Recorded: October 29 | 2015
Managing third-party risk is a big undertaking. Most financial institutions have tens of thousands of supplier relationships, and many data breaches originate through IT Vendors within the supply chain. Not only are the risks associated with third-party vendors increasing, but regulators are turning their attention to the need for organizations to manage IT vendor risk more effectively.
Recorded: February 5 | 2014 Play
Providing services and features to website visitors often requires deploying many third party service providers for analytics, marketing, payment processing, and data management. Managing risk from these third parties is vitally important in a landscape filled with new threats and regulations. The nature of these relationships requires that information be shared, and risk accrues whenever sensitive information is shared with or processed by third parties.
When: April 4 | 2013 Play!
Organizations are suffering from volatility across all risk types, and need to re-think their enterprise risk strategy. In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders in all sectors, and gaining a complete view of an organization's risk exposure is increasing in complexity.
Recorded: October 3 | 2012
For many years complying with government standards and industry regulations has been seen as a check box in the lengthy list of IT security tasks. However, most recent changes in the environment and increased cyber security threats have led to a rethinking of this approach. With more than 365 security incidents reported in 2011 affecting over 126 million records, many organizations are rethinking the way they approach security, risk management, and compliance.
Governance, risk management and compliance (GRC) processes are extensive; they are how an organization is directed and managed to achieve goals, considering risks to achievement, and complying with applicable laws and regulations.
Senior management at all levels are pressured to improve their organizations risk management capabilities. In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders in all sectors.
The widespread private use by employees is embraced by many businesses in their communications. The policies and procedures on the proper business use of social media should address the protection of intellectual property, but also consider and respect the interest of preserving the public domain and fair use/dealing, of stimulating fair competition and innovation.
Recorded: 25 August 2010
Automating the IT Risk Management process is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.