REGISTER

email 14 48

MetricStream pdf Download (79 KB)

Information technology risk teams know well that the scope of IT risks can be very broad – ranging from technical security risk, to IT operations risk, through to operational risk and enterprise risk. IT risk teams typically have deep skills in risk identification and analysis of information technology components, and many are also quite skilled in making recommendations on risk treatment options.

Riskonnect pdf Download (278 KB)

As with any major purchase, demonstrating the return on investment is key to getting the ultimate buyer to support the investment. Automating your risk and compliance activities can positively affect your company’s bottom line. You just need to prove it. Here are some insights to help you do just that.

HPE pdf Download (6.32 MB)

GDPR is the biggest shake-up in European data protection legislation for 30 years. Organizations have less than two years to ensure that their data protection processes are compliant. Most organizations will struggle to meet the May 25, 2018 deadline.

RSAlogoNEW1 default Download

This solution brief provides an overview of RSA Archer Operational Risk Management, including use cases for Top-Down Risk Assessment, Loss Event Management, Risk Catalog, Bottom-Up Risk Assessment, Operational Risk Management, and Key Indicator Management.

MetricStream pdf Download (228 KB)

In today’s global and increasingly digital business world, a broad spectrum of economic, political, social, legal, technology and regulatory changes are continually taking us to a new level of strategic and tactical complexity and creating commensurate pressures on business performance. We continue to see exponential growth of requirements (often conflicting and overlapping) that organizations must satisfy, and these become even greater as we expand global operations.

Riskonnect pdf Download (384 KB)

Risk aggregation is all about ensuring that anyone looking at risks understands the relative importance of each risk and is confident that the appropriate risks have bubbled up to the surface. When assessing risks, there is essentially an opinion provided as to the expected impact and likelihood. In other words, there is no real certainty as to the timing or magnitude of a risk event.

RSAlogoNEW1 default Download

Dating from the end of the 19th century, Rabobank is a bank by and for customers. Over the past several years it has grown from its home territory in the Netherlands to become an international financial services provider with activities including banking, asset management, leasing, insurance and real estate. Its independent local branches are the most tightly knit banking network in the Netherlands, serving millions of Dutch retail and wholesale customers.

Riskonnect pdf Download (321 KB)

We are now more than a year into the guidelines that went into effect June 2015 for medium/large insurers to comply with Own Risk and Solvency Assessment (ORSA)requirements that include the assessment and management of all risks (not just underwriting risks) in their annual reports.

HPE pdf Download (6.32 MB)

Complying with new and multifaceted regulations can be a challenge for your business. At HPE, we break down all aspects of GDPR into modules. Read through and pick and choose the solutions you need to cover your business, all provided with our quality and expertise as standard.

MetricStream pdf Download (1.01 MB)

The MetricStream Enterprise Risk Management App provides capabilities to deploy uniform risk methodologies and standards, ensuring a structured and systematic approach to ERM. The App enables an accurate understanding of risks across the organization, providing clear visibility into the top risks affecting the organization.

RSAlogoNEW1 default View

Watch to learn how RSA Archer Enterprise & Operational Risk Management provides the foundation to extend operational risk management processes to security, resiliency, regulatory compliance, audit, and third party governance.

HPE default Download

With information in the Cloud, suddenly a new team of people has access to your data. At every turn, they are working hard to protect, tackle, and block access to sensitive data in ‘your’ infrastructure. In fact, to protect your data in the Cloud, several of the fundamental building blocks of a secure enterprise IT infrastructure have to be re-envisioned.

booz allen hamilton pdf Download (1.69 MB)

The Definitive Cybersecurity Guide for Directors and Officers. Companies increasingly use consumer data, including personal information, to stay competitive; this includes the capability to analyze their customers’ demographics and buying habits, predict future behaviors and business trends, and collect and sell data to third-parties.

ISFtn pdf Download (727 KB)

To assist ISF Members, the annual ISF Threat Horizon report takes a two-year perspective of major threats, describing potential implications and providing recommendations to organisations.

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

CyberBanner

Log in Register

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

Banner

Go to top