in Cybersecurity & IRM Adoption Jun 3 2021 5:30 pm UTC 30 mins
    Hayley Pruett, Senior Customer Advisor | Bob Delfin, Senior Sales Engineer
    As many organizations begin to take a risk-first approach to risk and compliance management, we are increasingly seeing organizations forced to rethink their organizational design and the products they use to support these teams.

    Join CyberSaint Senior Customer Advisor Hayley Pruett and Senior Sales Engineer Bob Delfin as they dive into the organizational and product shifts underway as organizations prepare for the future. In this talk, we'll cover:

    - Why risk-based approaches to cybersecurity program management are essential for the digital age
    - The ripple effects that taking a risk-based approach has on the organization
    - How product needs change in the face of a risk-based approach
  • Admitting Defeat: When to Know Its Time to Supplement your IT GRC Legacy Systems Jun 1 2021 2:30 pm UTC 28 mins
    Steve Torino, Principal Solutions Architect
    For many large organizations, balancing the beleaguering process of managing a heavy GRC platform with the past investments in time and money made to stand it up can be challenging. As CISOs of global organizations are finding, these systems are falling short in the slew of new functionality that information security organizations require in today's business environment.

    In this talk, CyberSaint Principal Solutions Architect Steve Torino dives into the stories of those who have come to terms with the need to augment their legacy systems, what they were looking for, the process they took for finding something new, and how they stood the new solution up alongside their existing GRC stack.
  • When to Know Its Time to Supplement your IT GRC Legacy Systems - EMEA Jun 1 2021 11:00 am UTC 28 mins
    Steve Torino, Principal Solutions Architect
    For many large organizations, balancing the beleaguering process of managing a heavy GRC platform with the past investments in time and money made to stand it up can be challenging. As CISOs of global organizations are finding, these systems are falling short in the slew of new functionality that information security organizations require in today's business environment.

    In this talk, CyberSaint Principal Solutions Architect Steve Torino dives into the stories of those who have come to terms with the need to augment their legacy systems, what they were looking for, the process they took for finding something new, and how they stood the new solution up alongside their existing GRC stack.
  • When to Know Its Time to Supplement your IT GRC Legacy Systems - APAC Jun 1 2021 2:30 am UTC 28 mins
    Steve Torino, Principal Solutions Architect
    For many large organizations, balancing the beleaguering process of managing a heavy GRC platform with the past investments in time and money made to stand it up can be challenging. As CISOs of global organizations are finding, these systems are falling short in the slew of new functionality that information security organizations require in today's business environment.

    In this talk, CyberSaint Principal Solutions Architect Steve Torino dives into the stories of those who have come to terms with the need to augment their legacy systems, what they were looking for, the process they took for finding something new, and how they stood the new solution up alongside their existing GRC stack.
  • Achieving SOC 2 Compliance With CyberStrong - EMEA May 27 2021 6:00 am UTC 40 mins
    Steve Torino, Principal Solutions Architect | Nick Norton, Chief Visionary, & Client Champion, Geels Norton
    In this talk, we dive into the process of "eating our own dogfood" and how the CyberSaint team used the CyberStrong Platform to become SOC 2 certified.

    We sit down with SOC audit veterans - CyberSaint Principal Solutions Architect Steve Torino and Nick Norton, Chief Visionary and Client Champion at Geels Norton - to hear about their experiences with SOC audits and the differences they saw when using the CyberStrong platform versus other methods.
  • CyberStrong Webcast: Live Demo of NLP-Backed Cross-mapping Abilities May 26 2021 4:00 pm UTC 45 mins
    Bob Delfin, Senior Sales Engineer
    Join us as we walk through the latest updates to the CyberStrong platform including NLP-backed automated crosswalking for both regulatory frameworks and standards as well as custom frameworks and questionnaires. Never before has a solution been able to map frameworks in seconds with this level of accuracy.
  • Achieving SOC 2 Compliance With CyberStrong - APAC May 26 2021 3:00 am UTC 40 mins
    Steve Torino, Principal Solutions Architect | Nick Norton, Chief Visionary, & Client Champion, Geels Norton
    In this talk, we dive into the process of "eating our own dogfood" and how the CyberSaint team used the CyberStrong Platform to become SOC 2 certified.

    We sit down with SOC audit veterans - CyberSaint Principal Solutions Architect Steve Torino and Nick Norton, Chief Visionary and Client Champion at Geels Norton - to hear about their experiences with SOC audits and the differences they saw when using the CyberStrong platform versus other methods.
  • How Cyber/IT Risk Quantification is Fundamentally Shifting in the Next 12 Months May 25 2021 5:00 pm UTC 45 mins
    Padraic O'Reilly, Chief Product Officer and Co-Founder
    For years cyber and IT risk managers have been tasked with quantifying risk without the standard benchmarking data that managers of other forms of risk are used to. However, over the course of 2020, we saw something drastic occur; coupled with the previous years' worth of data, the massive increase in cyber events saw a rise in benchmarketing data for cyber and IT risk managers.

    Join Padraic O'Reilly, CyberSaint Chief Product Officer, as we dive into what this means for the future of risk quantification and how this will impact risk programs of the future.
  • Top Business Stakeholder Relationships CISOs Need to Cultivate in 2021 May 20 2021 6:00 pm UTC 45 mins
    Ethan Bresnahan, Marketing Manager
    As CISOs have been elevated within the C-Suite in the wake of digital transformation initiatives, so too have their responsibilities to partner with other business stakeholders and business unit leaders. For many security leaders, though, it can be a tough place to start.

    In this talk, we will dive into...
    - What makes an "effective" CISO
    - What are the key relationships that CISOs at varying levels of efficacy cultivate
    - How to know where you sit as a security leader and what relationships you need to build to move to the next level
  • Cyber Risk Radar: The DC Police and the Future of Ransomware May 17 2021 5:00 pm UTC 30 mins
    Alison Furneaux, VP Marketing | Steve Torino, Principal Solutions Architect | Michael Hamilton, Founder & CISO, CI Security
    The ransomware gang Babuk supposedly left the ransomware game briefly after attacking the Washington, DC police department and shifting from encryption to extortion. How is ransomware changing after a precipitous rise in 2020 and what can municipalities and other organizations do to protect themselves?
  • Beyond Cloud Security Posture Management: Managing Risk Across Multiple Clouds Recorded: May 13 2021 25 mins
    Padraic O'Reilly, Chief Product Officer and Co-Founder
    One of the more popular ways enterprises are mitigating risk when shifting to the cloud is using multiple providers for various purposes. This redundancy can allow for greater peace of mind than betting the farm on a single provider, however, can prove complicated to set up and manage at scale.

    Join CyberSaint Chief Product Officer Padraic O'Reilly as we dive into how control scoring automation enables and streamlines the use of multi-cloud environments as a means to mitigate risk.
  • Transforming Cyber Risk During Digital Transformation - APAC Recorded: May 13 2021 15 mins
    Steve Torino, Principal Solutions Architect
    Following the host of changes and disruptions brought by 2020, information security programs have been forced to evolve. In preparation or in the wake of digital transformation efforts, IT and cyber risk management must embrace digitalization and reimagine their role within the organization to support the future of cyber, IT, and digital risk.

    In this talk, CyberSaint Principal Solutions Architect Steve Torino explores how cyber risk transformation supports greater digital transformation efforts, increases understanding and communication up and down the chain of command, and prepares the enterprise for the digital age.
  • Transforming Cyber Risk During Digital Transformation - EMEA Recorded: May 12 2021 15 mins
    Steve Torino, Principal Solutions Architect
    Following the host of changes and disruptions brought by 2020, information security programs have been forced to evolve. In preparation or in the wake of digital transformation efforts, IT and cyber risk management must embrace digitalization and reimagine their role within the organization to support the future of cyber, IT, and digital risk.

    In this talk, CyberSaint Principal Solutions Architect Steve Torino explores how cyber risk transformation supports greater digital transformation efforts, increases understanding and communication up and down the chain of command, and prepares the enterprise for the digital age.
  • Practice vs Process Maturity: Strengthening Cyber Risk Programs - APAC Recorded: May 6 2021 14 mins
    Steve Torino, Principal Solutions Architect
    How mature is your cybersecurity program? Are you measuring practice and process maturity? Compliance and risk programs demand up-to-date practices, and diligent processes, to lay a strong foundation for success. Learn how to measure and manage both towards the ultimate program in this webinar!

    Meeting compliance against regulations such as NIST, NERC, ISO27001 and ISO27002, DFARS (NIST SP 800-171), and others are critical to the success of your program. The key to compliance is implementing a continuous compliance program that is improved in real-time, meeting compliance, and enabling trust between CISOs, compliance, and risk teams.

    When it comes to risk management programs, your program must support risk quantification and report across technology, operations, and organizational strategy that aligns with organizational objectives. Leveraging dynamic risk identification, prioritization, and reporting can certainly help to strengthen your program more than before.

    What tactics can you use to facilitate this trajectory? Tune in to learn some of the most valuable recommendations from our information security experts.
  • Why the Shift to Remote Work is Driving IRM Adoption Recorded: May 5 2021 28 mins
    Steve Torino, Principal Solutions Architect
    With the rise of remote work, we increasingly see organizational dynamics impacted. The result is the breakdown of more traditional siloes in more functional groups or flash teams that assemble over collaboration platforms to achieve a short-term goal then disband. This paradigm shift in organizational dynamics enables organizations to take a more integrated approach to risk management, think about the rise of DevSecOps, by leaving the siloes that defined the security organization in the past.

    In this talk, we discuss this shift and the need for an integrated approach to risk management with Principal Solutions Architect Steve Torino. Specifically, we'll cover:

    - How security has been increasingly integrated over the last few years and how 2020 catalyzed further integration
    - How all facets of security and risk are being reimagined in the face of remote work
    - Why an integrated approach to risk management is essential for the digital world we find ourselves in the wake of 2020
  • Practice vs Process Maturity: Strengthening Your Cyber Risk Program - EMEA Recorded: May 3 2021 14 mins
    Steve Torino, Principal Solutions Architect
    How mature is your cybersecurity program? Are you measuring practice and process maturity? Compliance and risk programs demand up-to-date practices, and diligent processes, to lay a strong foundation for success. Learn how to measure and manage both towards the ultimate program in this webinar!

    Meeting compliance against regulations such as NIST, NERC, ISO27001 and ISO27002, DFARS (NIST SP 800-171), and others are critical to the success of your program. The key to compliance is implementing a continuous compliance program that is improved in real-time, meeting compliance, and enabling trust between CISOs, compliance, and risk teams.

    When it comes to risk management programs, your program must support risk quantification and report across technology, operations, and organizational strategy that aligns with organizational objectives. Leveraging dynamic risk identification, prioritization, and reporting can certainly help to strengthen your program more than before.

    What tactics can you use to facilitate this trajectory? Tune in to learn some of the most valuable recommendations from our information security experts.
  • ROC-n-SOC: Creating Risk Operations Centers to Support SOCs - EMEA Recorded: Apr 28 2021 26 mins
    Steve Torino, Principal Solutions Architect | Hayley Pruett, Senior Customer Advisor
    With the security operations center (SOC) overwhelmed with monitoring, responding, and defending the enterprise, the thought of increasing the SOC’s responsibility to measuring risk and communicating it to management doesn’t fit the current SOC model. Enter the Risk Operations Center (ROC). Join CyberSaint Principal Solutions Architect Steve Torino and Senior Customer Advisor Hayley Pruett as they dive into...

    - The differences between a ROC and a SOC
    - When is the right time to create a ROC
    - How organizations can begin to start forming their own ROCs
Cybersecurity as a Business Function
Webinars, panels, and commentary for cutting-edge CISOs, cybersecurity teams, IT compliance professionals, and risk management experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Admitting Defeat: When to Know Its Time to Supplement your IT GRC Legacy Systems
  • Live at: Feb 25 2021 6:30 pm
  • Presented by: Steve Torino, Principal Solutions Architect
  • From:
Your email has been sent.
or close