Browse communities
Browse communities
Presenting a webinar?

BCM Policy, Risk Assessment, BIA: Part 2

Carlos Krause, CISSP, CISA, MCSO, Manager of Professional Services, Modulo
Join part 2 of this 3 part series as we show you how to improve your Business Continuity Management, learn about creating an effectiveBCM Policy, Risk Assessments, and BIA.
Oct 29 2013
49 mins
BCM Policy, Risk Assessment, BIA: Part 2
BCM GRC IT
Join us for this summit:
  • Live and recorded (2029)
  • Upcoming (60)
  • Date
  • Rating
  • Views
  • Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.

    Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.
  • If you run more then one solution when backing up and recovering your data it can be hard to keep track of which solution does what. Check out how our single solution can fill in all the gaps and make it less complicated to manage multiple solutions at one time.
  • The connected device has made our lives more mobile, efficient, flexible and easier to manage. Connected devices and apps help us with everything from fitness to managing our schedules and make music tailored to our current whim accessible and easy to play anywhere. Connected devices for our home such as thermostats, alarms and home automation, make managing our energy use simple and allow us to manage appliances and doors remotely. In the event of a problem they alert us so we can act wherever we are. Finally, the advantages of the connected device are making their way into our IT world.

    The limitations, complexity and fragility of traditional storage are now being supplanted by cloud connected storage. This new model for file (unstructured data) storage combines the scalability, durability, flexibility and mobility of a cloud service with performance and security of a local NAS system. Join us to learn how this new model can empower collaboration across distant locations while making IT's life easier by eliminating costly problems such as backup, DR, distribution and replication associated with the typical storage stack.
  • The connected device has made our lives more mobile, efficient, flexible and easier to manage. Connected devices and apps help us with everything from fitness to managing our schedules and make music tailored to our current whim accessible and easy to play anywhere. Connected devices for our home such as thermostats, alarms and home automation, make managing our energy use simple and allow us to manage appliances and doors remotely. In the event of a problem they alert us so we can act wherever we are. Finally, the advantages of the connected device are making their way into our IT world.

    The limitations, complexity and fragility of traditional storage are now being supplanted by cloud connected storage. This new model for file (unstructured data) storage combines the scalability, durability, flexibility and mobility of a cloud service with performance and security of a local NAS system. Join us to learn how this new model can empower collaboration across distant locations while making IT's life easier by eliminating costly problems such as backup, DR, distribution and replication associated with the typical storage stack.
  • Inflexible, constrained, locked in, dependent are all terms we hear used to talk about the IT solutions being used in today’s datacenters. Datacenters are complex with a variety of physical, virtual, and cloud platforms for both computing and storage. Solutions that promise to make a datacenter more manageable, often lock you in to specific platforms or singular processes.

    Join this session with Andy Ebbs to learn about the top 10 technical capabilities needed to ensure that you are able to freely move your workloads to run on the best platform, and protect them wherever they are running.
  • The ability of public sector organizations to accomplish their missions depends on reliable connectivity. Now, more than ever, these network connections must be mobile, rugged, and secure – but most of all, they must be flexible.

    At the federal, state, and local level, as well as at institutions of higher learning, the opportunities to gain efficiency and manage budgets through mobile connectivity are increasing exponentially. Cradlepoint enables the public sector to quickly implement networking solutions that are powerful, flexible, easy to manage, and easy to scale; without busting tight budgets.

    Join us for a webinar to learn how Cradlepoint solutions make it easy for public sector organizations to adapt their networks to take advantage of 3G/4G LTE wireless to provide the strongest signal at the best price in any given location.
  • The “consumerization of IT” is largely represented by public cloud services. But when it comes to cloud file sync – a technology that is centered on storing, accessing, and sharing data – many businesses are taking pause at public hosting. In this BrightTALK exclusive webinar, learn why deploying cloud file sync in a private environment may be worth considering.
  • The “consumerization of IT” is largely represented by public cloud services. But when it comes to cloud file sync – a technology that is centered on storing, accessing, and sharing data – many businesses are taking pause at public hosting. In this BrightTALK exclusive webinar, learn why deploying cloud file sync in a private environment may be worth considering.
  • IRM is leading the debate on risk culture. Drawing upon the wealth of practical experience and expert knowledge across the institute, we have developed guidance for organisations wanting a greater understanding of their own risk culture and practical tools that can be applied to drive change.

    As seen in the business press every day, embedding risk management into an organisation to the extent that it reliably makes a difference is a difficult task. To achieve this, boards must keep how to manage risks high on their agenda, and to continue asking themselves, whether they have the right culture, people and processes.

    What do we mean by risk culture?

    Risk culture is a term describing the values, beliefs, knowledge, attitudes and understanding about risk shared by a group of people with a common purpose, in particular the employees of an organisation. This applies to all organisations from private companies, public bodies, governments to not-for-profits.

    What does a good risk culture look like?

    An effective risk culture is one that enables and rewards individuals and groups for taking the right risks in an informed manner.
  • With over half of companies not feeling well enough prepared for an IT disaster according to recent research, Ian Daly of Plan B Disaster Recovery will be sharing his best practices on how to build a DR solution you can trust. In this webinar we’ll cover:

    - What counts as an IT disaster?
    - What are the common causes?
    - How can you better prepare for an IT disaster?
    - Testing – what should you be testing and how often?
    - What level of reliability should you be striving to achieve?
    - How to maintain trust in your disaster recovery solution
  • Channel
  • Channel profile
  • GRC Process Automation Apr 2 2015 3:30 pm UTC 60 mins
    Carlos Krause, CISSP, Head of Professional Services - Modulo
    Many organizations still use spreadsheets and emails for business critical processes related to Governance, Risk, and Compliance (GRC) management. These more “manual” processes become burdensome as infrastructure scales out or new compliance and policy requirements emerge. Without a traceable and efficient way to perform, track, and report GRC assessment results, organizations face the possibility of failing audits, costly fines, and reputation damage.

    Modulo’s solutions for GRC help automate processes, which improve the efficiency and traceability of GRC activities. Modulo’s Risk Manager™ software automates GRC tasks based on both proven processes aligned with international standards and on your own established methodologies.

    In this session, learn how to:
    • Align processes to the “plan, do, check, act” methodology
    • Replicate and improve internal processes using an easily configurable workflow tools
    • Build and send user-friendly, traceable surveys
    • View assessment results in detailed and high-level dashboards and reports
    • Leverage audit log to monitor the history of assessment participation and issue remediation
  • GRC inside-out: Preparing for & deploying GRC automation Recorded: Feb 26 2015 67 mins
    Carlos Krause, Modulo & Tony UcedaVelez, VerSprite
    Good security risk management begins with a repeatable process within security governance, risk management, and compliance (GRC). GRC and many security risk management processes fail when organizations rely too much on point-solution technologies rather than repeatable processes.

    Do you have an optimal security risk management program? Two experts discuss security risk management best practices and “quick-win” GRC automation opportunities. In this live webinar, learn how to:

    Create governance for security risk management
    Identify gaps in foundational processes
    Build a GRC automation deployment timeline
  • Modulo Risk Manager: What's New v9.1 Recorded: Jan 21 2015 15 mins
    John Ambra, Chief Product Officer, Modulo
    Demo video of Modulo Risk Manager Version 9.1, featuring enhanced functionality for the following Modulo Risk Manager’s modules: GRC Intelligence; Policy; Organization, Risk, Compliance, Workflow; as well as improved system stability and performance, low-impact bug fixes and a new version of the installer, released initially for internal use, to help speed up the installation process.
  • Is Your Vulnerability Management Program Vulnerable? (Part 2) Recorded: Dec 18 2014 59 mins
    Carlos Krause, Manager of Professional Services, CISSP, CISA, MCSO
    Is your vulnerability management program vulnerable? If you are unsure or answered “yes," sign up to join Carlos Krause, Modulo’s lead technical consultant for Part 2 of this two-part webinar series.

    In Part 1, Carlos identified key challenges and pitfalls most vulnerability management programs face. In Part 2, he will outline best practices and action items to improve your vulnerability management process, including how to:

    *Integrate your vulnerability management program with the risk and compliance actions in the organization
    *Harmonize vulnerability metrics with other programs and assessments
    *Represent risks in a business language
    *Plan and deploy a successful implementation

    Carlos Krause presented this topic at ISACA ISRM 2014 at a record-setting Megatrend Session. Due to its popularity, we wanted to bring it to you in a webinar series. Don’t miss out!
  • Is Your Vulnerability Management Program Vulnerable? (Part 1) Recorded: Dec 11 2014 56 mins
    Carlos Krause, Manager of Professional Services, CISSP, CISA, MCSO
    In this webinar, Carlos Krause, Modulo’s lead technical consultant, will identify key challenges and pitfalls most vulnerability management programs face, including how to:

    *Understand the main components and steps of an efficient vulnerability management program
    *Define requirements and criteria for scoping, collecting, analyzing, evaluating, accepting, and treating vulnerabilities
    *Identify the pitfalls of a typical vulnerability management implementation

    To learn more about best practices and action items to improve your vulnerability management process and reduce enterprise risk, join us for Part II on Thursday December 18 at 11:30am ET.
  • Adapting Your Risk Management Framework for New Regulations Recorded: Oct 22 2014 60 mins
    Lillibett Machado, MBA, CISA, CISM, CGEIT, CRISC, ITIL-BSM
    Cadence Bank recently established the Technology & Operations Governance and Risk Management under the Enterprise Risk Management function reporting to the Board of Directors of the bank. On a recent regulatory audit, the ERM team was recognized for achieving a workable governance framework and integrating the Technology Governance and Risk Management, using Modulo’s GRC automation software as the technology to help execute all our risk and compliance assessments. GRC automation software facilitated Cadence Bank’s objective of achieving the implementation of the new regulatory requirement of the “Three Levels of Defense” being enforced by the regulatory agencies.

    Learn how in this case study, as Cadence Bank’s CISO Lillibett Machado discusses ways to develop a technology GRC framework and use automation to facilitate the new functions required for the CISO’s responsibilities within GRC.
  • Proven Risk Management Automation Methods in Ten Use Cases Recorded: Oct 8 2014 61 mins
    Rich Licato
    This webinar features Modulo Risk Manager customer Rich Licato, Managing Director, Corporate Security for Airlines Reporting Corporation (ARC). Rich explores the breadth of GRC use cases ARC has deployed, including:

    - Audit Remediation
    - Vulnerability Management / Pen Testing
    - PCI and ISO Compliance
    - SANS Top 20 Critical Security Controls
    - Vendor Management
    - Employee Policy Attestation
    - Operational Incidents
    - Enterprise Risk Management
    - Metrics
    - Business Continuity

    Rich will discuss some of his strategies around deploying the different applications of GRC automation and share the highlights of his successes.
  • "Is Security Unachievable?" Recorded: Sep 17 2014 62 mins
    Doug Powell of BC Hydro and Steve Hunt of Hunt Business Intelligence
    As we move toward interconnected, "smart" systems, security professionals must play a focused role in enterprise risk management. Doug Powell, critical infrastructure protection professional and security industry thought leader, and Steve Hunt, security industry luminary and analyst, team up to debate the continually increasing complexity of the environment in which security professionals operate, in light the Snowden breach, the Internet of Things, cyberhackers, and looming national threats. During this webinar, Powell and Hunt will debate the possibility of achieving true security and give some practical, actionable recommendations for modern age security risk management. Questions addressed include:

    • Does physical security have any impact on information protection?
    • Is it possible for IT, Operational Technology, and physical security to work together?
    • Can an integrated process and program ensure security meets business objectives?
  • Governance, Risk, and Compliance for Physical Security Recorded: Sep 4 2014 6 mins
    Modulo, LLC
    A 5 minute guide on how to get the most out of integrating physical security risk management within an automated GRC program.
  • Physical-IT Risk Convergence in Practice Recorded: Aug 13 2014 57 mins
    Steve Hunt and Marco Conti
    Expert Analyst Steve Hunt of Hunt Business Intelligence and Modulo's Marco Conti present perspectives on theoretical versus applied convergence of physical and IT security.
  • Beyond IT: Third Party Risk Recorded: Jul 15 2014 53 mins
    Steve Bartolotta, Yale New Haven Health System
    When an automated third party risk management program is in place, risk assessments are performed more efficiently and effectively, allowing for additional analyses on third party criticality and faster, smoother expansion of third party networks. The right third party risk solution will also increase visibility and report security and compliance based on the activities and departments third parties support.

    Watch this end-user case study and learn how to…

    - Understand the basics of risk and risk management
    - Understand the importance of utilizing a risk management process
    - Be able to identify, analyze, evaluate, and manage your enterprise third party risks
    - Consider GRC to automate and synchronize efforts in your third party risk management
  • Optimizing Governance & Risk Management in an Age of Advanced Threats Recorded: Jul 1 2014 50 mins
    Steve Hunt and Vic Wheatman
    Steve Hunt of Hunt Business Intelligence and SecurityCurrent analyst Vic Wheatman present how to prepare for and manage risk in an “age of advanced threats."
  • Supply Chain Security Risk Management Recorded: Jun 4 2014 51 mins
    Barrett Hightower & Portia Mllls
    With ever increasing security threats and other widespread supply chain disruptions, Supply Chain Security (SCS) is now officially a reality of both day-to-day business and trade compliance. View this webinar to learn how Supply Chain Security (SCS) Risk Management addresses heightened threats to the supply chain including cyber-terrorism, organized crime, theft and tampering, and country-of-origin risks.
  • "Enterprise Security Risk Management" - Part 2 Recorded: May 21 2014 59 mins
    Doug Powell, Steve Hunt
    Doug Powell, Manager of SMI Security, Privacy & Safety at BC Hydro, and Steve Hunt, CEO of Hunt Business Intelligence, continue the discussion on ESRM for Critical Infrastructure protection. Key topics include integrating operational, technological, and physical security; the criticality of people, process, and technology in CI protection; and the need for a unified GRC model to make business run better.
  • ”Enterprise Security Risk Management” - Part 1 Recorded: May 6 2014 60 mins
    Doug Powell, Steve Hunt
    Doug Powell, Manager of SMI Security, Privacy & Safety at BC Hydro, and Steve Hunt, CEO of Hunt Business Intelligence, present ESRM for Critical Infrastructure protection. Key topics include integrating operational, technological, and physical security; the criticality of people, process, and technology in CI protection; and the need for a unified GRC model to make business run better.
  • What's New Modulo Risk Manager v8.4 Recorded: Apr 22 2014 41 mins
    John Ambra
    Modulo Director of Technical Services John Ambra walks Risk Manager users through the latest version 8.4, and answers user questions at the end.
  • "You, Too, Can Enjoy Being Audited!" Recorded: Apr 16 2014 56 mins
    David Moule
    David Moule, Manager of IT Security Operations at Allied Irish Bank, discusses how AIB has leveraged Modulo Risk Manager™ to mature their Vulnerability Management process, remedy “on the fly” VM needs, and successfully navigate an internal audit.
  • Business Relevant IT Risk Management Recorded: Mar 11 2014 55 mins
    Carlos Krause, CISSP, Manager of Professional Services
    Business Relevant IT Risk Management for IT. Audit, Assurance, Security, Risk and Governance professionals. Learn how you can develop a GRC program that encompasses broader Enterprise Risk Management initiatives.
  • Effective ERM for Security Officers, a Customer Case Study Recorded: Jan 15 2014 56 mins
    Rich Licato, Managing Director, Corporate Security ARC
    Rich Licato, Managing Director, Corporate Security Airline Reporting Corporation (ARC) and Modulo customer will discuss how he built his GRC program to include ERM. By tackling his goal to automate the ISO27001 certification process and ongoing risk assessments, he established a platform upon which he could establish successful and effective ERM. `
  • Incident Response, Plans and Procedures: Part 3 Recorded: Dec 4 2013 45 mins
    Carlos Krause, CISSP, CISA, MCSO, Manager of Professional Services, Modulo
    Improve your Business Continuity Management: learn effective methods for BCP and DRP execution, and more.
Flexible, scalable, affordable :: Solutions for GRC
Modulo provides flexible, scalable and affordable GRC solutions for the leaders in information and risk management. Modulo's software solutions for governance, risk, and compliance allow users to better manage technology risk, compliance, and policy requirements, monitor critical assets, and ensure good governance and business continuity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: BCM Policy, Risk Assessment, BIA: Part 2
  • Live at: Oct 29 2013 3:00 pm
  • Presented by: Carlos Krause, CISSP, CISA, MCSO, Manager of Professional Services, Modulo
  • From:
Your email has been sent.
or close
You must be logged in to email this