BCM Policy, Risk Assessment, BIA: Part 2

Carlos Krause, CISSP, CISA, MCSO, Manager of Professional Services, Modulo
Join part 2 of this 3 part series as we show you how to improve your Business Continuity Management, learn about creating an effectiveBCM Policy, Risk Assessments, and BIA.
Oct 29 2013
49 mins
BCM Policy, Risk Assessment, BIA: Part 2
BCM GRC IT
Join us for this summit:

Webinars and videos

  • Live and recorded (1540)
  • Upcoming (34)
  • Date
  • Rating
  • Views
  • *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether its PCI DSS, SOX, HIPPA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data.

    Join Dave Shackleford, IT security consultant and founder of Voodoo Security, as he breaks down these updated requirements and how to remain current while securing your business.

    Attend this webcast and learn:
    - Best practices for protecting data in today’s complex security landscape

    - Latest updates to compliance mandates pertaining to data encryption

    - What these updates mean to your security teams.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • David Moule, Manager of IT Security Operations at Allied Irish Bank, discusses how AIB has leveraged Modulo Risk Manager™ to mature their Vulnerability Management process, remedy “on the fly” VM needs, and successfully navigate an internal audit.
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. Steve Smith, Senior Technical Manager at McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • 10 minute "whiteboard" style video that explains what Quorum does and the unique value for mid-market organizations
  • Channel
  • Channel profile
Up Down
  • What's New Modulo Risk Manager v8.4 Recorded: Apr 22 2014 41 mins
    Modulo Director of Technical Services John Ambra walks Risk Manager users through the latest version 8.4, and answers user questions at the end.
  • "You, Too, Can Enjoy Being Audited!" Recorded: Apr 16 2014 56 mins
    David Moule, Manager of IT Security Operations at Allied Irish Bank, discusses how AIB has leveraged Modulo Risk Manager™ to mature their Vulnerability Management process, remedy “on the fly” VM needs, and successfully navigate an internal audit.
  • Business Relevant IT Risk Management Recorded: Mar 11 2014 59 mins
    Business Relevant IT Risk Management for IT. Audit, Assurance, Security, Risk and Governance professionals. Learn how you can develop a GRC program that encompasses broader Enterprise Risk Management initiatives. Note this video begins after 00:03:30.
  • Effective ERM for Security Officers, a Customer Case Study Recorded: Jan 15 2014 56 mins
    Rich Licato, Managing Director, Corporate Security Airline Reporting Corporation (ARC) and Modulo customer will discuss how he built his GRC program to include ERM. By tackling his goal to automate the ISO27001 certification process and ongoing risk assessments, he established a platform upon which he could establish successful and effective ERM. `
  • Incident Response, Plans and Procedures: Part 3 Recorded: Dec 4 2013 45 mins
    Improve your Business Continuity Management: learn effective methods for BCP and DRP execution, and more.
  • Embracing Shadow IT: Encouraging innovation within a secure infrastructure Recorded: Nov 20 2013 47 mins
    Shadow IT serves as an important innovation source but also presents significant risks to information security. How can you control Shadow IT without stifling it?

    Understanding Shadow IT's pros and cons
    Managing risk within a Shadow IT infrastructure
    Knowing when and how to encourage innovation and growth
  • BCM Policy, Risk Assessment, BIA: Part 2 Recorded: Oct 29 2013 49 mins
    Join part 2 of this 3 part series as we show you how to improve your Business Continuity Management, learn about creating an effectiveBCM Policy, Risk Assessments, and BIA.
  • Modulo Risk Manager: What's New v8.3 Recorded: Oct 7 2013 46 mins
    Online demo of Modulo Risk Manager Version 8.3, featuring an updated release of the Enterprise Risk Management (ERM) beta module and over 150 product enhancements to the core platform capabilities as well as to the Business Continuity Management (BCM) module and to Vendor Risk Management. The presentation will be 45 minutes, with 15 minutes at the end for Q&A.
  • Your Guide to Effective Business Continuity Management: Part 1 Recorded: Oct 1 2013 44 mins
    Improve Business Continuity Management, learn techniques to strengthen strategies, streamline BIA and plan-making, and learn best practices in plan delivery and management.
  • Beyond IT: How Secure is Your Extended Enterprise? Recorded: Aug 15 2013 46 mins
    Has 3rd Party & Supplier management (Vendor Risk Management or VRM) moved above and beyond IT? Traditionally, VRM programs and technology support IT initiatives to protect sensitive, personal, or proprietary customer and enterprise information. Today, forward-thinking technology-driven enterprises are stretching the definition and role of VRM to determine third-party vendor/supplier/partner criticality to the business, improve vendor relationships and processes, and report security & compliance across the extended enterprise. Michael Rasmussen, GRC market evangelist and educator, explores the expanded role of VRM beyond the IT world – both in what innovative end-users are doing today and how vendors are paving the way for tomorrow.
  • Modulo Risk Manager: What's New v8.2 Recorded: Aug 2 2013 38 mins
    Online demo of Modulo Risk Manager Version 8.2, featuring the first release of the new Enterprise Risk Management (ERM) module and over 150 product enhancements to the core platform capabilities as well as the Business Continuity Management (BCM) module. The presentation will be 45 minutes, with 15 minutes at the end for Q&A.
  • The Challenges of Smart Grid IT Security Recorded: Feb 22 2013 4 mins
    Doug Powell discusses the challenges IT security challenges he faces at BD Hydro and how why he chose Modulo as his GRC tool.
  • Cybersecurity Challenges Recorded: Aug 2 2012 5 mins
    Join:

    Bob Bragdon, Publisher, CSO Magazine;
    Joe Gottlieb, President and CEO, Sensage;
    Matt Greorgy, CEO, Endgame Systems;
    Douglas Maughan, Division Director, Cyber Security Division, Department of Homeland Security
    Ted Schlein, Managing Partner, KPCB;
    Nicko van Someren, CTO, Good Technology
    Sergio Thompson-Flores, CEO, Modulo;

    as they discuss the top cybersecurity challenges of 2012 - from new threat vectors to perennial issues of people and process.
  • Leveraging Public - Private Collaboration Recorded: Aug 2 2012 4 mins
    Join a star studded cast as they cover the value of public - private collaboration in the cybersecurity field.

    Bob Bragdon, Publisher, CSO Magazine
    Matt Greorgy, CTO, Endgame Systems;
    Rob Mancini, CTO, District of Columbia
    Richard Schaeffer, Principal, SINET;
    Ted Schlein, Partner, KPCB;
    Sergio-Thompson Flores, CEO, Modulo
    Robert Rodriguez, Chairman, SINET
  • Modulo GRC - Standardization and Flexibility Recorded: Jul 25 2012 3 mins
    Sergio Thompson-Flores, CEO of Modulo speaks to the future of GRC, what is missing and what collaborative efforts in the industry are leading the way.
Flexible, scalable, affordable :: Solutions for GRC
Modulo provides flexible, scalable and affordable GRC solutions for the leaders in information and risk management. Modulo's software solutions for governance, risk, and compliance allow users to better manage technology risk, compliance, and policy requirements, monitor critical assets, and ensure good governance and business continuity.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: BCM Policy, Risk Assessment, BIA: Part 2
  • Live at: Oct 29 2013 3:00 pm
  • Presented by: Carlos Krause, CISSP, CISA, MCSO, Manager of Professional Services, Modulo
  • From:
Your email has been sent.
or close
You must be logged in to email this