Events

Page: 1 2 3 4

Manage Third-Party Risks that Cross Traditional Business Boundaries - Register Now

Register here for this free webinar.

Integrating vendors into your business operations allows you to gain efficiencies and improve strategic flexibility. However, in doing so, your risk profile is also altered. Because modern enterprises will continue to evolve from traditional brick and mortar to a web of third-party relationships that extend traditional business boundaries, you must account for and mitigate the additional IT security risk that is introduced.

Join TraceSecurity to learn how you can have command over your extended enterprise. Wes Withrow, Cybersecurity Subject Matter Expert, will explore some of today's most publicized data breaches resulting from third-party suppliers and discuss how you can effectively evaluate and manage your vendor risk within the context of a holistic information security program.

Register here for this free webinar.

Ensure Your Credit Union Meets the 2015 NCUA Cybersecurity Guidance - Watch On-Demand Now

Click here to watch. 

Join TraceSecurity to explore the intention of the NCUA guidance for cybersecurity and learn how an incident response program helps you to effectively react to a data breach.

During this webinar, credit unions will learn why incident response is one of the most overlooked areas of information security and how your institution can establish an ongoing plan that not only satisfies the NCUA but also prepares your credit union to respond quickly and appropriately.

Wes Withrow, IT GRC Subject Matter Expert, will show you how you can leverage TraceSecurity’s cloud-based software solution, TraceCSO, to deliver a best-practice workflow for response to a breach – from notification and containment, investigation and mitigation, through testing and reporting for auditors. Leveraging TraceCSO’s enhanced NCUA-specific incident response capabilities allows your institution to meet NCUA guidelines automatically and provide thorough documentation and reporting for an audit.

Click here to watch.

Reap the Unexpected Results and Benefits of Properly Securing your Organization against a Cyber Attack - Watch On-Demand Now

 

Click here to watch. 

It is becoming common knowledge that compliance does not equal security, and in the wake of recent data breaches, organizations by the masses are beginning to adopt formal information security programs and practices into their day-to-day IT and business operations. This webinar will give you real-world insight into some of the added value implementing security initiatives can bring to your organization. Join Wes Withrow, IT GRC Expert, as he applies his more than 15 years of information security expertise into concise examples of the unexpected benefits a risk-based approach to information security can bring.

In this webinar, you will gain the practical and useful knowledge to:

  • Reduce 99% of the malware in your environment, resulting in increased productivity and visibility into problem areas
  • Gain control over inventory of equipment your organization actually owns but may not be accounting for
  • Create a process for continuous and proactive diagnostic and mitigation efforts that would have otherwise only been found once something actually broke

Click here to watch. 

A Case Study Explored: Organization Increases IT GRC Effectiveness While Lowering Operational Costs - Watch On-Demand Now

 

Click here to watch. 

Understanding and managing IT governance, risk, and compliance (IT GRC) in today’s environment requires a new paradigm in managing interconnections and relationships. What may seem as an insignificant IT risk in one area can have profound impact on other risks and cause compliance issues.

GRC 20/20 Principal Analyst, Michael Rasmussen, has researched one organization who struggled with decentralized processes and documents for managing its IT security, risk, and compliance program. The organization evaluated their options and looked at IT GRC solutions to assist them with this problem. The result of their evaluation led them to engage and deploy TraceCSO from TraceSecurity, a Software as a Service (SaaS) solution that the organization found was easy to engage and deploy to meet the range of their IT GRC needs.

Join TraceSecurity and Michael Rasmussen, for an interactive interview that will describe how TraceCSO gives organizations the ability to measure, identify and remediate issues across their processes and operations more efficiently and at a much lower operational cost. During the webinar, you will:

  • Explore the complexities that continue to hinder IT GRC within organizations
  • Hear how one organization uses TraceCSO, on average, to reduce dedicated resources to IT GRC management by 100 hours each week and to realize a total cost savings across human as well as financial capital by $500,000 each year
  • Become familiar with the use cases for an IT GRC platform
  • Realize the value of a simplified approach to IT GRC management 

Click here to watch. 

Disclaimer: GRC2020 has evaluated and verified the implementation of TraceCSO at this described organization and confirms that this implementation has achieved measurable value across the elements of GRC efficiency, effectiveness, and agility. In this context, GRC2020 has recognized TraceCSO with a 2014, GRC Value Award in the domain of IT GRC. 

Calculating Today's Cost of a Data Breach - Watch On-Demand Now

Click here to watch.

To obtain approval and funding for security improvements, technologists often have to make their case by pointing to losses from recent security breaches. But, calculating those losses can be tricky.

Brent Hobby, TraceSecurity IT GRC Subject Matter Specialist, scoured the most recent statistics and studies to help you best estimate the direct and indirect costs of a data breach and justify your 2015 budget request. In addition, Hobby provides an update on the most common causes of a data breach and discusses typical risks that your organization may be overlooking.

Click here to watch.

Page: 1 2 3 4