Why should you attend: There's no question, Information Security Requirements are constantly evolving. Aside from keeping the existing Information Security Management System effective, organizations need to address new and updated international standards, regulations, laws and other requirements, eg the just recently published ISO/IEC27001:2013. Equally, threats to information security are not going away either, indeed with ongoing technical progress and new technologies, new threats and vulnerabilities are emerging all the time. A stark reminder are the countless and continuing information security incidents that have made headlines world-wide in recent years: confidential data stolen, websites stalled by attacks, accidental change of data, faulty processes causing misrepresentation to name just a few. Aside from the immediate damage, such incidents cause tremendous reputational harm. So, how can an organization stay ahead of the game and master all those challenges? This webinar presents the different challenges to ensure that you don't miss any due to a lack of awareness and then discusses strategies to address each challenge. ·
When you talk with most IT Organizations about Financial Management, the discussion quickly turns into one of budgets and cost-cutting. But that is not the way it should be. I have seen an IT Organization receive approval for a $50M increase in the middle of a corporate wide expense reduction. How? Simple, they were able to clearly demonstrate how their IT budget was being spent in support of specific Business Initiatives. When a new Business Initiative arose that required funding, IT let the Business decide where to cut. Instead IT received additional funds to support the new Business. ·
Overview: During the webinar, you will learn the how to introduce ever higher levels of automation into your vendor risk management program, gaining quick wins and rewarding executive sponsors with tangible results.
You will learn the various approaches to vendor risk management and determine the best path to implementation for your organization. You will learn strategies for gaining commitment from stakeholders - an essential step in implementing any organizational change. You will learn how to use vendor classification to reduce costs and improve compliance. And you will learn how to maximize the benefits of an effective vendor risk management using dashboard reporting and on-going remediation processes.
Why should you attend: Research has established that those organizations who invest in vendor risk management reap clear and demonstrable benefits - reduced number of security breaches, fewer instances of data theft or loss and a much lighter audit burden, which frees up time and resources. All of these directly impact the bottom line. Automation is key to an effective and scalable vendor risk management program. Automation enables the organization to manage an increasing number of vendors, reducing the need for people to perform repetitive, sometimes tedious tasks and allows them to focus on higher value functions, such as analysis and remediation. Automating vendor risk management is a far-reaching initiative within any organization, as it touches on several areas of responsibility including IT, Legal, Audit , Purchasing and Management. This requires effective communication strategies, both inside the organization and with the vendor community, providing training, timely information and feedback loops.
Areas Covered in the Session:
Where are we now? - assessing your organization performs vendor irsk management currently.
Building commitment - identifying stakeholders and creating the business cases to bring them onside
What’s in the toolbox? - a survey of vendor risk management tools
The way forward - a look at the vendor management lifecycle and how to integrate automation
One size does not fit all! - the importance of vendor classification
Now we’re talking - communications strategies for the vendor community and the organization.
Reaping the rewards - monitoring, measuring, reporting
Wheel inside a wheel - the process inside the process to ensure compliance is being maintained
Who Will Benefit:
IT Security Managers
Risk Management Managers
Paul is a seasoned IT Security professional, leveraging his extensive experience in the business management and IT operations to deliver IT Governance, Risk and Compliance solutions for Government and Enterprise clients. Paul has experience in delivering mission-critical projects in several sectors, including health, financial, telecommunications and public sector. Paul assists clients with strategic IT planning and also with turning those strategic plans into aligned policies, standards and procedures. He works with clients to plan and implement IT frameworks and architectures, such as IS0 27002, ITIL, PCI-DSS, PIPEDA, COBIT, etc.
Paul has experience in automating processes for compliance assessment, asset classification, and document management - implementing software, hardware, processes and procedures and then integrating them with the client's existing risk management program through presentations, training and awareness sessions.
Curtiss B. Cook, Janna C. Castro, Ronald E. Schmidt et al. Journal of hospital medicine (Online), Vol. 2, No. 4. (Jul 2007), pp. 203-11. BACKGROUND: Little is known about management of hyperglycemia in inpatients. OBJECTIVE: To gain insight into caring for hospitalized patients with hyperglycemia. DESIGN: Retrospective analysis. SETTING: Teaching hospital. PATIENTS: Data on all patients discharged between January 1, 2001, and December 31, 2004 with a diagnosis of diabetes or hyperglycemia were extracted and linked to laboratory and pharmacy databases. Only the data on patients who did not require intensive care and who were hospitalized for at least 3 days were analyzed. MEASUREMENTS: Average bedside glucose during the first and last 24 hours of hospital stay and for the entire length of stay; assessment of changes in insulin regimen and dose. RESULTS: The average age of patients included in the study (n = 2916) was 69 years. Fifty-seven percent of the patients were men, 90% were wh.. ·