How to consider policies and procedures when implementing effective risk management | SASIG
Forgotten your password?

Members can log in to register with one click

Don’t have a website account?

Non-members register here:

Registration form not showing or behaving correctly? Click here.

Friday 1 July 2022, 11am-12noon (BST)

Having looked at how governance affects risk management in his previous session (which you can see here), Tom will be back to discuss how policies and procedures also impact implementing effective risk management.

The use of data, particularly personally identifiable information, has enormous commerce potential but also the risk of abuse. Organisations are paying closer attention to how they manage information than ever before. The rise in cyber attacks, which expose personal data, has shed new light on how companies oversee information and technology through processes, people, and culture.

In this fascinating two-part series from BSI, Tom invites us to consider the governance that sets the direction of our organisations and the inputs, outputs, and risk alignment of this.

In this session, we will look at:

  • The governance outputs from regulation, industry, ethics, and culture.
  • Considerations towards our policies and procedures, training, education and sanctions, together with the controls and metrics.

Tom will demonstrate a holistic approach to cybersecurity and how we ought to centre on our workforce, with all the smart technology being the bolt-on: “Academically, the risk appetite is there, but practically, the budget and resources may be misaligned.”

Don’t worry if you miss one of the sessions in this enthralling series, which will provide much food for thought for us all – members will be able to log in to watch the recordings. Details of the first in this two-part series can be found here.

If you are a member of ISACA, ICA or The Security Institute, you can earn CPE/CPD points for attending our webinars live. Remember to log your attendance with your provider to be credited.

 
Presented by

Tom Brett (info), Global Lead-Training, BSI Group

Review the advice on using Zoom and other webex platforms securely here.

This website uses cookies, by continuing to use the site you agree to using cookies. Continue