What is a Virtual Seminar?

  • Before you enter the virtual environment, it's important that you review the technical requirements.
  • To ensure that you receive all important Event Notices and Reminders, be sure to add us, SecurityandCompliance@
    theonlinexpo.com
    to your address book.
  • To report issues or contact tech support, please send us an email at VirtualSeminar
    Support@techtarget.com

Virtual seminar sessions are now available on-demand!

As companies become more global, the risks within and outside organizational walls become more diverse and unpredictable. And as the challenges of enterprise risk management mount, so must the involvement of every person in the company—up to the CEO—to manage and mitigate the risk.

On 10 August 2011, ISACA and SearchCompliance.com held a free, virtual seminar where participants heard from leading experts on enterprise risk management (ERM) and how to get all of the pieces to work together, from security to supply chain. These sessions are now available to you on-demand for a limited time only!

Watch now and gain practical ERM advice on:

This is an opportunity to make a difference in your enterprise by implementing risk IT. Whether you have an ERM strategy to sanity check or if you don't have one in place, here's your chance to learn from the experts and earn up to 5 CPE credits for your participation.

Speaker Biographies and Session Details

Session 1: European Perspectives on Enterprise Risk Management

 

Presented by Rolf von Roessing, CISA, CISM, CGEIT, Chairman at FORFA AG

Most risk management frameworks can be universally applied, but still, risks differ from country to country, region to region. This session will look at enterprise risk frameworks from the perspective of UK/Europe-based firms and discuss the similarities and differences of their application with U.S.-based companies. In this session, attendees will learn about:

  • An overview of enterprise risk frameworks
  • Risks unique to UK/European companies
  • Best practices for management and mitigation

A retired partner and now executive advisor at KPMG Germany, Rolf von Roessing holds nonexecutive directorships in several security consulting companies in Germany. In addition to working at KPMG, he has experience in large international banks and insurance companies, where he was responsible for business continuity management and information security. He is a former board member of the Business Continuity Institute (BCI), where he served from 2001-2008, and was chair of the BCI’s Audit Committee from 2003-2008. Von Roessing joined ISACA’s Security Management Committee in 2005. He chaired the working group for ITGI’s IT Control Objectives for Basel II publication and is currently a member of ISACA’s Framework Committee.


Spotlight Session: Practical Risk Management Approaches


Presented by Eric Holmquist, president at Holmquist Advisory

In approaching information security as a key business issue, this session will provide a foundation for risk governance within financial services organizations. Some of those key topics include:

  • A sound information security policy
  • Assessing information security risk
  • Developing an information security strategy
  • Management communication
  • Incident response handling

Session 2: Enterprise Risk Management: Your Role in Reducing Risk to Business

Presented by Brian Barnier, principal at ValueBridge Advisors

Every person in a company has a role in enterprise risk management (ERM), and ERM must become part of the fabric of running a business. This "top-down" approach to ERM frameworks requires skillful coordination and reaching out to people in various risk roles, then integrating the practices. In this keynote session, Brian will answer:

  • What are the pieces of an ERM framework?
  • How to get the pieces to work together?
  • Who should lead the path to ERM?

As a principal analyst and advisor at ValueBridge Advisors, Brian Barnier uses his cross-discipline, country and industry practical experience to improve business performance through risk management. A respected author (Operational Risk Handbook for Financial Companies) and speaker, Barnier has served on several industry and professional practices committees (ISACA’s Risk IT Based on COBIT and the OCEG Redbook), contributing risk management approaches to improve business performance and demonstrate compliance. He has led teams to nine US patents. He is equally conversant working across the C-suite to help executives seize opportunity in a challenging economy. He was selected one of the distinguished fellows of Open Compliance and Ethics Group and has authored over 100 articles.


Spotlight Session: Introduction to Pragmatic Data Security

Presented by Rich Mogull, analyst and CEO at Securosis

Most of the information out there on building a data security program is ridiculously complex, expensive, and unrealistic in today's operating environment. In this session, Rich Mogull will introduce a practical approach to data security. One that accounts for business, compliance, and security needs without breaking the budget. During this session you’ll learn:

  • What tools offer the best bang for your buck for protecting your data
  • Practical tips for integrating processes and procedures that cost-effectively improve your data security
  • How to incorporate business needs and compliance into your data security to ensure maximum results


Session 3: Sustainability and Enterprise Risk Management

 

Presented by Adrian Bowles, vice president and principal analyst at Constellation Research Inc. and founder of SIG411 LLC

Sustainability includes any operational aspect that affects the long-term viability of a business. The concept is commonly associated with energy or supply chain management, which themselves have risk elements that must be mitigated. In this session, attendees will learn more about:

  • The c-level executive's role in sustainable risk management
  • Where sustainability fits into an ERM infrastructure
  • How to implement and test sustainable practice

Adrian Bowles has more than 25 years of experience as an analyst, practitioner and academic in IT, with a focus on IT strategy and management. He is the founder of SIG411 LLC, a Westport, Conn.-based research and advisory firm that identifies, develops and promotes sustainable business practices. His research coverage includes sustainable business processes and technologies, corporate social responsibility, business intelligence/analytics, green IT, and IT governance, risk management and compliance. Bowles has directed global market research projects and advised hundreds of firms on technology trends and adoption strategies.


Session 4: Risk Management Strategies for Protecting Enterprise Supply Chains

Presented by Paul Kirvan, FBCI, CISA, independent consultant, author and educator and secretary of the Business Continuity Institute USA chapter

As companies' reach around the world expands, so does the complexity of supply chains and their increased interdependencies. Business continuity management techniques can be introduced as part of the risk identification, mitigation and recovery processes. In this session attendees will learn more about:

  • Taking responsibility for supply
  • Quantifying supply chain risk
  • Steps to mitigate supply chain risk

Paul F. Kirvan, FBCI, CBCP, CISSP, has more than 20 years' experience in business continuity management as a consultant, author and educator. He is secretary of the Business Continuity Institute USA Chapter and Editor-in-Chief of Contingency Planning & Management (CPM) magazine. Kirvan has also served as senior consultant with Fortune Consulting and Telcordia Technologies where he worked on numerous business continuity projects and strategic plans for companies such as Chase Manhattan Bank, Wachovia Bank, Vanguard Cellular One and Florida Power & Light. He is the author of over 300 technical articles and several books on telecommunications and disaster recovery.


Spotlight Session: Raytheon seeks to innovate around IT security services
Presented by Michael Daly, director of IT security services and deputy CISO, Raytheon Corp

As large-scale security breaches become more commonplace, the challenge for most CIOs and chief information security officers (CISOs) is just trying to keep up with the threats -- never mind innovating around IT security services.
Michael Daly, director of IT security services and deputy CISO at Waltham, Mass.-based Raytheon Co., begs to differ.

In this session, Daly explains that it is possible to take innovative approaches to enterprise security and still "close the gap" between threats and vulnerabilities.


.

Session 5: Managing Network Security Threats with an ERM Strategy


 

Presented by Kevin Beaver, information security consultant, seminar leader and keynote speaker at Principle Logic LLC

Hacker groups have been on a recent spree of network break-ins, making off with gigabytes of sensitive documents from large private and public sector organizations. The CEO of Sony, whose PlayStation Network breach this spring potentially was one of the largest ID theft events ever, said recently, "how can I sit here and tell you there will be no further vulnerabilities? … Everybody is being hacked now.” Security is no longer the domain of CISOs but also CEOs and everyone in the company who must take responsibility for security risks and how they affect corporate assets, bottom line and reputation. Expert Kevin Beaver will discuss the role security plays in your ERM program, including:

  • Understanding what information risk really means to your business
  • Getting management on board with security once and for all
  • Finding and eliminating the low-hanging fruit to maximize your enterprise security stance

Kevin Beaver is an information security consultant and expert witness with more than 16 years of experience. As a seminar leader, keynote speaker and founder of Principle Logic LLC, he has appeared in numerous media outlets including CNN, the Wall Street Journal and Entrepreneur Magazine as a security expert. Beaver has authored/co-authored ten books on information security, including The Practical Guide to HIPAA Privacy and Security Compliance and Hacking For Dummies, 3rd edition. In addition, he’s the creator of the Security On Wheels information security audiobooks and blog.

 

Don't forget your CPE credits!

By viewing these sessions on-demand you have the opportunity to earn 5 CPE credits through our partner ISACA.

Tips for an Enriching, Educational Virtual Experience

How do I log in?

Because you're pre-registered, we will send you an email reminder before the seminar begins with a link to enter the virtual environment. If, in the rare occurrence, you aren't able to enter, you'll be prompted to enter your email address and reset your password.

What is a virtual seminar?

You'll enter a slick interface - along with several hundred of your peers - and experience expert information, peer interaction and technology information. You'll attend sessions with our ERM experts, you'll visit vendor booths with product demo information and real live reps to answer your questions, you'll download resource materials on ERM tools and best practices, and you'll interact with your peers. We have held many virtual seminars, each receiving rave reviews on the content received, interaction with our experts, and the easy-to-navigate online experience.

What will I get from this virtual seminar?

This free, on-demand virtual seminar explores the challenges of risk management and how it involves everyone in your organization, including the CEO. ERM experts share best practices for engaging your enterprise from security to supply chain.

Attend and gain insight on how to:

  • Build a "top down" approach to ERM
  • Integrate network security measures into your ERM plan
  • Mitigate supply chain risks
  • And more

Important Technical Checklist

Click each link below to test your system and ensure a seamless experience in the environment:

Click Here to Run System Check
Click Here for Technical Requirements
Click Here for the Port Checker

If you are behind a VPN, firewall, or using a wireless connection and do not have the requirements listed (Adobe Port 1935) you will not be able to view the video sessions (spotlight sessions only), and we recommend trying another internet option to view these sessions if possible.

If you have trouble, please don’t hesitate to contact our technical support team to help at VirtualSeminarSupport@techtarget.com. All of our sessions will be available for viewing from now until September 10th.

 

PC Requirements

Click Here to Run System Check
Click Here for Technical Requirements

Date

When: On-demand, until
10 September 2011
Where: Online, At Your Desk

Presented in Partnership By: