Your Guide to Effective Business Continuity Management: Part 1

Carlos Krause, CISSP, CISA, MCSO, Manager of Professional Services, Modulo
Improve Business Continuity Management, learn techniques to strengthen strategies, streamline BIA and plan-making, and learn best practices in plan delivery and management.
Oct 1 2013
44 mins
Your Guide to Effective Business Continuity Management: Part 1
Join us for this summit:

Webinars and videos

  • Live and recorded (1532)
  • Upcoming (36)
  • Date
  • Rating
  • Views
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. Steve Smith, Senior Technical Manager at McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • 10 minute "whiteboard" style video that explains what Quorum does and the unique value for mid-market organizations
  • Virtual Desktop Infrastructure (VDI) places unique performance demands on storage. During the course of the day the I/O traffic changes from heavy read, to heavy write and then ends with a mixture of read and write requirements. This workload profile is so unique that many VDI planners end up selecting a dedicated storage solution for their VDI environment.

    Join Storage Switzerland and Fusion-io for the live webinar event "Avoid the Waste of a VDI-only Storage Solution”.

    In this webinar, you will learn:
    1. The challenges associated with deploying storage for VDI
    2. How current solutions attempt to solve these problems
    3. How to save money by supporting VDI and other application workloads on the same storage
  • Autonomic Software significantly expands the capabilities of McAfee ePO. Autonomic’s three suites are all integrated into ePO with no need for separate console, databases, and reports. They are “As McAfee As McAfee”!

    Autonomic Patch Manager, EndPoint Manager and Power Manager suites provide improved security, and managing of end points, at virtually no charge when incorporating Power Manager.

    Join McAfee and its 2013 MVP Partner of the Year to learn how the integrated solution provides:
    • Increases Scalability – Delivery of patches to both large organizations and small-to-mid-sized organizations
    • Reduces Costs - Using Power & Patch Management Suites
    • Simplifies Complexity - Maintains a secure environment with minimal human intervention using EndPoint Suite
    • Easily Customizable Solutions – For unique requirements
  • SQL is a powerful language that you will learn to use to a greater extent in this talk! Join us to explore some of the less well-known features of SQL and see how they can help in some practical situations. We will also look at some common mistakes and misconceptions and discuss ways of avoiding them. Among the topics:
    - tricks with date and time values
    - use of common table expression and recursive queries
    - use of data change tables
    - use of nested tables
    - use of the MERGE statement
    - and more.

    Nick Ivanov is presenting this talk based on his consulting experience with many customers to maximize use of IBM DB2 and other products; move applications to DB2; and tune database and query performance.
  • As more and more companies look to take advantage of all of the benefits afforded with cloud-based infrastructures, the discussion often quickly turns to “How do we get there?” For some companies, this single migration question can create an insurmountable roadblock that either keeps them from moving to the cloud or severely delays their migration. Join Michael McCracken, HOSTING’s Director of Professional Services, as he explores different cloud migration strategies along with the benefits and risks associated with each of those strategies.
  • Join us for the live webinar on April 10th at 11:30AM ET - 8:30AM PT to discuss the importance of business class file sync, share and collaboration and why the storage team should lead the effort. The webinar will feature George Crump, Founder and Lead Analyst at Storage Switzerland and Soonr’s VP of Products and Security Ahmet Tuncay. The key points they will discuss are:
    1.Why IT Can’t Ignore The File Sync and Share Demand
    2.What to Look For in a Business Class File Sync and Share Product
    3.Why Empowering Collaboration is a Key Next Step for File Sync and Share

    All Pre- registrants will receive an exclusive copy of Storage Switzerland’s latest white paper, “Are File Servers Holding Users Back?”
  • Join this webinar and learn why consistency is the hallmark of an effective, agile organisation. With thousands of moving parts, ensuring that every user, every system is being managed consistently is critical. This webinar will show you how a best practice IT systems management software effectively defines, manages, applies and enforces IT policies across groups of machines.

    A state-of-the art Policy Management system streamlines the process of creating, setting and remotely applying IT policies to groups of systems across a distributed organisation. Administrators need to be able to view all policies from a single dashboard, customise them and assign them based on organisation, group, machine type, platform or any dynamic view of machines to ensure all systems are in compliance. By automating management by policies and enforcement, administrators can then take immediate action to remediate any system that is not in compliance.
    Benefits of a modern Policy Management system are:

    • Ensure distributed systems are in compliance with IT policies or recurring services
    • Streamline the process of applying and updating policies to multiple machines based on organisation, group, department or dynamic view
    • Achieve greater confidence that distributed systems are secure and in compliance
    • Manage policy enforcement of multiple groups of machines, applying varying and nested policies depending on security risk, business use or service level
    • New machines can automatically inherit policy settings without any intervention
  • Protiviti has conducted the second-annual Executive Perspectives on Top Risks Survey. We obtained the views of more than 370 board members and C-suite executives about risks that are likely to affect their organisation in 2014.

    Join Managing Director, Mike Purvis and Director, Dirk Verwohlt for a discussion of the report findings.
  • Channel
  • Channel profile
Up Down
  • Business Relevant IT Risk Management Recorded: Mar 11 2014 59 mins
    Business Relevant IT Risk Management for IT. Audit, Assurance, Security, Risk and Governance professionals. Learn how you can develop a GRC program that encompasses broader Enterprise Risk Management initiatives. Note this video begins after 00:03:30.
  • Effective ERM for Security Officers, a Customer Case Study Recorded: Jan 15 2014 56 mins
    Rich Licato, Managing Director, Corporate Security Airline Reporting Corporation (ARC) and Modulo customer will discuss how he built his GRC program to include ERM. By tackling his goal to automate the ISO27001 certification process and ongoing risk assessments, he established a platform upon which he could establish successful and effective ERM. `
  • Incident Response, Plans and Procedures: Part 3 Recorded: Dec 4 2013 45 mins
    Improve your Business Continuity Management: learn effective methods for BCP and DRP execution, and more.
  • Embracing Shadow IT: Encouraging innovation within a secure infrastructure Recorded: Nov 20 2013 47 mins
    Shadow IT serves as an important innovation source but also presents significant risks to information security. How can you control Shadow IT without stifling it?

    Understanding Shadow IT's pros and cons
    Managing risk within a Shadow IT infrastructure
    Knowing when and how to encourage innovation and growth
  • BCM Policy, Risk Assessment, BIA: Part 2 Recorded: Oct 29 2013 49 mins
    Join part 2 of this 3 part series as we show you how to improve your Business Continuity Management, learn about creating an effectiveBCM Policy, Risk Assessments, and BIA.
  • Modulo Risk Manager: What's New v8.3 Recorded: Oct 7 2013 46 mins
    Online demo of Modulo Risk Manager Version 8.3, featuring an updated release of the Enterprise Risk Management (ERM) beta module and over 150 product enhancements to the core platform capabilities as well as to the Business Continuity Management (BCM) module and to Vendor Risk Management. The presentation will be 45 minutes, with 15 minutes at the end for Q&A.
  • Your Guide to Effective Business Continuity Management: Part 1 Recorded: Oct 1 2013 44 mins
    Improve Business Continuity Management, learn techniques to strengthen strategies, streamline BIA and plan-making, and learn best practices in plan delivery and management.
  • Beyond IT: How Secure is Your Extended Enterprise? Recorded: Aug 15 2013 46 mins
    Has 3rd Party & Supplier management (Vendor Risk Management or VRM) moved above and beyond IT? Traditionally, VRM programs and technology support IT initiatives to protect sensitive, personal, or proprietary customer and enterprise information. Today, forward-thinking technology-driven enterprises are stretching the definition and role of VRM to determine third-party vendor/supplier/partner criticality to the business, improve vendor relationships and processes, and report security & compliance across the extended enterprise. Michael Rasmussen, GRC market evangelist and educator, explores the expanded role of VRM beyond the IT world – both in what innovative end-users are doing today and how vendors are paving the way for tomorrow.
  • Modulo Risk Manager: What's New v8.2 Recorded: Aug 2 2013 38 mins
    Online demo of Modulo Risk Manager Version 8.2, featuring the first release of the new Enterprise Risk Management (ERM) module and over 150 product enhancements to the core platform capabilities as well as the Business Continuity Management (BCM) module. The presentation will be 45 minutes, with 15 minutes at the end for Q&A.
  • The Challenges of Smart Grid IT Security Recorded: Feb 22 2013 4 mins
    Doug Powell discusses the challenges IT security challenges he faces at BD Hydro and how why he chose Modulo as his GRC tool.
  • Cybersecurity Challenges Recorded: Aug 2 2012 5 mins

    Bob Bragdon, Publisher, CSO Magazine;
    Joe Gottlieb, President and CEO, Sensage;
    Matt Greorgy, CEO, Endgame Systems;
    Douglas Maughan, Division Director, Cyber Security Division, Department of Homeland Security
    Ted Schlein, Managing Partner, KPCB;
    Nicko van Someren, CTO, Good Technology
    Sergio Thompson-Flores, CEO, Modulo;

    as they discuss the top cybersecurity challenges of 2012 - from new threat vectors to perennial issues of people and process.
  • Leveraging Public - Private Collaboration Recorded: Aug 2 2012 4 mins
    Join a star studded cast as they cover the value of public - private collaboration in the cybersecurity field.

    Bob Bragdon, Publisher, CSO Magazine
    Matt Greorgy, CTO, Endgame Systems;
    Rob Mancini, CTO, District of Columbia
    Richard Schaeffer, Principal, SINET;
    Ted Schlein, Partner, KPCB;
    Sergio-Thompson Flores, CEO, Modulo
    Robert Rodriguez, Chairman, SINET
  • Modulo GRC - Standardization and Flexibility Recorded: Jul 25 2012 3 mins
    Sergio Thompson-Flores, CEO of Modulo speaks to the future of GRC, what is missing and what collaborative efforts in the industry are leading the way.
Flexible, scalable, affordable :: Solutions for GRC
Modulo provides flexible, scalable and affordable GRC solutions for the leaders in information and risk management. Modulo's software solutions for governance, risk, and compliance allow users to better manage technology risk, compliance, and policy requirements, monitor critical assets, and ensure good governance and business continuity.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Your Guide to Effective Business Continuity Management: Part 1
  • Live at: Oct 1 2013 3:00 pm
  • Presented by: Carlos Krause, CISSP, CISA, MCSO, Manager of Professional Services, Modulo
  • From:
Your email has been sent.
or close
You must be logged in to email this