Browse communities
Browse communities
Presenting a webinar?

The What, How, Why, and Where's of BCM Certification

John DiMaria (HISP, AMBCI, Six Sigma Black Belt), Product Marketing Manager, BSI Group America Inc.
This webinar will provide an Introduction and overview of ISO 22301. Topics also include:

· Status on global adoption rates
· Status of BS25999 and other standards, in the US
· How does ISO 22301 fit within the PS-Prep Program?
· Transitioning to ISO 22301
· The value of this certification.
Sep 18 2012
64 mins
The What, How, Why, and Where's of BCM Certification
ISO 22301 BS25999 PS Prep
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

  • Live and recorded (3358)
  • Upcoming (65)
  • Date
  • Rating
  • Views
  • Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen

    Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
    Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
    Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
    Erfahren Sie:
    • Etablieren und Umsetzung von Security Configurations
    • Automatisierung und Durchführung von regelmäßigen Configuration Assessments
    • Priorisierung und Umsetzung von Remedation Workflows
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Web applications are a favourite target for hackers, so their safety must be a priority. Using an application firewall can enable active protection from known and zero-day threats. Join us to find out how Qualys Web Application Firewall combines scalability and simplicity delivered in the cloud to block attacks fast—without the substantial cost of traditional solutions.
  • Digital Identities have become the new perimeter in the fight against cybercriminals. Businesses need to come together to coordinate an effective defence and real time sharing of internet scale intelligence.

    * Explosive Cybercrime growth comes from criminals leveraging the internet – how can we use that same leverage to our advantage?
    * We can’t trust the endpoint and we can’t trust the user credentials – how do we operate in this new world?
    * How can real time sharing of anonymous Digital Identity behavior provide a new type of protection while offering improvements in end user experience?
  • ...contre les applications Web de manière rapide et rentable

    Les applications Web sont la cible privilégiée des pirates. Leur sécurité doit donc être une priorité. Un firewall applicatif assure une protection active contre les menaces connues et Zero Day. Rejoignez-nous afin de découvrir comment le service de firewall pour applications Web proposé par Qualys associe évolutivité et simplicité via le Cloud pour bloquer rapidement les attaques, sans les coûts importants liés aux solutions classiques.
  • Make sure that you have a full overview of the security posture of all of your IT assets. Join us to find out how Qualys helps you to scan remote complex networks—including everything and everybody from remote workers, point of sales, data centers and IAAS providers. Now you can you get a better picture of potential vulnerabilities—preventing breaches and reducing risk.
  • ...ou vos réseaux IP qui se chevauchent !

    Assurez-vous un aperçu complet de l’état de la sécurité de tous vos actifs IT. Rejoignez-nous pour savoir comment Qualys vous aide à analyser des réseaux distants complexes et notamment tous les intervenants et ressources, qu’il s’agisse de collaborateurs distants, de points de vente, de centres de données ou de fournisseurs IAAS. Vous pouvez désormais obtenir une meilleure image des vulnérabilités potentielles afin de prévenir les failles et de réduire les risques.
  • Channel
  • Channel profile
  • Automating ISO 22301 Global BCMS Standard Recorded: Feb 20 2013 58 mins
    CHRIS ALVORD, COOP SYSTEMS FOUNDER, CEO, CBCP, MBCI, OCEG RISK, ISO 22301 LEAD AUDITOR
    ISO 22301 details a quality, globally accepted, auditable BCMS standard. Like all ISO's, it results from expert work and is blessed by 160+ countries. Organizations can benefit from global acceptance, good practices, and management experience.

    This webinar covers the overall need for automation to support ISO 22301, with an exploration of six major program management areas where software can be exceptionally helpful for the new standard, as follows:
    • BIA and RA analysis (8.2.2, 8.2.3)
    • Resources and planning (8.3.2, 8.4.4)
    • Testing and exercise management (8.5)
    • Crisis mgt/comms (8.4.2, 8.4.3)
    • Audit reporting (9.2)
    • Corrective actions (10.1)
  • ISO 22313 - A briefing on ISO 22313. Recorded: Jan 15 2013 39 mins
    Mr. Tim McGarr
    A briefing on the new ISO 22313 business continuity management guidance standard. Includes a longer than usual Q and A session.

    Tim McGarr has been the Sector Content Manager for business continuity and risk management for the British Standards Institution since 2009. Tim has responsibility for the progression of business continuity and risk management national and international standards (ISO 22301, ISO 31000, etc) and related BSI products. Prior to BSI, Tim spent five years at the legal publisher LexisNexis working in the strategy and acquisitions department setting the future direction of the organization. Before this, Tim worked as a management consultant with Logica and an internal consultant for BT. Tim has an MBA from HEC in Paris and a degree in Management from Manchester University.
  • Business continuity planning in a small / medium sized business Recorded: Nov 27 2012 64 mins
    Mr. John Robinson - FBCI MSc C.Eng
    Webinar Description - Smaller businesses bring their own business continuity challenges. This webinar explores these and provides some ideas for quick-wins.

    Speaker Bio - John is a business continuity professional with over 20 years’ continuity-related consultancy and software experience. He has provided continuity expertise to organisations worldwide, delivering ICT and business solutions to the public, private and voluntary sectors. He created and delivered the Resilience Benchmarking Project on behalf of the UK Tripartite Authorities, measuring BCM competency across the top 80 banks and financial institutions using the INONI platform; in recognition of this, he received the industry’s Lifetime Achievement Award. Previous roles include Head of Consulting and R&D Director of NeverFail Group plc, Head of Consulting at Safetynet plc and Managing Consultant for PA Consulting Group, with prior work for ITT, STC and ICL. He holds an MSc from Birmingham University in Electronic and Electrical Systems and a BSc from the University of Aston-in-Birmingham in Integrated Sciences and Systems. He is also a Fellow of the Business Continuity Institute (FBCI).
  • Putting ‘management’ into BCM Recorded: Nov 13 2012 62 mins
    Mr. Ken Simpson - MBA, MBCI, CORP
    Description of Webinar Topic - Areas of focus are suggested where the business continuity manager could implement changes in their approach and better identify the needs that executives have of the BCM program.

    Speaker BIo - Ken Simpson is an independent management consultant, based in Australia, who has worked in and around the field of Business Continuity for over 20 years. His multiple careers have spanned public and private sectors, IT (where he held roles as a CIO and CTO), leading internal BCM functions, hands-on experience recovering from a major disaster and 15 years working in his own boutique consulting firm where he has gained extensive experience designing and delivering Executive-level Crisis Simulation exercises. This diverse experience enables him to bring a unique perspective to the subject of BCM. Ken holds a Masters in Business Administration, is a Member of the Business Continuity Institute and a Certified Organizational Resilience Professional (ICOR). He is also a member of the BCI Partnership group that developed a number of papers on the disciplines that support resilience and an active blogger on these issues.


    Time Zones - Please note that Ken will be delivering from Canberra, Australia at 10pm local time (which is 6am EST in New York city and 11am London, UK).
  • The What, How, Why, and Where's of BCM Certification Recorded: Sep 18 2012 64 mins
    John DiMaria (HISP, AMBCI, Six Sigma Black Belt), Product Marketing Manager, BSI Group America Inc.
    This webinar will provide an Introduction and overview of ISO 22301. Topics also include:

    · Status on global adoption rates
    · Status of BS25999 and other standards, in the US
    · How does ISO 22301 fit within the PS-Prep Program?
    · Transitioning to ISO 22301
    · The value of this certification.
The International Business Continuity Portal
Continuity Central is the world's largest and most highly visited BCM website, providing a frequently updated one-stop resource of business continuity management news, jobs and information.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The What, How, Why, and Where's of BCM Certification
  • Live at: Sep 18 2012 3:00 pm
  • Presented by: John DiMaria (HISP, AMBCI, Six Sigma Black Belt), Product Marketing Manager, BSI Group America Inc.
  • From:
Your email has been sent.
or close
You must be logged in to email this