Categories |
HUMAN RESOURCES
|
About |
This webinar's objective is to provide an analysis of the current situation in cyber security, risk management and compliance, pointing out deficiencies in most organizations and the options to consider in developing an "effective" C-level organizational structure to improve an organization?s ability to be readier to deal with cyber security, risk assessment and compliance to regulatory mandates. Why should you attend this webinar? Today's increasingly complex domestic and global cyber-attacks plus a strong regulatory environment require well-structured organizational functions to achieve effective, enterprise-wide Governance, Risk Management and Compliance (GRC) programs. The incidence of minor and major cyber security attacks along with the never-ending novel ways being devised by cyber interlopers is reaching alarming proportions. These cyber-attacks are being perpetrated not only by domestic internal and external perpetrators but, often, by international cyber attackers and foreign government agencies for malicious purposes, personal gain or to engage in industrial espionage and critical proprietary knowledge theft. The Board, the CEO and senior line and staff executives, who are ultimately responsible, are unable to directly deal with the massive problem. Senior management and the Board need and want credible information on the company's status of Governance, Risk management and Compliance programs and how is the enterprise organized to address the wide variety of cyber risks that can impact its profitability, its business continuity, its compliance to regulatory mandates and its reputation. Organizationally, the protection functions such as the Chief Information Officer (CIO), the Chief Security Officer (CSO), the Chief Information Security Officer (CISO), the Chief Risk Officer (CRO) and, more recently, the Chief Data Officer (CDO), are fractionated with overlapping roles and responsibilities. There is a lack of coordination on the critical cyber risk issues. Their individualized protection programs are highly insular and scattered across the enterprise without any semblance of coordination and uniformity in approach and with plenty of costly overlaps. |
Call for Papers |
Areas Covered in the Session:
Who can Benefit:
|
Credits and Sources |
[1] Cyber Threats and Compliance to Regulati 2020 : Effective Enterprise Protection from Cyber Threats and Compliance to Regulations |