Enabling ISO 22301 Compliance with RSA Archer Business Continuity Management

Patrick Potter, GRC Strategist, BCM and Audit, RSA
The new global ISO 22301 standard is the critical next step in maturing the Business Continuity Management (BCM) discipline. The standard is becoming the de facto authoritative source as well as the standard for certification.

Why a new standard? What is different about ISO 22301 and why is it replacing other standards that have been recognized for years? The answer can be described in a few key words – strategic, enterprise-wide, framework and organizational resilience.

During this webcast you will:
•Expand your understanding of the ISO 22301 standard
•Learn how RSA Archer Business Continuity Management & Operations (BCM&O) addresses the ISO requirements
•Understand how to implement measures to manage disruptive events
•Be enabled to monitor your program’s effectiveness
•Learn about the RSA Archer BCM & O free trial and special offer

Join us for this live webcast to take advantage of a limited time special offer and learn how RSA Archer GRC can facilitate your organization’s adoption of this critical standard and drive better business continuity planning and execution.
Jun 20 2013
63 mins
Enabling ISO 22301 Compliance with RSA Archer Business Continuity Management
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2838)
  • Upcoming (89)
  • Date
  • Rating
  • Views
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Are attacks on your network and users still occurring, despite continuing efforts to stay on top of security? What impact would malware have on your business if it was able to gain internal access and steal sensitive information?

    Without solutions that can disrupt the chain of events that occur during an advanced attack, many businesses are still being infiltrated and losing data every day. This webinar will cover the best practices in disrupting attacks with content security solutions - connected to optimize protection.
    Join this webinar as:
    •You will learn the tactics used by attackers today to infiltrate businesses
    •You will hear about the leading technologies available to disrupt advanced attacks
    •You will walk away with the knowledge to assess your own environment, and optimize your security
    Businesses today face more advanced attacks than we’ve ever seen in the past – and defending against them takes a connected approach which can disrupt the multiple points of infiltration and exfiltration used in the process of a breach. With most attacks seen in the wild using phishing emails to reach their target, a web link or malicious file to deliver a payload, and an outbound stream of communication to exfiltrate data – implementing a Secure Email Gateway, Secure Web Gateway, and Data Loss Prevention technology together will provide a barrier difficult for even the most advanced attacks to overcome.

    Don’t miss this webinar if you have a stake in the security of your most valuable information, or are directly responsible for the implementation of security solutions to protect it. Register now for this 30 minute webinar.
  • As most IT Pros are aware, as of April 8th, 2014, Microsoft will stop releasing security patches for Windows XP. Unfortunately, most folks will not be able to migrate all Windows XP machines by that deadline. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.
    In this session we'll cover:
    The primary attack vectors you need to consider
    Immediate actions you can take to limit the exposure of your XP assets
    Warning signs to watch out for that could signal an attack
    How to closely monitor your vulnerable assets with AlienVault USM
  • MDM implementations begin by solving the most pressing business problem in a single hub, mostly on-premise. They then expand to another use case, domain, or region, and might evolve to another MDM hub on cloud or in a different country. Whatever the journey might be, how do you tie the different hubs together in a hybrid or federated hub-of-hubs MDM architecture? Come to this session to learn how certain leading companies are solving this conundrum!

    In this webinar, you will learn:
    -What are the initial use cases that dictate MDM
    -How to determine if you should use the same MDM instance or a different one when expanding your use case
    -When to use on-premise versus cloud MDM

    In addition, we will explore examples of companies using hybrid MDM to manage multiple MDM hubs as well as evolving to the holy-grail of MDM architecture: Hub-of-hubs or federated MDM.
  • Cyberspace is typically the prime mechanism for conducting business. It also plays a key role in the socio-cultural lives of staff, customers and suppliers. By the end of 2013, revelations about how governments had been surrendering commercial and personal privacy in the name of national security left trust very badly shaken. And the timing couldn’t be much worse: many CEOs are ramping up their demands to take even greater advantage of cyberspace. So if this is where things are now, how will all of this look by 2016? How will new threats hurtling over the horizon complicate matters even further? Just what will organisations be able to rely on? And most importantly, are they powerless or can they do something now? This webcast spotlights the threats we'll be dealing with over the coming 24 months along with advice on the best ways of handling them.
  • As more and more companies look to take advantage of all of the benefits afforded with cloud-based infrastructures, the discussion often quickly turns to “How do we get there?” For some companies, this single migration question can create an insurmountable roadblock that either keeps them from moving to the cloud or severely delays their migration. Join Michael McCracken, HOSTING’s Director of Professional Services, as he explores different cloud migration strategies along with the benefits and risks associated with each of those strategies.
  • Anti-virus is not enough. McAfee Complete Endpoint Protection add defense in depth against the full threat spectrum from zero-day exploits to hacker attacks, as well as mobile devices such and tablets.
  • Protiviti has conducted the second-annual Executive Perspectives on Top Risks Survey. We obtained the views of more than 370 board members and C-suite executives about risks that are likely to affect their organisation in 2014.

    Join Managing Director, Mike Purvis and Director, Dirk Verwohlt for a discussion of the report findings.
  • With the release of PCI-DSS version 3.0 many organizations that are already PCI compliant or are working towards becoming PCI compliant are wondering what these changes will mean to their organization. In this webinar we will take a look at what has changed (and what hasn’t) and the impact this will have on how organizations approach PCI compliance.
  • As we continue to explore the ERP implementation process, we’re going to dive deeper into one technology solution you might consider for a successful ERP implementation. Join us as we discuss Oracle eBusiness Suite Release 12. You’ll want to join us if you’re:
    • Thinking about upgrading to release 12
    • On R12.1 and considering moving to R12.2
    • Just looking for a little ‘positive sell’ to add to that budget request so you can fund your upgrade

    Oracle eBusiness Suite Release 12 was defined as “The Global Business Release”. This doesn’t encompass just its geographic reach…the Suite is a comprehensive tool whose breadth and depth across industries and business functions is compelling for customers around the world.

    During this session, participants will learn about:
    • The changes to R12.2 including the foundational architecture improvements and financial enhancements
    • How the strength of Financials Release 12 allows businesses to work globally - across applications, divisions and regions and the tools necessary to achieve that.
    • Integration, data management and reporting

    Oracle eBusiness Suite Release 12 makes it easier and less expensive for customers to implement, manage and scale global applications - ultimately improving the overall ownership experience.
  • Channel
  • Channel profile
Up Down
  • Mobile Assessments for Your GRC Program: Anytime, Anywhere Recorded: Mar 27 2014 58 mins
    Today’s workforce embraces the idea that with mobile technology, we can work anywhere. Risk and compliance professionals are challenged to complete assessments that require location or site-specific information. Physical security, facility site and self-assessments require them to collect data and evidence while they are away from their desks, and organizations are turning to mobile to help them accomplish these tasks more efficiently.

    During this webcast, you will learn how to develop and implement a mobile strategy for your GRC assessments to more efficiently capture risk and compliance assessment information on-site. By transforming time-consuming operational chores into efficient, value-added processes, you can significantly reduce potential data entry errors and delays in sharing this critical risk data.

    Join us to learn more about:
    • Considerations for determining what GRC use cases are best suited for the mobile environment
    • How customers are utilizing RSA Archer GRC Mobile
    • Using RSA Archer GRC Mobile to conduct audit, risk and compliance assessments via a product demonstration
  • Managing Third Party Risk in the Extended Enterprise Recorded: Feb 13 2014 60 mins
    Attend this webcast to hear a candid discussion of timely challenges that organizations are facing with regards to third party and supply chain risk management. Regardless of your company’s industry, the evolving business landscape and regulatory emphasis have created an imperative for organizations to take risk management to the next level to avoid or limit exposure from external parties, business partners and supply chains. This webcast will provide keen insight into understanding third party management best practices focused on building consistent risk definitions and a unified solution across your company.

    During this one hour webcast, hear Michael Rasmussen, GRC Pundit with GRC 20/20 and Marshall Toburen, RSA Archer GRC Strategist, discuss:
    - The clear advantages gained by businesses who can effectively manage the broad spectrum of third party risks
    - The elements of a strong governance process that promotes an integrated and consistent approach to third party risk and performance management, and establishes the necessary elements to provide stakeholder confidence
    - How RSA Archer solutions provide answers to third party risk and performance questions, promote strong governance, and capitalize on the advantages of effective third party management
  • 8 Keys to a Successful GRC Program Recorded: Jan 30 2014 60 mins
    Hear two seasoned GRC Program Managers share their best practices for a successful GRC program. They will reveal how they have helped companies take the leap to a strategic enterprise GRC focus where they cultivated, managed and maintained an effective, holistic GRC plan. Learn how to benchmark and demonstrate the value of your GRC program.

    Phil Aldrich, Sr. Manager, GRC Program Management, EMC; and Jennifer Anderson, GRC Program Director, Verterim, will provide tips for expanding your GRC program across the enterprise. You will learn:

    • The 8 keys of highly effective GRC programs and their applications
    • Which program elements are most impactful
    • Implementation tips
  • Integrate NIST 800-53 Rev 4 to Improve Your Cyber Security Recorded: Sep 12 2013 56 mins
    The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 provides guidance for the selection of security and privacy controls for federal information systems and organizations. Revision 4 was motivated principally by the expanding threat space and increasing sophistication of cyber attacks. It is the most comprehensive update since the initial publication. NIST 800-53 is the authoritative security control catalog for the federal government and is also a free resource for private sector businesses.

    Revision 4 represents enormous change, including the introduction of many new controls and an entire new control family – privacy. The concept of overlays, also introduced in this revision, is borrowed from the intelligence community to protect the world’s most sensitive systems. So, what does this mean to you?

    This webcast will help you understand the changes to NIST 800-53 Rev 4, and how to integrate them to improve the cyber security of your organization.
    • Learn how the new controls, including the new privacy family, can enhance your security program
    • Learn what the overlay concept is, and how applying it can drive more targeted security efforts and save time and effort
    • See how RSA Archer GRC can manage the 800-53 control status for each of your information systems, including migration between Rev 3 and Rev 4
  • Vendor Risk and Performance Management Done Right Recorded: Jul 30 2013 48 mins
    When managing third party suppliers, a continuous process to identify, assess, and monitor vendors is critical to assure that they deliver services as promised and that you address any risks they may pose.

    This webcast will demonstrate how to:
    •Manage master services agreement/contract relationships and assess adequacy of contract risk transfer
    •Assess risks of each engagement across multiple risk categories
    •Monitor vendor performance against SLA metrics
    •Better understand fourth party exposures
    •Evaluate and monitor the adequacy of vendors’ Certificates of Insurance
  • Enabling ISO 22301 Compliance with RSA Archer Business Continuity Management Recorded: Jun 20 2013 63 mins
    The new global ISO 22301 standard is the critical next step in maturing the Business Continuity Management (BCM) discipline. The standard is becoming the de facto authoritative source as well as the standard for certification.

    Why a new standard? What is different about ISO 22301 and why is it replacing other standards that have been recognized for years? The answer can be described in a few key words – strategic, enterprise-wide, framework and organizational resilience.

    During this webcast you will:
    •Expand your understanding of the ISO 22301 standard
    •Learn how RSA Archer Business Continuity Management & Operations (BCM&O) addresses the ISO requirements
    •Understand how to implement measures to manage disruptive events
    •Be enabled to monitor your program’s effectiveness
    •Learn about the RSA Archer BCM & O free trial and special offer

    Join us for this live webcast to take advantage of a limited time special offer and learn how RSA Archer GRC can facilitate your organization’s adoption of this critical standard and drive better business continuity planning and execution.
  • Maturing from Threat Management to Security Risk Management Recorded: Apr 17 2013 49 mins
    Hacktivism, advanced threats, the digital underground and many other trends have stressed to companies that threat management, while a core part of information security for years, is not a stagnant science but a continually evolving art. The ability to manage threats is now paramount to an organization’s success as a business and in some respects, necessary for its survival. This presentation will walk through the RSA Archer framework for an Information Security Risk Management program highlighting the need for a cohesive combination of people, process and technology.
  • Streamline Your PCI Compliance Program Recorded: Mar 31 2013 55 mins
    This webcast will teach you how to jumpstart your PCI compliance program by conducting continuous, automated controls monitoring and compliance testing to gain visibility to manage and mitigate security risk. Learn how you can:
    • Reduce costs associated with PCI compliance
    • Automate distribution of compliance assessments
    • Transform isolated data (stored in spreadsheets) into sustainable processes
    • Gain compliance visibility through central dashboards with real-time data
    • Track exceptions, unresolved issues and remediation to reduce the risk to the business
Manage risks, demonstrate compliance, and automate business processes
Build an efficient, collaborative governance, risk, and compliance (GRC) program across IT, finance, operations, and legal.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Enabling ISO 22301 Compliance with RSA Archer Business Continuity Management
  • Live at: Jun 20 2013 3:00 pm
  • Presented by: Patrick Potter, GRC Strategist, BCM and Audit, RSA
  • From:
Your email has been sent.
or close
You must be logged in to email this