Becoming a Risk Master

Many organizations are challenged with balancing risk management with compliance management. Risk management considers threats while compliance focuses on controls without context. Ultimately you need to look at both ends of the equation to determine your key controls as they are the investments and associated metrics you want to nurture the most.

But, what does this mean to the hundreds of other controls within the scope of your program or initiative? Are there compensating controls? Does the threat warrant more investment? How much investment?

Attack with the Power and Agility of the Cloud

Digital transformation has been driving organizations to the Cloud. Seth Art will share how to use the power and agility of the Cloud to enhance your  Cyber Security Testing.

Cyber Security Testing in the Cloud delivers advantages too costly to achieve using traditional methods. Seth will discuss how you can:

  • Quickly stand-up and tear-down attack specific infrastructure
  • Switch out IP addresses frequently, or switch whole attack infrastructures, to avoid attribution
  • Crack passwords in seconds for immediate use
  • Reduce costs, and much more!

Webinar – Threat-Based Approach to Prioritize your Cyber Risk

In this webinar, OpenSky CISO, Mark Coderre, shares his experiences in taking a threat-based approach to cyber risk prioritization, which focuses investment decisions on the things that matter, and sets up the rest of your cyber security program for success!

He will go on to discuss why cyber business risk can no longer be managed in spreadsheets, and share an approach to get you from where you are today, to making effective use of GRC automation.

GRC Webinar – Quick Ins for Big Wins

Digital business is vulnerable to cyber-attack, and large organizations typically have thousands of vulnerabilities.
So with 60% of security budgets unable to keep up with rising threat levels, Risk Practitioners agree it’s critical to make investments based on real and quantifiable risk.

This webinar discusses: Risk prioritization and GRC implementation strategies; a threat-based approach to risk management; how to prioritize your program to maximize efficiency and functionality; how to identify quick ‘power plays’ to launch a resilient GRC program; and gain valuable insight into key controls, and the roles of cyber governance and GRC.

Cyber Security Trends 2017

How can organizations protect themselves against attacks and avoid data breaches.

What will be the fundamental issues of cyber security in 2017? Topics covered include data protection, cloud security, and information security. We are in the midst of an era of significant data breaches. The result: More than ever, top management will play a key role. Frank Luzsicza, EVP, Information and Communication Technology at TÜV Rheinland, is convinced that “the amount and availability of sensitive information about people and connected systems will inevitably lead to increased pressure to update legacy cyber security risk strategies to the new attack surface”.

The video highlights, among other things, …

  • the preferred targets of a hacker attack
  • the risks deriving from the Internet of Things and the Industrial Internet (Internet 4.0)
  • the increasing relevance of Managed Security Services
  • the future of eGRC und IT-GRC
  • the areas of IAM und Cloud Security and their importance for business.