Integrating IT-Related Risk: The Next Chapter In Business Benefit

Presented by

Brian Barnier, Principal, ValueBridge Advisors

About this talk

Good news: Enterprises are finally making progress toward breaking down the IT silos and forging a view of IT-related risk that crosses those IT silos. Slowly but surely, network security, availability, access security, recovery, change, release, often physical security and occasionally even project management are being viewed together – to see their interrelationships and balance improvements. Bad news: The struggle is far less advanced in connecting a view of IT-related risk to business operations. In enterprises that are increasingly dependent on IT, the failure to take an end-to-end business operations view of risk boarders on tragic. Of the several challenges faced by both operational and IT professionals, a significant hurdle has been the lack of a shared risk management process that integrates operational risk to the business (products, process, frauds, continuity and such) with IT related risk. This has made it difficult to put the puzzle pieces together, understand relationships and even share terminology. Worse, this has all been complicated by confusion over whether risk management is being used to drive business performance or just a compliance exercise. Join in this webinar to understand the latest approaches and tools to integrate IT and operational risk to improve business performance. This session draws on lessons learned across industries and countries, with special emphasis on helping financial companies implement meet their pressing business and regulatory needs.

Related topics:

More from this channel

Upcoming talks (19)
On-demand talks (3501)
Subscribers (180284)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.