How to Apply ISO 27001 Principles to Enterprise Risk Management in 2017
Michael C Redmond
60 Min
Product Id: 704828
This webinar training will help you implement ISO standards in your Enterprise risk management (ERM) system and understand the benefits. This session will enable on how to integrate ISO 27001 in your organization as the main structure for information security management.
Develop and Upgrade Sound Business Continuity Plans | New and Potential Threats
Javier Kuong
120 Min
Product Id: 704908
This webinar will offer guidelines on how organizations should take a short-, medium-, and long-term vision of their enterprise-wide contingency and business continuity plan preparation. It will also offer best practices to upgrade your Business Continuality Plan (BCP) to cope with a whole variety of new current and forecast threats, with uncertain times of occurrence, in a dynamic business and global threat panorama.
Mitigating and Conducting Very Effective Risk Assessments and Business Impact Analysis
Michael C Redmond
60 Min
Product Id: 704823
This webinar training will explain project management principles to prepare your business to overcome risk and outage. The instructor will discuss how to conduct risk assessment and business impact analysis. He will also discuss how to test and document risk elements and the process or steps to be taken to combat it.
Achieving Enterprise Information Security Goals - Creating Right Teams
Rich Devlin,Joe Grannemon
60 Min
Product Id: 704863
This webinar will involve a high-level discussion on how you can create effective teams for achieving your Information Security goals and addressing complex threats such as Ransomware. Learn how to create a Information Security plan and align your goals with objectives, strategies and tactics across teams.
Designing Effective Controls, Security Safeguards and Governance by a Risk-Based Methodology
Javier Kuong
120 Min
Product Id: 704656
This training program will provide a practical and structured methodology for the design of governance, controls and security provisions. The methodology can be applied to participants’ real work environment immediately. Participants will also benefit from comparing their present governance and controls design practices with the structured, risk-based methodology presented in the webinar.
Pricing for Risk in Merchant Payments - Risk Metrics, Reserve Requirements, Pricing Models, Best Interchange Rates, EMV/NFC Guidelines
Armen Khachadourian
90 Min
Product Id: 704546
This training program will provide insight into fundamental underwriting and risk management guidelines, determining variables that constitute merchant risk, and on how to assign a dollar value and quantify exposure.
Protecting Your Intellectual Property Abroad
Douglas Cohen
60 Min
Product Id: 702972
IP piracy costs more than a loss in sales. If your brand loses value because it is seen as less exclusive or is confused with poor imitations this poses a long term threat to profitability. Re-establishing brand identity and company reputation is expensive if not impossible. This webinar will provide specific, practical steps to take to lessen this risk of loss.
E-Compliance: Online Privacy, Harassment and Identity Theft in the Digital Age
Joseph Rosner
60 Min
Product Id: 704524
This webinar will discuss the bane of new technology and social media in regards to employers’ and employees’ privacy. The instructor will discuss e-compliances that employers need to adhere to avoid privacy suits. He will also cover the risks of information breach and defamation claims from electronic employee postings. Participants will know how to deal with online privacy and harassment claims and ways and limits of disciplining employees’ online presence. The course will also examine how to legally use Internet postings, profiles and other content in hiring decisions.
Risk Management - Best Practices, Roles and Responsibilities, Types and Preventives, Case Studies
Robert Geary
90 Min
Product Id: 703689
This webinar will demonstrate a conceptual framework and thought process to address risk management. It will discuss the significance of risk management processes with emphasis on causes of risk and risk preventives. The instructor will explain the best practices, roles and responsibilities, risk types and how to prevent them.
A Risk-Based Methodology to Develop and Prepare an Effective Service Level Agreement (SLA) Package to Improve Service and Security Quality
Javier Kuong
90 Min
Product Id: 703999
This training program will illustrate a structured methodology to develop effective service level agreements based on a top-down, risk-based approach, summarized in a matrix that documents the whole development process for specific SLAs that respond to business objectives.
Marketing for Most of Us Today
Barney Kramer
90 Min
Product Id: 704287
This training program will focus on current marketing avenues such as outbound and inbound marketing, social media and its reach with consumers, content marketing and more. It will focus on the basics of marketing principles and guide attendees in developing target markets and segments for subsets of your strategic plan.
3-Hour Virtual Training: Guidelines for Performing a Corporate Wide Internal Audit Risk Assessment
Marna Steuart
180 Min
Product Id: 704386
This training program will detail key components of a risk assessment and management program, and include a fraud risk assessment discussion. Other training points in the program include analyzing the methodology for successful risk assessment process, understanding the steps involved in the risk assessment process, and fraud risk assessment.
Out in the Open: Protecting Your Privacy and Identity in the Digital Age on the Internet
Joseph Rosner
60 Min
Product Id: 704256
This privacy protection in the digital age training program will detail what the Internet of Things is and how it collects data and tracks you. It will further examine the risks attached to personal information and more.
Vendor Management - Building a Strong Questionnaire
Michael D King
60 Min
Product Id: 704119
This training program will highlight why a vendor questionnaire is the keystone your vendor management program is built on. The course will help ensure attendees get the whole picture and determine appropriate controls for information security and privacy.
ISO/IEC 27001:2013 - Breaking It Down to Understand and Implement
Michael C Redmond
90 Min
Product Id: 703977
This training program will guide attendees in implementing and complying with the requirements of ISO 27001:2013. ISO 27001 is an international standard published by the International Standardization Organization (ISO), and it describes how to manage information security in a company. The latest revision of this standard was published in 2013, and its full title now is ISO/IEC 27001:2013.
How to Develop a Successful ERM Program Ensuring Synergy, Transparency and System Solutions
Michael C Redmond
60 Min
Product Id: 703580
This webinar highlights the importance of an effective ERM program in project management and risk assessment. Attendees will learn how to implement a viable ERM program including documenting and testing it.
Managing Corporate Risks with ISO 31000
Kelly Eisenhardt
60 Min
Product Id: 705083
ISO 31000 is a standard developed by the International Organization for Standardization (ISO) which provides a basic guideline and principles for the application of risk management. Companies that use risk management processes vary across industries in scope and magnitude and address a wide variety of challenges. This training program will offer an in depth look into the key components of the ISO 31000 guideline and best practices to implement and support a corporate risk management strategy or program.
Introduction to disaster/emergency management and business continuity programs
Bill Greulich
60 Min
Product Id: 701337
This Risk management training module will describe a common set of criteria for disaster/emergency management and business continuity programs.
How to Establish an Effective IT Governance, Risk and Compliance (GRC) Framework - Organization and Responsibilities
Michael C Redmond
Product Id: 704991
This training program will discuss how to develop a great GRC program that ensures proper governance, risk management and compliance management of all IT systems and processes that support the business operations.
Developing a Highly Effective Enterprise Risk Management Program
Michael C Redmond
Product Id: 704827
This webinar highlights the importance of an effective ERM program in project management and risk assessment. Attendees will learn how to implement a viable ERM program including documenting and testing it.







