This item qualifies for
CPE credit(s) accredited by GRC Certify
if you watch it from beginning to end. Credit is automatically tracked to your certifications and recorded on
your CPE Transcript.
CPE Qualification: CPE tracking is disabled for your account.
In order to automatically receive CPE credits, you must enable VIP Autopay in your account settings.
As the frequency and severity of cybersecurity events increases, organizations must implement stronger processes for managing critical IT risks, requirements, and resources.
As the frequency and severity of cybersecurity events increases, organizations must implement stronger processes for managing critical IT risks, requirements, and resources.
With organizations of all sizes scrambling to strengthen their defenses, it’s important to recognize that the governance of information security and technology is a tenant of risk management, and is more effective when implemented with a risk-based approach.
Join us on September 15th to learn actionable steps for adopting a risk-based cybersecurity program at your organization.
Learning Objectives:
Understand the intersection between IT and the Risk Manager
Identify critical cyber risks, adhere with compliance frameworks and requirements, and objectively prioritize key concerns before they materialize
Learn how to save your organization money and it’s reputation with a risk-based approach
Speakers:
Steven Minsky, CEO of LogicManager and Author of the RIMS Risk Maturity Model