Enabling ISO 22301 Compliance with RSA Archer Business Continuity Management

Patrick Potter, GRC Strategist, BCM and Audit, RSA
The new global ISO 22301 standard is the critical next step in maturing the Business Continuity Management (BCM) discipline. The standard is becoming the de facto authoritative source as well as the standard for certification.

Why a new standard? What is different about ISO 22301 and why is it replacing other standards that have been recognized for years? The answer can be described in a few key words – strategic, enterprise-wide, framework and organizational resilience.

During this webcast you will:
•Expand your understanding of the ISO 22301 standard
•Learn how RSA Archer Business Continuity Management & Operations (BCM&O) addresses the ISO requirements
•Understand how to implement measures to manage disruptive events
•Be enabled to monitor your program’s effectiveness
•Learn about the RSA Archer BCM & O free trial and special offer

Join us for this live webcast to take advantage of a limited time special offer and learn how RSA Archer GRC can facilitate your organization’s adoption of this critical standard and drive better business continuity planning and execution.
Jun 20 2013
63 mins
Enabling ISO 22301 Compliance with RSA Archer Business Continuity Management
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2855)
  • Upcoming (88)
  • Date
  • Rating
  • Views
  • You are invited to register for our upcoming COSO webinar, COSO 2013: Mapping Controls to Principles. Transitioning to the New COSO Framework is top of mind for many organizations. How do you get started? How do you map controls to principles or vice versa? What are some of the preliminary findings organizations are seeing as they head down the path to implement the framework?

    Please submit top-of-mind questions during the webinar registration process.

    CPE credits will be provided to qualifying attendees.
  • *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • This webinar is presented by McAfee and Intel to help customers understand their Data Protection solution from McAfee and to get the most business value out of their Intel based endpoints. Products that apply to this webcast include McAfee Complete Data Protection Suites, featuring Endpoint Encryption, and EPO Deep Command to extend the reach of your IT department to lower your total cost of ownership. The webinar will include a special highlight on Intel® Core™ vPro™ Processors and associated technologies that increase productivity and hardware-assisted security in the enterprise. This webcast is provided as a 35-40 minute overview and includes 5-10 minutes of Q & A.

    Join this webinar on Data Protection and learn about:
    • The key features of Data Protection and how it can provide you with the security you need
    • Use cases on utilizing the synergy between Intel® vPro™ and McAfee Data Protection technologies to reduce your overall TCO
    • How you can extend the reach of your IT team with the ability to remotely wake up or even power on PC’s, remediate “disabled” endpoints and remotely reset pre-boot passwords
    • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
  • Modulo Director of Technical Services John Ambra walks Risk Manager users through the latest version 8.4, and answers user questions at the end.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Jack Madden converses with James Rendell to get the CA perspective on Enterprise Mobility Management’s (EMM) future potential. EMM must not for get BYOD but also go beyond it into Mobile App Management (MAM) and find ways to keep users personal information and employers information separated and find a way to embrace the Internet of Things.
  • Jack Madden discusses Enterprise Mobility with Arun Bhattacharya to get the CA perspective on the way it should be. This means going beyond BYOD and MDM, and embracing MAM, MEM, MCM, and IoT. For many companies, finding the balance between employers and users privacy and security has been a problematic issues.
  • Heartbleed is not an exploit you want to ignore as an IT professional. It exposes passwords and cryptographic keys, and requires not only that you patch OpenSSL for each of the services using the OpenSSL library, but also that you replace the private keys and certificates so that attackers won’t be able to use any of the data compromised by the vulnerability. The simplicity of the exploit makes it powerful. It appears that over a half million websites are vulnerable.
    In this session we'll cover:
    What you need to know about the Heartbleed vulvnerability
    How to detect it using AlienVault USM
    How to investigate successful Heartbleed exploits
  • In this webcast we will show:
    1. The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization
    2. How you can identify your business exposure and what systems are vulnerable
    3. How Tripwire’s solutions work together to help you close the detection, remediation and prevention gaps around Heartbleed
  • Channel
  • Channel profile
Up Down
  • Mobile Assessments for Your GRC Program: Anytime, Anywhere Recorded: Mar 27 2014 58 mins
    Today’s workforce embraces the idea that with mobile technology, we can work anywhere. Risk and compliance professionals are challenged to complete assessments that require location or site-specific information. Physical security, facility site and self-assessments require them to collect data and evidence while they are away from their desks, and organizations are turning to mobile to help them accomplish these tasks more efficiently.

    During this webcast, you will learn how to develop and implement a mobile strategy for your GRC assessments to more efficiently capture risk and compliance assessment information on-site. By transforming time-consuming operational chores into efficient, value-added processes, you can significantly reduce potential data entry errors and delays in sharing this critical risk data.

    Join us to learn more about:
    • Considerations for determining what GRC use cases are best suited for the mobile environment
    • How customers are utilizing RSA Archer GRC Mobile
    • Using RSA Archer GRC Mobile to conduct audit, risk and compliance assessments via a product demonstration
  • Managing Third Party Risk in the Extended Enterprise Recorded: Feb 13 2014 60 mins
    Attend this webcast to hear a candid discussion of timely challenges that organizations are facing with regards to third party and supply chain risk management. Regardless of your company’s industry, the evolving business landscape and regulatory emphasis have created an imperative for organizations to take risk management to the next level to avoid or limit exposure from external parties, business partners and supply chains. This webcast will provide keen insight into understanding third party management best practices focused on building consistent risk definitions and a unified solution across your company.

    During this one hour webcast, hear Michael Rasmussen, GRC Pundit with GRC 20/20 and Marshall Toburen, RSA Archer GRC Strategist, discuss:
    - The clear advantages gained by businesses who can effectively manage the broad spectrum of third party risks
    - The elements of a strong governance process that promotes an integrated and consistent approach to third party risk and performance management, and establishes the necessary elements to provide stakeholder confidence
    - How RSA Archer solutions provide answers to third party risk and performance questions, promote strong governance, and capitalize on the advantages of effective third party management
  • 8 Keys to a Successful GRC Program Recorded: Jan 30 2014 60 mins
    Hear two seasoned GRC Program Managers share their best practices for a successful GRC program. They will reveal how they have helped companies take the leap to a strategic enterprise GRC focus where they cultivated, managed and maintained an effective, holistic GRC plan. Learn how to benchmark and demonstrate the value of your GRC program.

    Phil Aldrich, Sr. Manager, GRC Program Management, EMC; and Jennifer Anderson, GRC Program Director, Verterim, will provide tips for expanding your GRC program across the enterprise. You will learn:

    • The 8 keys of highly effective GRC programs and their applications
    • Which program elements are most impactful
    • Implementation tips
  • Integrate NIST 800-53 Rev 4 to Improve Your Cyber Security Recorded: Sep 12 2013 56 mins
    The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 provides guidance for the selection of security and privacy controls for federal information systems and organizations. Revision 4 was motivated principally by the expanding threat space and increasing sophistication of cyber attacks. It is the most comprehensive update since the initial publication. NIST 800-53 is the authoritative security control catalog for the federal government and is also a free resource for private sector businesses.

    Revision 4 represents enormous change, including the introduction of many new controls and an entire new control family – privacy. The concept of overlays, also introduced in this revision, is borrowed from the intelligence community to protect the world’s most sensitive systems. So, what does this mean to you?

    This webcast will help you understand the changes to NIST 800-53 Rev 4, and how to integrate them to improve the cyber security of your organization.
    • Learn how the new controls, including the new privacy family, can enhance your security program
    • Learn what the overlay concept is, and how applying it can drive more targeted security efforts and save time and effort
    • See how RSA Archer GRC can manage the 800-53 control status for each of your information systems, including migration between Rev 3 and Rev 4
  • Vendor Risk and Performance Management Done Right Recorded: Jul 30 2013 48 mins
    When managing third party suppliers, a continuous process to identify, assess, and monitor vendors is critical to assure that they deliver services as promised and that you address any risks they may pose.

    This webcast will demonstrate how to:
    •Manage master services agreement/contract relationships and assess adequacy of contract risk transfer
    •Assess risks of each engagement across multiple risk categories
    •Monitor vendor performance against SLA metrics
    •Better understand fourth party exposures
    •Evaluate and monitor the adequacy of vendors’ Certificates of Insurance
  • Enabling ISO 22301 Compliance with RSA Archer Business Continuity Management Recorded: Jun 20 2013 63 mins
    The new global ISO 22301 standard is the critical next step in maturing the Business Continuity Management (BCM) discipline. The standard is becoming the de facto authoritative source as well as the standard for certification.

    Why a new standard? What is different about ISO 22301 and why is it replacing other standards that have been recognized for years? The answer can be described in a few key words – strategic, enterprise-wide, framework and organizational resilience.

    During this webcast you will:
    •Expand your understanding of the ISO 22301 standard
    •Learn how RSA Archer Business Continuity Management & Operations (BCM&O) addresses the ISO requirements
    •Understand how to implement measures to manage disruptive events
    •Be enabled to monitor your program’s effectiveness
    •Learn about the RSA Archer BCM & O free trial and special offer

    Join us for this live webcast to take advantage of a limited time special offer and learn how RSA Archer GRC can facilitate your organization’s adoption of this critical standard and drive better business continuity planning and execution.
  • Maturing from Threat Management to Security Risk Management Recorded: Apr 17 2013 49 mins
    Hacktivism, advanced threats, the digital underground and many other trends have stressed to companies that threat management, while a core part of information security for years, is not a stagnant science but a continually evolving art. The ability to manage threats is now paramount to an organization’s success as a business and in some respects, necessary for its survival. This presentation will walk through the RSA Archer framework for an Information Security Risk Management program highlighting the need for a cohesive combination of people, process and technology.
  • Streamline Your PCI Compliance Program Recorded: Mar 31 2013 55 mins
    This webcast will teach you how to jumpstart your PCI compliance program by conducting continuous, automated controls monitoring and compliance testing to gain visibility to manage and mitigate security risk. Learn how you can:
    • Reduce costs associated with PCI compliance
    • Automate distribution of compliance assessments
    • Transform isolated data (stored in spreadsheets) into sustainable processes
    • Gain compliance visibility through central dashboards with real-time data
    • Track exceptions, unresolved issues and remediation to reduce the risk to the business
Manage risks, demonstrate compliance, and automate business processes
Build an efficient, collaborative governance, risk, and compliance (GRC) program across IT, finance, operations, and legal.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Enabling ISO 22301 Compliance with RSA Archer Business Continuity Management
  • Live at: Jun 20 2013 3:00 pm
  • Presented by: Patrick Potter, GRC Strategist, BCM and Audit, RSA
  • From:
Your email has been sent.
or close
You must be logged in to email this