Hi [[ session.user.profile.firstName ]]

Extending Your Enterprise Risk Management Program

Attendees of this webcast will be entered to win a free Apple iPad.

Short Summary:
Join Michael Rasmussen, President at Corporate Integrity, as he shares his insights on vendor management process best practices in this 1-hour webcast.

In today’s economic climate, many organizations outsource parts of their business to take advantage of cost savings and solution-expertise. However, as vendor relationships increase, it becomes more difficult to manage them. The risks assumed by outsourcing can be significant without a vendor management program. According to the Ponemon Institute Study - 2009 Security Mega Trends, an average of 50.5% of organizations who outsourced sensitive and confidential data to third parties experienced a security incident or data breach as a result of outsourcing. In this 1-hour live webcast, Michael Rasmussen, President at Corporate Integrity, will share his insights on the importance of vendor management, as well as his recommendations of best practices for defining and executing an effective strategy.
Chris Noell, EVP of Product management of TruArx, will then provide a brief overview of how GRC tools such as TruComply can automate key vendor management activities and enable these best practices.

In this session, you will learn about:
•The importance of vendor management and how it applies to your business
•Best practices for defining and executing an effective vendor management strategy
•How you can quickly and cost-effectively establish a mature vendor management program
Recorded Jul 21 2010 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michael Rasmussen; Corporate Integrity, President & Chris Noell; EVP, Product management of TruArx
Presentation preview: Extending Your Enterprise Risk Management Program

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [*CPE] How to Adapt Third-Party Risk Management for Times of Disruption Jan 28 2021 6:00 pm UTC 75 mins
    Panel Moderated by Colin Whittaker, Founder of Informed Risk Decisions
    Panel Discussion with industry experts.

    Earn 1.5 CPE Credits on this educational webinar.
  • [*CPE] Enabling Agile Cloud Security for the Work From Home Enterprise Dec 17 2020 5:45 pm UTC 75 mins
    Panel Moderated by Colin Whittaker, with speakers from Okta, Sailpoint, and Mimecast.
    *Attend live for 1.5 CPE Credits

    Working From Home (WFH) is rapidly becoming the new norm, and cyber criminals across the globe are leveraging the panic induced by this pandemic to launch disruptive cyber-attacks. In the new WFH normal, you will have to secure every aspect of the architecture, whether it’s on premise hardware, cloud infrastructure or your employee’s endpoint devices. Any weakness in this entire chain will expose your IT infrastructure to security risks.

    This means it is critical that businesses quickly find ways to support their workers to work remotely and to do so in a secure manner. On this CPE accredited panel discussion webinar our experts will examine how to build resilience in a digital enterprise with a focus on agile cloud security in the new WFH environment. Don’t miss this opportunity to question the experts on the dos and don’ts of securing your remote workers, strengthen your security posture in this time of extreme uncertainty, and:

    - Learn how to educate your home workers on basic security hygiene,
    - Understand the threat landscape and how cyber-criminals are leveraging fears around COVID-19 to attack your business,
    - Discover how to use cloud collaboration tools more securely,
    - Receive best practices you can put into place to eliminate security blind spots.
  • [*CPE] Executive Tips to Present Cybersecurity to the Board Nov 19 2020 6:00 pm UTC 75 mins
    Hrishikesh Choudhari, MetricStream; Jake Olcott, BitSight; David Klein, ProcessUnity; and a SME from Okta,
    *Attend live for 1.5 CPE Credits

    Cyberattacks can cost an organisation its reputation, its customers and a great deal of money, making CEOs and board members more accountable. Yet, research shows that a high percentage of corporate boards are not actively involved in cybersecurity oversight. Nonetheless, Gartner estimates by 2021, 100% of large enterprises will be asked to report to their board of directors on cybersecurity and technology risk at least annually.

    When communicating your cybersecurity program to the board, it is important to translate technical, tactical details about cybersecurity into business terms: risks, opportunities and strategic implications.In order to justify the desired cybersecurity expense, you must clearly present the risks, the plan you will implement to protect the company’s assets, and the rationale behind the cost. In this webinar, our expert panel will discuss how to present cybersecurity to the board and get buy-in, including how to:

    - Map out your cybersecurity program.
    - Get an independent view of your current cybersecurity state and present the facts.
    - Translate technical, tactical details about cybersecurity into business terms: risks, opportunities and strategic implications.
    - Propose concrete solutions and demonstrate ROI.
  • [*CPE] Accelerating Threat Detection with Real-Time Security Intelligence Oct 22 2020 5:00 pm UTC 75 mins
    Brandon Dixon, RiskIQ; Francois Lacelles, Ping Identity; Teju Shyamsundar,Okta; and Allan Liska, Recorded Future.
    *Attend live for 1.5 CPE Credits

    Many organizations rely on governance, risk, and compliance (GRC) technology to consolidate risk information from internal sources (such as finance, IT, and operations) and external sources to understand their threat landscape. Yet as vendor ecosystems grow in size and complexity, risk management teams are increasingly struggling to procure and maintain high-quality, real-time data to feed their GRC systems.

    Creating a threat intelligence strategy is essential for a company to identify and prioritize threats effectively. But when it comes time to choose threat intelligence services and products it can be hard to know where to start. In this webinar, our expert panel will discuss how to use real-time threat intelligence to accelerate threat detection, including how to:

    - Understand the important distinction between threat data and intelligence.
    - Establish what types of intelligence will prove beneficial to your organization and be critical for ROI.
    - Gain complete visibility into all of your organization’s API traffic, and analyze relevant intelligence effectively from large volumes of threat data.
    - Empower your teams to leverage automation to detect and block threats to your organization. 
  • A Third-Party Risk Management Masterclass Recorded: Sep 24 2020 76 mins
    Stephen Boyer, BitSight; Jon Ehret, RiskRecon; Chris McCloskey, OneTrust; and Todd Boehler, ProcessUnity.
    Third-party risk management (TPRM) programs are designed to offload that risk, but the current approach isn’t providing the intended results. According to the Ponemon Institute, nearly 61% of U.S. companies have experienced a data breach caused by a third party.

    To build an efficient TPRM program, it's critical to understand which vendors and suppliers present the most risk, as well as which ones are essential to your operations. By understanding where to prioritize your time, you can onboard key vendors faster, spend the right amount of time performing due diligence, and invest the most resources assessing and monitoring the third parties that matter most, helping to increase security and performance.

    On this webinar our panel of experts will share their experiences and discuss how to:

    - Overcome the most common vendor risk challenges
    - Prioritize your third parties by criticality
    - Streamline your due diligence and vendor assessment process
    - Encourage effective communication between internal stakeholders
    - Establish a continuous improvement cycle to encourage better results year over year
    - Achieve efficiencies out of TPRM tools
  • Executive Tips to Modernize Your Compliance Program Recorded: Aug 27 2020 76 mins
    Chase Hinson, OneTrust; Todd Boehler, ProcessUnity, Jason Rohlf, Onspring; and Kevin Jacobson of LogicGate.
    Under the weight of new and changing regulations around the world, many organizations struggle to achieve compliance. They often lack a holistic view of their compliance profile and face increasing challenges due to digital transformation. Chief Compliance Officers who take a top-down approach are often met with resistance, but a successful program requires management to actively participate, not just sign off.  

    Organizations can no longer afford to apply check-the-box approaches to compliance. Executive management must take a variety of actions to demonstrate leadership and commitment to the company’s compliance management program. On this webinar our panel of experts will discuss the current compliance landscape and challenges facing today's organizations, and they will address best practices to modernize your compliance program, including how to:

    - Use a risk-based approach to meet regulatory demands.
    - Employ digital transformation in the management of compliance obligations.
    - Understand the impacts of regulatory changes and minimize resource-intensive manual processes.
    - Get buy-in from other departments and create a working group of stakeholders to develop and improve your compliance program.
  • Privacy in a Pandemic: Implementing a Global Framework for Compliance Recorded: Jul 30 2020 76 mins
    Colin Whittaker with: Jason Rohlf, Onspring; Danielle Kucera, Okta; Todd Boehler, ProcessUnity; and Dan Harms, OneTrust.
    In response to the Coronavirus Pandemic, countries are turning to tech to find solutions for containing the spread of the virus. New government initiatives including contact tracing apps are being implemented at lightning speed, and tele-health regulation is being approved in days instead of years. The world is rapidly digitizing in response to all users working from home simultaneously, companies are adding network technology to expand coverage and capability, and online video conferencing is exploding.

    But what does this all mean for privacy, and how can companies maintain compliance with regulations such as the GDPR in the current climate? Join us to learn from our panel of security and privacy experts as they discuss how to implement a framework for compliance in the current climate, including how to:

    - Improve resiliency around this new risk landscape,
    - Better align global privacy data regulations and Enable business agility in a changing environment,
    - Foster greater interplay between executive leadership to make informed decisions,
    - Create successful privacy frameworks that are globally aligned.
  • How to Mitigate the Unique Risks of Work From Home-Remote Office Networks Recorded: Jul 15 2020 75 mins
    Dan Dahlberg, Director of Data Research at BitSight
    In response to the COVID-19 pandemic, more employees are working from home than ever before, introducing corporate devices to a variety of new and evolving vulnerabilities. We recently examined the data we routinely collect from Internet traffic to learn more about how this unprecedented shift to remote work changed the security landscape — and the results were alarming.

    During this webinar, Dan Dahlberg, Director of Data Research at BitSight, will dive into our research and provide proven recommendations for mitigating cybersecurity risk across a remote workforce. Join us on Wednesday, July 15, for:

    - Insights into the hidden dangers lurking in residential networks
    - Tips on navigating the new security challenges
    - Best practices for monitoring your expanding attack surface and ensuring all digital assets are secure
  • Automated Integrations for Third-Party Risk Management Recorded: Jun 25 2020 75 mins
    Panelists: Emily Affinito, LogicGate, Allan Liska, Recorded Future; Jonathan Ehret, RiskRecon; and Todd Boehler, ProcessUnity
    High-Profile Data Breaches have placed a spotlight on the risk of cyber security breaches with vendors and subcontractors, expanding the need to have greater rigor in third-party risk management and ongoing risk assessments. By integrating third-party risk management systems with other enterprise systems, external data sources, and analysis and reporting applications, and organization can deliver significant benefits and centralize processes into a single, automated platform that standardizes workflows and reduces manual effort.

    On this CPE accredited webinar our panel of experts will address how to strengthen your third-party risk management process for improved efficiency and effectiveness, and get more from your platform investment through automated integrations with a broader digital ecosystem. Attendees will learn:

    - How integrations with external data sources accelerate the assessment process and improve security, financial, and reputation risk reviews,
    - Where to connect to internal systems — ERP, GRC, CRM, Contracts, and more — throughout the third-party management lifecycle,
    - The pros and cons of various integration methods and how to make a best-fit choice,
    - How to strengthen and streamline your third-party risk management efforts.
  • Privileged Access Management: A Zero-Trust Approach to COVID-19 Recorded: May 21 2020 76 mins
    Colin Whittaker with Chad Wood, Galvanize; Joseph Carson, Thycotic; Chad Carter, Wallix; and Ilia Sotnikov, Netwrix
    Security practitioners around the world are struggling to cope with the challenges posed by remote workers during the COVID-19 pandemic. With all users working from home simultaneously, there is a tremendous load and increased security risks across private networks and the cloud. In light of more workers accessing data from the cloud, many organizations are taking a "zero trust" approach, including the use of solutions such as Privileged Access Management (PAM).

    If your organization is just getting started with a Privileged Access Management (PAM) program, or you are focused on implementing advanced PAM strategies to align with a COVID-19 environment, this CPE accredited webinar will address what you need to know for data security. Our panel of experts will outline the key challenges and offer some clear recommendations that emphasize the critical role of people, processes and technology in effectively mitigating PAM risk, including:

    - Tracking and Securing Every Privileged Account
    - Governing and Controlling Access
    - Recording and Auditing Privileged Activity
    - Operationalizing Privileged Tasks
    - Creating a Zero Trust environment
  • Faster Business Growth Starts with Better Vendor Onboarding Recorded: Apr 23 2020 69 mins
    Speakers: Evan Tegethoff, Will Ricciardi, and Andrew Calo of BitSight Technologies
    Companies work with third-party vendors to help them become leaner, more agile, flexible, and efficient, so they can go to market faster and beat the competition. However, onboarding remains the most time consuming and pressurized part of the process, as security leaders try to balance meeting the demands with the business with the fundamentals of good security. According to Gartner it now takes an average of 90 days to onboard a new vendor, 20 days longer than four years ago.

    Furthermore, the recent large scale shift to work from home in response to COVID-19 has accelerated the adoption of new vendors as companies try to enable a newly remote workforce, adding even more pressure on third-party risk managers to onboard and operationalize third-parties faster than ever. Join BitSight’s Evan Tegethoff, Will Ricciardi, and Andrew Calo to learn how third-party risk managers can create faster, less costly and more scalable onboarding processes that enable the business to grow faster and become adaptive to a changing environment, including how to:

    - Reduce time and cost to onboard new vendors
    - Scale your program more efficiently
    - Use tiering to prioritize your assessment process
    - Use an adaptive process to monitor your vendors
  • How to Get More Visibility into Your Digital Ecosystem Recorded: Mar 26 2020 70 mins
    Kelley Vick, Host. With Chris Poulin, Principal Consulting Engineer at BitSight.
    In today's cybersecurity landscape, having continued visibility into your organization’s attack surface is essential to staying ahead of new and evolving threats. But as your digital ecosystem continues to expand, monitoring and mitigating cyber risk become increasingly difficult.

    During this CPE webinar, BitSight’s Chris Poulin, a risk reduction and cybersecurity expert, will take a deep dive into how you can evaluate your current digital risk management efforts, identify gaps, and prioritize improvements.

    Join us on Thursday, March 26, to learn how to:
    ●Validate and manage your digital footprint across various ecosystems
    ●Monitor for indicators of attack, compromise, and abuse
    ●Leverage business context to prioritize remediation efforts and allocate resources
    ●Initiate response plans to mitigate risks
    ●Track and communicate progress with objective data across environments
    ●Use risk intelligence to improve your security posture
  • Matching Threat Intelligence & Third-Party Risk for Cyber Security Recorded: Mar 12 2020 74 mins
    Panelists: John Chisum, RiskRecon; Jaymin Desai, OneTrust; Allan Liska, Recorded Future; and David Klein, ProcessUnity
    As organizations evolve and become more connected, their reliance on third-party ecosystems continues to grow. While these business relationships undoubtedly add value, they also introduce significant new risk and compliance challenges. The third-party risk management process is complex and involves more stakeholders and data sources than many people may think including: cyber risk information, supply chain, financial, IT, compliance, legal, and privacy risk data. But even with loads of available data, it’s extremely difficult for risk teams to know how to prioritize risk and focus remediation and response efforts without the proper context or processes.

    As a result risk management teams are turning to governance, risk, and compliance (GRC) solutions to help centralize all of this information in order to gain a more holistic view of their third-party ecosystem. Cyber third-party risk data is a critical piece of the puzzle to a holistic third-party risk program within a GRC solution. Having access to a threat-centric view of cyber risk provides risk management teams with real-time insights that enable them to make faster, more confident decisions and effectively manage third-party risk.

    On this CPE accredited webinar our panel of experts will address how to bring threat intelligence into the third-party risk management process and discuss:

    - The importance of holistic risk management and sustainable ongoing monitoring,
    - How to incorporate external content sources and create a centralized data repository for a more holistic view of your vendors,
    - Ways to advance your third-party risk maturity with threat intelligence.
  • Automating GRC to Increase Business Value Recorded: Feb 13 2020 76 mins
    Matt Kunkel, LogicGate; James Rice, Greenlight Technologies; Scott Bridgen, OneTrust; and Allan Liska, Recorded Future.
    GRC is neither a project nor a technology, but a corporate objective for improving governance through more-effective compliance and a better understanding of the impact of risk on business performance. GRC can vary dramatically depending on the businesses vertical market, and even further complexity can be found from one business unit to another. This complexity drives the need for different, highly specialized tools, which raises a huge set of cost, integration, and management issues.

    To address this challenge, many businesses are opting for an automated GRC (eGRC) solution, which aims to resolve the challenges associated with scattered and disconnected operational security processes through the centralization of data, alignment of processes and workflows, and clear enterprise-level visibility with trend and analysis metrics and reporting. The benefits of Automating GRC are substantial when businesses have a mature GRC program in place. Attend this expert CPE webinar to gain insights on:

    - Understanding the GRC Business Drivers.
    - Defining Your GRC Strategy.
    - Developing a GRC Roadmap that is aligned with the Mission, Value, and Strategic Agenda of Your Business.
    - Getting Leadership Support and Enabling Cross-Departmental Collaboration.
  • Cornerstones to Fortify Your Enterprise Cybersecurity Defense Recorded: Jan 23 2020 77 mins
    Panelists: Dr. Anton Chuvakin, Google Cloud; with Sumedh Thakar, Qualys; Roger Grimes, KnowBe4; and Vivian Tero, Illumio.
    The enterprise cybersecurity landscape is dramatically expanding in scale and complexity, and cyberattacks are growing in magnitude and impact as digital transformation increases on a global scale. From phishing scams, to ransomware attacks, to malicious breaches from state actors, the potential threat to your business is huge. According to the Ponemon Institute, the average per breach cost to a company in 2018 was estimated at $3.86 million, an increase of 6.4 percent over the previous year.

    Even though cybersecurity presents a challenge to the enterprise, you are not helpless against the bad actors who seek to cause real and costly damage to your business. A proactive, company-wide, integrated digital security strategy that addresses cybersecurity threats at all levels of your business will provide you with both the offensive and defensive capabilities you need to handle whatever comes your way. Earn 1 CPE credit by attending this educational and interactive panel webinar. Our experts will discuss why fortifying your cybersecurity strategy should be a critical priority and highlight some best practices that you can employ to stay ahead of evolving threats, including how to;

    - Understand the changing cyberattack landscape,
    - Create a company-wide cybersecurity task force,
    - Evaluate your security budget against your threat level,
    - Fortify your cybersecurity defense with systems hardening, adaptive authentication, and endpoint protection.
  • Critical Steps to Manage CCPA Compliance and Risk in 2020 Recorded: Dec 17 2019 78 mins
    Panelists: K Royal, TrustArc; Ilia Sotnikov, Netwrix, Dr. Else van der Berg, Datawallet; and Harold Byun, Baffle.
    The California Consumer Privacy Act of 2018 (CCPA) is arguably the most expansive privacy law in U.S. history and will become enforceable in just a matter of months. The CCPA introduces new privacy rights for consumers and will force companies that conduct business in the State of California to implement structural changes to their privacy programs.

    The new rights given to California consumers are similar to the rights provided in the European Union’s General Data Protection Regulation (GDPR). The CCPA also subjects non-compliant businesses to expensive fines, class-action lawsuits, and injunctions.

    On this webinar, we will examine the impact of the CCPA, answer your burning questions, uncover the CCPA’s nuances, and address its ambiguities and challenges. We will also include strategies for creating compliance programs in the midst of the unknowns, and a strategic action plan for businesses to become compliant.

    Learning objectives are to gain insights on:

    •Identify which companies are impacted by the CCPA and what rights it gives to consumers.
    •Analyze the differences between the CCPA and the GDPR.
    •Develop a plan to become CCPA compliant.
    •Estimate the costs and benefits of achieving CCPA compliance.
  • Key Steps to Mature Your Third-Party Risk Management Program Recorded: Oct 31 2019 78 mins
    Colin Whittaker with Todd Boehler, Process Unity; Jason Sabourin, OneTrust; Mark Deluca, Coupa; and Evan Tegethoff , BitSight
    High-Profile Data Breaches have placed a spotlight on the risk of cyber security breaches with vendors and subcontractors, expanding the need to have greater rigor in third party risk management and ongoing risk assessments. Maintaining an effective third-party risk management program doesn't happen overnight. It's a journey that involves continual learning, refinement and evolution.

    And as a program matures over time, it results in the management of vendors and other third parties with fewer risks, lower costs, better performance and stronger compliance. Since every company is at a different place in their journey towards better vendor management, it's important to identify steps that you can follow as you mature your program, and to consider your vendor risk ecosystem and the data and services that can have an enormous impact on risk reduction. On this CPE accredited webinar our panel of experts will address some key steps to mature your third-party risk management program, including how to:

    - Create a third-party risk-management maturity roadmap.
    - Connect with enterprise systems to create a centralized data repository and enable seamless vetting activities across processes
    - Incorporate external content sources for a more wholistic view of your vendors plus more sustainable ongoing monitoring
    - Strengthen and streamline your third-party risk management efforts.
  • CCPA 101: What is It, and How Will It Impact Your Organization? Recorded: Oct 3 2019 73 mins
    Speakers: Jannie Wentzel, Risk Management Professional; and Kerwyn Velasco, Product Manager - Riskonnect
    The California Consumer Privacy Act goes into effect January 1, 2020. If you are a for-profit company operating in the state of California, you need to have the right processes in place to support CCPA privacy requirements – or face stiff penalties. Are you ready?

    Attend this CPE accredited webinar to understand what is required by the CCPA, what you need to do now to prepare, how it relates to the rest of your compliance program, and what other privacy laws are on the horizon.

    You’ll learn:

    - What types of companies are affected by CCPA
    - How CCPA compares to GDPR
    - How technology can help you comply with privacy laws
  • Preventing Data Breaches with a Scalable Verification Program Recorded: Sep 10 2019 75 mins
    Panelists: Nathan Rowe, Evident ID; Jeremy Grant, the Better Identity Coalition; Jon Lehtinen, Thompson Reuters.
    Consumer demand is driving the corporate IT environment. Business demands for IT are changing rapidly — so too are the demands on IAM — resulting in the requirement to adopt emerging technologies (e.g., mobile and cloud computing, data loss prevention, and social media) earlier and more quickly. Scalability is critical for any business that wants to catalyze short- and long-term success. A flexible workflow for identity verification can help organizations of all sizes with limited time, resources, and funding to focus their efforts on initiatives that support positive growth. While your business might be conducting background checks today, it could have different verification needs in the future to ease onboarding friction, prevent data breaches, and demonstrate regulatory compliance.

    It’s important to begin laying the groundwork now for a more sophisticated and intricate verification program so you can be proactive, not reactive, but what does a scalability strategy look like? In this CPE accredited panel webinar our experts will address how to create identity and credential verification workflows that can scale with your organization as it grows, including how to:

    - Gain a better understanding of the digital identity landscape,
    - Ensure accuracy of both data sources and verification records,
    - Centralize verification of multiple data sources into a unified platform,
    - Evaluate new developments like biometrics, AI, and blockchain, and how they can impact identity and data management,
    - Save money in the long-term by laying the groundwork for adaptable online verification workflows,
    - Adapt and respond to new regulations.
  • Automating Your Third-Party Risk Management Program Recorded: Jul 25 2019 77 mins
    Colin Whittaker, IRD; Chris Poulin, BitSight; Jason Sabourin, OneTrust; Szuyin Leow, LogicGate; Todd Boehler, ProcessUnity.
    The current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and according to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes. Given the growing complexities in accurately collecting and screening third-party data and the need for deeper due diligence, automation is key to a successful risk program. However, many corporations haven’t adopted automation in their third-party risk management programs.

    The lack of automation adoption can be traced to a few core reasons. Disparate systems, out-of-date data, and inconsistent policies can all stifle a company’s ability to modernize their third-party risk management program, and companies often suffer from more than one of these. When applied effectively, automation can not only help prevent these roadblocks; it can also drive the efficiencies procurement and compliance leaders are looking for. Join this CPE accredited panel webinar as our expert panel address some key steps to automating third-party risk management, including how to:

    -Manage an up-to-date vendor master to create one source of truth across the entire corporation,
    -Leverage automation and machine learning to standardize data governance,
    -Drive efficiencies and reduces costs, while ensuring the highest accuracy in your third-party risk management program.
Empowering the GRC Community
The IT GRC Forum produces online events and provides professional networking facilities and market intelligence to Governance, Risk Management and Compliance professionals.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Extending Your Enterprise Risk Management Program
  • Live at: Jul 21 2010 6:00 pm
  • Presented by: Michael Rasmussen; Corporate Integrity, President & Chris Noell; EVP, Product management of TruArx
  • From:
Your email has been sent.
or close