We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. Read more about our Privacy Policy.

I got it!

Event
25 Sep 2016
Education

Webinar topic on How to do a Cyber Security Risk Assessment

Risk Assessment

Overview:  
The best way forward is an efficient Incident Response Program that allows an organization to respond with speed and agility, while empowering businesses to maintain continuous operations. Such a solution also reduces revenue loss, reduces fines and lawsuits and protects brand reputation.

Information Security, Governance & Risk, are all critical aspects of planning and execution of the Information Security Plan. Who in your organization has key responsibility to develop an information security governance program; review existing Information Security policies and standards to ascertain their adequacy in coverage scope against industry best practices, and update them as appropriate, taking into account compliance recommendations?

Why should you Attend: 
Do you have great procedures in place to deal with a Breach, Malware and more? Are you willing to risk your Business Reputation on those procedures? 

Risk Management Monitor quoted Vincent Weafer, Senior Vice President of McAfee Labs, "The year 2014 will be remembered as ‘the Year of Shaken Trust,'" said Vincent Weafer, senior vice president of McAfee Labs. "This unprecedented series of events shook industry confidence in longstanding Internet trust models, consumer confidence in organizations' abilities to protect their data, and organizations' confidence in their ability to detect and deflect targeted attacks in a timely manner. Restoring trust in 2015 will require stronger industry collaboration, new standards for a new threat landscape, and new security postures that shrink time to detection through the superior use of threat data." 

Areas Covered in the Session:
Adopting a systematic approach to risk tracking to enhance the effectiveness of the Cyber Incident Program
Outlining the critical actions to take if an event affects the company or its partners
Understanding an organizations' susceptibility to a Cyber Attack
Cyber Incident Response: Getting started, research, training, testing and maintaining
Standards and Best Practice: ISO 27001, ISO 27035, ISO 27005. NIST, FFIEC, HIPPA AND HITRUST

Who Will Benefit:
Information Security Managers
CEO, CIO, CFO, CSO
Technology Managers
Auditors

Speaker Profile:
Ms. Michael Redmond She is a Consultant, Speaker and Author. Michael also conducts ISO Certification Training for PECB. Michael is the Chapter President for Association of Contingency Planners Eastern Great Lake Chapter and an active member of ISSA. Michael is certified as a Lead Implementer in ISO 27001 Information Security Management, ISO 27035 Security Incident Response, ISO 22301 Business Continuity Management and ISO 21500 Project Management. She is a Certified Instructor for ISO Certification Courses through PECB. Also certified Project Manager PMP, and 2 Master Certifications (MBCP) (FBCI) in Disaster Recovery and CEM Emergency Management.

Contact Detail:

Compliance4All DBA NetZealous,
Phone: +1-800-447-9407
Email: [email protected]
http://www.compliance4all.com/
Event Link : http://bit.ly/29HPxTO
Twitter Follow us – https://twitter.com/compliance4all
Facebook Like us – https://www.facebook.com/Compliance4all
Pinterest - https://in.pinterest.com/compliance4all/

When

25 Sep 2016 @ 10:00 am

26 Sep 2016 @ 11:00 am

Duration: 1 days, 1 hours


Where

Online Event

Fremont

United States


Language

English en


Organised by

NetZealous (deactivated)

Featured Events in Culture

Other Events in Culture

Similar Webinars in Culture

Conference COACH+

Webinar, 30 May 2024

Recent Publications in Culture

Terminology of European education and training policy

Guide, Apr 2024, cedefop.europa.eu

Innover en faveur de la jeunesse

Report, Apr 2024, anru.fr

Featured Events