REGISTER

Risk Management

Panel

When:    May 23 | 2017       Attend

The challenges that organizations face today are increasingly more complex than in the past. The constant change of the global economy, dynamics of business risks and opportunities, and an increased threat of cyberattacks add complexities we’ve never faced. As organizations rely on more and more third parties to grow and thrive, they’re exposed to higher levels of risk, and regulators are focused on the need for organizations to manage 3rd party risk more effectively.

Panel

When:    August 8 | 2017       Attend

The global financial crisis in 2008 demonstrated the importance of adequate risk management. Since that time, new risk management standards have been published, including the international standard, ISO 31000 ‘Risk management – Principles and guidelines’.

Live Webcast

Recorded:    November 12 | 2015       Attend

In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders across all sectors. The growth of data is increasing exponentially, organizations are suffering from volatility across all risk types, and need to re-think their enterprise risk strategy. At the heart of this strategy is the need for a single consistent view of the data, and a data-centric, multi-platform approach to secure valuable customer and corporate data assets, end-to-end.

www.itgrcforum.com

Recorded: March 23 | 2012    View

Senior management at all levels are pressured to improve their organizations risk management capabilities. In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders in all sectors.

Panel

Recorded:    January 24 | 2017       Attend

Growing exposure to IT risks has made organizations across industries volatile. Recent IT vendor incidents like data and security beaches, violation of privacy guidelines, which caused substantial fines, penalties, brand value, highlight that IT vendor risks are business risks and require focus from the leadership.

Panel

Recorded:    October 29 | 2015       Attend

Managing third-party risk is a big undertaking. Most financial institutions have tens of thousands of supplier relationships, and many data breaches originate through IT Vendors within the supply chain. Not only are the risks associated with third-party vendors increasing, but regulators are turning their attention to the need for organizations to manage IT vendor risk more effectively.

www.metricstream.com

When: 25 August 2010 @ 2pm EST  

Automating the IT Risk Management process is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

Aug25tn

Recorded:    November 17 | 2016       Attend

Organizations are suffering from volatility across all risk types, and in every organization, there are a multitude of applications and devices with threats and vulnerabilities. Every process, function and system has certain risks and compliance requirements, and senior management are being pressured to improve enterprise risk management capabilities.

panelholdingtn

Recorded:   February 5 | 2014      Play

Providing services and features to website visitors often requires deploying many third party service providers for analytics, marketing, payment processing, and data management. Managing risk from these third parties is vitally important in a landscape filled with new threats and regulations. The nature of these relationships requires that information be shared, and risk accrues whenever sensitive information is shared with or processed by third parties.

Fiserv

Held: Jul 22 2010 10:00 am

Presenting: Simon Goldstein; Fiserv, Director, Risk Management, CISA, CISM

Regulations, examiners, internal and external auditors, as well as customers increasingly probe your business for details about your risk management practices.

Aug25tn

Recorded:    August 25 | 2016       Attend

Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.

Roundtable

When:   April 4 | 2013      Play!

Organizations are suffering from volatility across all risk types, and need to re-think their enterprise risk strategy. In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders in all sectors, and gaining a complete view of an organization's risk exposure is increasing in complexity.

Value Bridge

Held: Jul 22 2010 11:00 am

Presenting: Brian Barnier; Value Bridge Advisors, Principal

IT Risk 2.0!? Am I ready? OMG, did I even do IT Risk 1.0? "Risk Management" has skyrocketed on both business and IT leader's priority lists - financial crisis, gulf oil spill, cyber-attacks, network failures, product liability.

Log in

Please Login to download this file

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Go to top