REGISTER

Risk Management

Panel

When:    January 24 | 2017       Attend

Growing exposure to IT risks has made organizations across industries volatile. Recent IT vendor incidents like data and security beaches, violation of privacy guidelines, which caused substantial fines, penalties, brand value, highlight that IT vendor risks are business risks and require focus from the leadership.

Aug25tn

Recorded:    November 17 | 2016       Attend

Organizations are suffering from volatility across all risk types, and in every organization, there are a multitude of applications and devices with threats and vulnerabilities. Every process, function and system has certain risks and compliance requirements, and senior management are being pressured to improve enterprise risk management capabilities.

panelholdingtn

Recorded:   February 5 | 2014      Play

Providing services and features to website visitors often requires deploying many third party service providers for analytics, marketing, payment processing, and data management. Managing risk from these third parties is vitally important in a landscape filled with new threats and regulations. The nature of these relationships requires that information be shared, and risk accrues whenever sensitive information is shared with or processed by third parties.

Fiserv

Held: Jul 22 2010 10:00 am

Presenting: Simon Goldstein; Fiserv, Director, Risk Management, CISA, CISM

Regulations, examiners, internal and external auditors, as well as customers increasingly probe your business for details about your risk management practices.

Aug25tn

Recorded:    August 25 | 2016       Attend

Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.

Roundtable

When:   April 4 | 2013      Play!

Organizations are suffering from volatility across all risk types, and need to re-think their enterprise risk strategy. In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders in all sectors, and gaining a complete view of an organization's risk exposure is increasing in complexity.

Value Bridge

Held: Jul 22 2010 11:00 am

Presenting: Brian Barnier; Value Bridge Advisors, Principal

IT Risk 2.0!? Am I ready? OMG, did I even do IT Risk 1.0? "Risk Management" has skyrocketed on both business and IT leader's priority lists - financial crisis, gulf oil spill, cyber-attacks, network failures, product liability.

Live Webcast

Recorded:    November 12 | 2015       Attend

In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders across all sectors. The growth of data is increasing exponentially, organizations are suffering from volatility across all risk types, and need to re-think their enterprise risk strategy. At the heart of this strategy is the need for a single consistent view of the data, and a data-centric, multi-platform approach to secure valuable customer and corporate data assets, end-to-end.

www.itgrcforum.com

Recorded: March 23 | 2012    View

Senior management at all levels are pressured to improve their organizations risk management capabilities. In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders in all sectors.

Orbitz

Held: Jul 22 2010 12:00 pm

Presenting: Jeramy Cooper-Leavitt, Orbitz World Wide, Director of Compliance

Compliance laws and new technologies can have a great impact on the business infrastructure and business process that we support as security and compliance professionals.

Panel

Recorded:    October 29 | 2015       Attend

Managing third-party risk is a big undertaking. Most financial institutions have tens of thousands of supplier relationships, and many data breaches originate through IT Vendors within the supply chain. Not only are the risks associated with third-party vendors increasing, but regulators are turning their attention to the need for organizations to manage IT vendor risk more effectively.

www.metricstream.com

When: 25 August 2010 @ 2pm EST  

Automating the IT Risk Management process is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

WhiteHat Security

Held: Jul 22 2010 5:00 pm

Presenting: Jeremiah Grossman, WhiteHat Security, CTO and Founder

Information security threats are way up, fraud losses continue to rise, regulatory fines are increasingly common, and budgeted dollars to solve these myriad of problems are in short supply.

Go to top