The What, How, Why, and Where's of BCM Certification

John DiMaria (HISP, AMBCI, Six Sigma Black Belt), Product Marketing Manager, BSI Group America Inc.
This webinar will provide an Introduction and overview of ISO 22301. Topics also include:

· Status on global adoption rates
· Status of BS25999 and other standards, in the US
· How does ISO 22301 fit within the PS-Prep Program?
· Transitioning to ISO 22301
· The value of this certification.
Sep 18 2012
64 mins
The What, How, Why, and Where's of BCM Certification
ISO 22301 BS25999 PS Prep
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2865)
  • Upcoming (84)
  • Date
  • Rating
  • Views
  • Join us for this live webinar where we will walk through a real-world example in which FireEye Managed Defense analysts utilized the FireEye Platform’s MVX virtual machine technology and endpoint response capabilities to identify, alert, and remediate an active Advanced Persistent Threat (APT) attack.

    In this case study we will cover:

    • How the attacker executed a “smash-and-grab” attack aimed at stealing intellectual property.
    • How FireEye detected the attack as it was beginning and re-secured the network and prevented sensitive data from leaving the client’s networks.
    • Best practices for investigating and responding to similar attacks.
  • Today most companies are witnessing an explosion in the amount of data that they store. According to recent estimates, large databases grow by 65% year over year and 85% of the data contained in these large databases is inactive. This often out-of-control data growth stems from a variety of sources and can have a negative impact on application performance, database management tasks, and overall total costs.

    During this webinar, learn how you can improve application performance while simplifying IT for Oracle applications with Informatica Smart Partitioning and Oracle ZS3 storage appliance.

    In this event, we will share how the combination of Oracle Tiered Storage and Informatica Data Archive Smart Partitioning:
    Reduces the cost of data by enabling storage tiering and compression of referentially intact data partitions
    Improves application performance up to a factor of 6X or more by automatically optimizing datasets for user requests
    Eliminates complex archiving strategies and provides full and rapid access to archived data from the native Oracle Application
  • Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Protiviti's IT Priorities Survey results reveal 2/3 companies are going through a major IT transformation in 2014. Join Protiviti's IT Consulting managing directors to discuss why.
  • Security professionals are increasingly realizing that protecting executives and corporate assets requires more than just “guns and guards.” It requires a proactive strategy to identify and prevent a threat, rather than reacting to one. So how can security professionals be proactive and minimize the threats that originate from the Internet?

    In this webcast we’ll look at how you can use an individual’s online “footprint” to identify potential threats and develop a more effective security plan. We’ll also present a case study of one of our own executives and show why online threat intelligence is not the same as news alerts or monitoring social media for brand buzz.
  • Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customer identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.
    On April 24th at 1pm ET, please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interaction.
  • Presented by the experts with the facts.

    The Inside Story of the Discovery, the Timeline and Solutions to Protect Your Organization. Finally, All of Your Questions Answered.

    Join the conversation and get the latest Heartbleed updates by following @CodenomiconLTD
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Email Gateway 7.6 including advanced threat defense, hybrid cloud setup and ”ClickProtect” spear phishing protection.
  • Channel
  • Channel profile
Up Down
  • Automating ISO 22301 Global BCMS Standard Recorded: Feb 20 2013 58 mins
    ISO 22301 details a quality, globally accepted, auditable BCMS standard. Like all ISO's, it results from expert work and is blessed by 160+ countries. Organizations can benefit from global acceptance, good practices, and management experience.

    This webinar covers the overall need for automation to support ISO 22301, with an exploration of six major program management areas where software can be exceptionally helpful for the new standard, as follows:
    • BIA and RA analysis (8.2.2, 8.2.3)
    • Resources and planning (8.3.2, 8.4.4)
    • Testing and exercise management (8.5)
    • Crisis mgt/comms (8.4.2, 8.4.3)
    • Audit reporting (9.2)
    • Corrective actions (10.1)
  • ISO 22313 - A briefing on ISO 22313. Recorded: Jan 15 2013 39 mins
    A briefing on the new ISO 22313 business continuity management guidance standard. Includes a longer than usual Q and A session.

    Tim McGarr has been the Sector Content Manager for business continuity and risk management for the British Standards Institution since 2009. Tim has responsibility for the progression of business continuity and risk management national and international standards (ISO 22301, ISO 31000, etc) and related BSI products. Prior to BSI, Tim spent five years at the legal publisher LexisNexis working in the strategy and acquisitions department setting the future direction of the organization. Before this, Tim worked as a management consultant with Logica and an internal consultant for BT. Tim has an MBA from HEC in Paris and a degree in Management from Manchester University.
  • Business continuity planning in a small / medium sized business Recorded: Nov 27 2012 64 mins
    Webinar Description - Smaller businesses bring their own business continuity challenges. This webinar explores these and provides some ideas for quick-wins.

    Speaker Bio - John is a business continuity professional with over 20 years’ continuity-related consultancy and software experience. He has provided continuity expertise to organisations worldwide, delivering ICT and business solutions to the public, private and voluntary sectors. He created and delivered the Resilience Benchmarking Project on behalf of the UK Tripartite Authorities, measuring BCM competency across the top 80 banks and financial institutions using the INONI platform; in recognition of this, he received the industry’s Lifetime Achievement Award. Previous roles include Head of Consulting and R&D Director of NeverFail Group plc, Head of Consulting at Safetynet plc and Managing Consultant for PA Consulting Group, with prior work for ITT, STC and ICL. He holds an MSc from Birmingham University in Electronic and Electrical Systems and a BSc from the University of Aston-in-Birmingham in Integrated Sciences and Systems. He is also a Fellow of the Business Continuity Institute (FBCI).
  • Putting ‘management’ into BCM Recorded: Nov 13 2012 62 mins
    Description of Webinar Topic - Areas of focus are suggested where the business continuity manager could implement changes in their approach and better identify the needs that executives have of the BCM program.

    Speaker BIo - Ken Simpson is an independent management consultant, based in Australia, who has worked in and around the field of Business Continuity for over 20 years. His multiple careers have spanned public and private sectors, IT (where he held roles as a CIO and CTO), leading internal BCM functions, hands-on experience recovering from a major disaster and 15 years working in his own boutique consulting firm where he has gained extensive experience designing and delivering Executive-level Crisis Simulation exercises. This diverse experience enables him to bring a unique perspective to the subject of BCM. Ken holds a Masters in Business Administration, is a Member of the Business Continuity Institute and a Certified Organizational Resilience Professional (ICOR). He is also a member of the BCI Partnership group that developed a number of papers on the disciplines that support resilience and an active blogger on these issues.


    Time Zones - Please note that Ken will be delivering from Canberra, Australia at 10pm local time (which is 6am EST in New York city and 11am London, UK).
  • The What, How, Why, and Where's of BCM Certification Recorded: Sep 18 2012 64 mins
    This webinar will provide an Introduction and overview of ISO 22301. Topics also include:

    · Status on global adoption rates
    · Status of BS25999 and other standards, in the US
    · How does ISO 22301 fit within the PS-Prep Program?
    · Transitioning to ISO 22301
    · The value of this certification.
The International Business Continuity Portal
Continuity Central is the world's largest and most highly visited BCM website, providing a frequently updated one-stop resource of business continuity management news, jobs and information.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The What, How, Why, and Where's of BCM Certification
  • Live at: Sep 18 2012 3:00 pm
  • Presented by: John DiMaria (HISP, AMBCI, Six Sigma Black Belt), Product Marketing Manager, BSI Group America Inc.
  • From:
Your email has been sent.
or close
You must be logged in to email this