Risk. The New Compliance

  • LANGUAGE: English DATE: Thursday, December 01, 2011 TIME: 16:00 CET / 7:00am PT / 10:00am ET / 3:00pm GMT
Upcoming Webinars

For many years complying with government standards and industry regulations has been seen as a check box in the lengthy list of IT security tasks. However, most recent changes in the ecosystem (e.g., increased cyber security threats) have led to a rethinking of this approach. More and more organizations realize that instead of looking at Governance, Risk, and Compliance from a centralized perspective, it is more efficient to let business operations drive these efforts as that's where the organization's risk knowledge resides. Join this webcast where we reveal how to tackle risk and its associated controls by business unit and how to automate your efforts.

For many years complying with government standards and industry regulations has been seen as a check box in the lengthy list of IT security tasks. However, most recent changes in the ecosystem (e.g., increased cyber security threats) have led to a rethinking of this approach. More and more organizations realize that instead of looking at Governance, Risk, and Compliance from a centralized perspective, it is more efficient to let business operations drive these efforts as that's where the organization's risk knowledge resides. Join this webcast where we reveal how to tackle risk and its associated controls by business unit and how to automate your efforts.

Fulfilling regulations is just one part of this approach – not doing so is also about risks. But organizations have to understand how to use risk scores and controls as the standard approach for driving their IT security efforts.

Martin Kuppinger, founder of KuppingerCole, will talk about “the need for risk management” and the benefits of taking a risk-driven approach. These benefits go well beyond identifying what to do first – thinking in risks is also a vital element in closing the communication gap between business and IT. In the second part of the session, Dr. Torsten George of Agiliance then will focus on how to implement a risk concept and act upon risks to not only fulfill regulatory compliance but to help organizations in better driving their business organization.


Speakers

Torsten George is a marketing leader with more than 17 years of global experience in promoting security software and network equipment products. Based on his vision and superb technology and market foresight he has become a frequent speaker at industry events and resource for byline articles and...


Gold Sponsor

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Understanding the Privileged Access Management (PAM) Market

Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. To reduce the risk of privileged accounts being hijacked or used fraudulently, and to uphold regulatory compliance, a strong PAM solution is essential. But finding the right PAM solution can be challenging.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00