An introduction to ERM (Enterprise Risk Management) for security, IT and operational risk professionals. ISO and COSO frameworks; risk measurement and prioritization; mini-case studies and real-world ERM examples.
Practical ideas from CSOs and subject matter experts of all sorts
Is it simple? No. But containerization is a critical approach to BYOD security.
Good business continuity plans will keep your company up and running through interruptions of any kind: power failures, IT system crashes, natural disasters, supply chain problems and more.
A law firm's new subsidiary bets on the growing interrelationships in operational risk
No risk? No reward. We just have to calibrate it better.
Improvements in speed and visibility provide payoff for business and security
How to gather, analyze, and present security metrics for operational improvement and budgeting.
How can we be sure it will work?
What are you having?
Thanks to cloud computing, your business data is everywhere and being accessed by everyone. Making the wrong decision to protect your data can result in high costs, increased risk and executive exposure. View this live webinar on cloud security and the evolving data center, and learn why a data-centric approach to security is the best bet for today's virtual environment.