Events

Page: 1 2 3 4

Reap the Unexpected Results and Benefits of Properly Securing your Organization against a Cyber Attack- Watch On-Demand Now

 

Click here to watch. 

It is becoming common knowledge that compliance does not equal security, and in the wake of recent data breaches, organizations by the masses are beginning to adopt formal information security programs and practices into their day-to-day IT and business operations. This webinar will give you real-world insight into some of the added value implementing security initiatives can bring to your organization. Join Wes Withrow, IT GRC Expert, as he applies his more than 15 years of information security expertise into concise examples of the unexpected benefits a risk-based approach to information security can bring.

In this webinar, you will gain the practical and useful knowledge to:

  • Reduce 99% of the malware in your environment, resulting in increased productivity and visibility into problem areas
  • Gain control over inventory of equipment your organization actually owns but may not be accounting for
  • Create a process for continuous and proactive diagnostic and mitigation efforts that would have otherwise only been found once something actually broke

Click here to watch. 

A Case Study Explored: Organization Increases IT GRC Effectiveness While Lowering Operational Costs - Watch On-Demand Now

 

Click here to watch. 

Understanding and managing IT governance, risk, and compliance (IT GRC) in today’s environment requires a new paradigm in managing interconnections and relationships. What may seem as an insignificant IT risk in one area can have profound impact on other risks and cause compliance issues.

GRC 20/20 Principal Analyst, Michael Rasmussen, has researched one organization who struggled with decentralized processes and documents for managing its IT security, risk, and compliance program. The organization evaluated their options and looked at IT GRC solutions to assist them with this problem. The result of their evaluation led them to engage and deploy TraceCSO from TraceSecurity, a Software as a Service (SaaS) solution that the organization found was easy to engage and deploy to meet the range of their IT GRC needs.

Join TraceSecurity and Michael Rasmussen, for an interactive interview that will describe how TraceCSO gives organizations the ability to measure, identify and remediate issues across their processes and operations more efficiently and at a much lower operational cost. During the webinar, you will:

  • Explore the complexities that continue to hinder IT GRC within organizations
  • Hear how one organization uses TraceCSO, on average, to reduce dedicated resources to IT GRC management by 100 hours each week and to realize a total cost savings across human as well as financial capital by $500,000 each year
  • Become familiar with the use cases for an IT GRC platform
  • Realize the value of a simplified approach to IT GRC management 

Click here to watch. 

Disclaimer: GRC2020 has evaluated and verified the implementation of TraceCSO at this described organization and confirms that this implementation has achieved measurable value across the elements of GRC efficiency, effectiveness, and agility. In this context, GRC2020 has recognized TraceCSO with a 2014, GRC Value Award in the domain of IT GRC. 

Calculating Today's Cost of a Data Breach - Watch On-Demand Now

Click here to watch.

To obtain approval and funding for security improvements, technologists often have to make their case by pointing to losses from recent security breaches. But, calculating those losses can be tricky.

Brent Hobby, TraceSecurity IT GRC Subject Matter Specialist, scoured the most recent statistics and studies to help you best estimate the direct and indirect costs of a data breach and justify your 2015 budget request. In addition, Hobby provides an update on the most common causes of a data breach and discusses typical risks that your organization may be overlooking.

Click here to watch.

Protecting Your Credit Union Against Cyber Attacks - Watch On-Demand Now

Click here to watch.

Cyber liability exposures continue to rise, and has drawn the attention of NCUA examiners. In fact, the NCUA Region II office has said that IT Security will be a top concern in the examination process going forward. IT security now requires solid governance and oversight with active participation by management and the board of directors. 
 
A Verizon 2014 Data Breach Investigation Report, revealed that 1,367 data breaches occurred in 2013, with 465 involving the finance industry. Within the financial sector, the most common security breach incidents involved Web application attacks, denial of services (DDoS) attacks, payment card skimming and insider misuse, according a Verizon study. While financial gain motivates most data breach perpetrators, cyber espionage is also increasing CUNA Mutual reports.

Click here to watch.

Best Practices to Simplify Your Information Security and Compliance Program - Watch On-Demand Now

Click here to watch.

Data protection is increasingly complex, time-consuming and expensive, and the regulatory landscape is in a state of constant change. Many organizations struggle to deal with not only the challenges of implementation but the overwhelming volume of advice being offered.
 
In this webinar, we will tone down the rhetoric and explore tips and best practices that improve both your internal information security and compliance program and your business. Join Brent Hobby, TraceSecurity’s GRC Subject Matter Specialist, for an educational and informative webinar to learn how proper risk management, compliance and audit principles enable you to be proactive and seamlessly evolve to a changing regulatory and data protection landscape. Brent has worked in IT for more than 25 years and in information security for the past 14 years with positions ranging from Software Engineer to Director of Risk Management.
 
Attendees will explore:
  • What it really means to be compliant
  • Why compliance management continues to burden organizations and how they can best streamline and simplify internal operations to address them
  • What role a continuous internal risk management process plays within an organization’s holistic information security and compliance program

Click here to watch.

Page: 1 2 3 4