+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Integrating Cyber Risks in the ERM Plan

  • Training

  • 90 Minutes
  • Compliance Online
  • ID: 4899641
You need to protect your information technology assets and information against unauthorized internal or external access and cyber-attacks. Data destruction, alteration, unavailability or breach of confidentiality are the consequences of such attacks. A primary step toward inventorying, assessing, and addressing cyber risks that threaten your organization is to develop and maintain a cyber risk management program as part of your enterprise risk management framework. This presentation will help in developing your organization's risk profile and decide the action plans to mitigate those risks.

Why Should You Attend:

Large corporations recently have been plagued by data leaks resulting in significant financial losses and reputational damage. The primary step to building a robust information security program is to understand current and emerging threats, your own vulnerabilities and the sources of attack. Such an information security program will protect your company and prevent major data loss. The best way to document the risk profile of your organization and decide action plans to properly mitigate those risks is to develop a cybersecurity risk register consisting of information about the many risks, their probability, and potential impact, and how they compare to the firm's appetite. This evaluation is accomplished through cyber risk workshops that your subject matter experts and business managers attend.

Areas Covered in the Webinar:

  • An overview of new & emerging cybersecurity risks
  • Understanding IT risks in your organization - sources, business impact
  • identifying external threats
  • internal sources of risk - personnel, contractors, third party vendors
  • Implications of IT/cybersecurity risks - financial, reputational, regulatory
  • Breaking down silos - integrating IT/IT risk management with broader organization
  • How Boards are reacting to security breaches and IT risks - concerns and expectations
  • IT risk management’s missing link - connecting IT frameworks (COBIT, ISO) to the broader enterprise risk management framework to achieve corporate goals
  • Quantifying IT risk management expenses and the cost of losses from hacks/theft - tackling the security budgeting challenge
  • Creating your IT risk dashboard including key risk indicators (KRIs) and key performance indicators (KPIs)
  • Practical examples and insights from working experiences

Who Will Benefit:

  • This webinar was developed to meet the needs of
  • Banks
  • Asset Managers
  • Broker/Dealers
  • Insurance Companies and all other financial institutions
  • Supervisors
  • Financial Officers
  • Risk Officers
  • Internal Auditors
  • Operational Risk Managers
  • Internal Auditors
  • Board members
  • General (legal) counsel
  • Financial officers
  • Internal and external auditors
  • Operational risk managers
  • Regulators who supervise or examine banks or financial institutions
  • CFOs (Chief Financial Officers)
  • COO (Chief Operating Officers)
  • CRO (Chief Risk Officers)
  • CIO (Chief Information Officers)
  • CPAs (Certified Public Accountants)
  • CBAs (Chartered Bank Auditors)
  • CIAs (Certified Internal Auditors)
  • CFEs (Certified Fraud Examiners)
  • Business Managers
  • Investment Managers
  • Treasurers

Speaker

Mario Mosse

Course Provider

  • Mario Mosse
  • Mario Mosse,