This webinar will explain how to conduct a compliance gap analysis for Enterprise Risk Management (ERM). Attendees will learn best practices to ensure ERM compliance.
Why should you Attend
Areas of Enterprise Risk Management include: business continuity, disaster recovery, cyber security, information security, emergency management and crisis management. If you are responsible for one of the enterprise risk areas and are not ensuring that the company is compliant, you may be held liable by your corporation.
Scope, stakeholders, process, documentation techniques, and reporting are five of the key areas that must be determined before even starting.
Many companies today are "short staffed" and may skip vital steps that are required due to limited time and resources. By conducting a compliance gap analysis properly one can better prioritize time and ensure that the required processes are being adhered to.
This webinar will explain how to conduct a compliance gap analysis for Enterprise Risk Management: both from bench marking and adherence to regulations, best practices, guidelines and standards, and in determining which regulations, best practices, guidelines and standards to utilize.
Areas Covered in the Session
- Determining Scope
- Documentation Techniques
- Identifying Stakeholders
- Including Compliance for Enterprise Risk into Operations
- Including Compliance for Enterprise Risk into Project Management
- Preparing Reports
- What is New
- What is the Process
- Including a management system into managing Enterprise Risk
- Areas of Enterprise Risk Management
- ISO standards family - for what purpose should each standard be used
- Implementation Tips- costs involved, hiring a consultant, how long does it take, using tools
Who Will Benefit
- Project Management
- Business Continuity
- Disaster Recovery
- Cyber Security
- Information Security
- Emergency Management
- Crisis Management
- Internal Audit
- Information Technology
Ms. Michael Redmond She is a Consultant, Speaker and Author. She also conducts ISO Certification Training for PECB. Michael is the Chapter President for Association of Contingency Planners Eastern Great Lake Chapter and an active member of ISSA.
Michael is certified as a Lead Implementer in ISO 27001 Information Security Management, ISO 27035 Security Incident Response, ISO 22301 Business Continuity Management and ISO 21500 Project Management. She is a Certified Instructor for ISO Certification Courses through PECB. Also certified Project Manager PMP, and 2 Master Certifications (MBCP) (FBCI) in Disaster Recovery and CEM Emergency Management
She has consulted in the area of Cyber Security for clients in the arenas of Healthcare, Insurance, Financial and Manufacturing. Her projects have included:
SIEM Security information and event management which is Combining software products and services combining security information management (SIM) and security event management (SEM)
(CSIRT) which is Cyber Security Incident Response Programs, Plans, Playbooks, Training and Testing.
Audit of CSIRT programs and documentation
Information Security Programs and Implementation
She has 2 books which are coming out in 2016 and are being published by one of the Top International Publishers in the world. The first is a Cyber Security book and the second is a Business Continuity and Disaster Recovery book
Michael has a series of Audio Training that receive CEU's from Disaster Recovery Institute (DRI) and other certifying organizations..
Cyber Security Training for - 6 CEU's
Business Continuity Management for 20 CEU's. www.rwknowledge.com
Michael's been honored as Top Woman in her field at a White House Luncheon and was selected out of the world to write the prolog for the chapter on RISK Management by the United Nations for their Disaster Book which was given to the head of state for every UN member nation. She has recently been named on the list of "Women of Distinction for 2015" by Women of Distinction Magazine for her work in Cyber Security.
She was selected to speak on Cyber Security Incident Response and SIEM at such recent conferences as:
International ISSA Conference in Chicago
NYS Cyber Security Conference - Co Spoke with Acting CISO for New York State
ISACA Western New York Conference
Metric Stream Round Table in New York City