Understanding Your IT Risk Management Ecosystem

To protect your business from calamity – especially when undergoing digital transformation – a risk management ecosystem is essential. How well do you understand your company’s IT risk management ecosystem? For that matter, do you even have a risk management ecosystem? A risk management ecosystem is comprised of not only your own company’s IT assets, but those of your supply chain partners, cloud service providers, and other third-party technology providers. It also includes your own workforce and its approach to addressing IT risk. To reduce or eliminate vulnerabilities and threats that can impact the integrity and availability of your company’s data, it’s imperative to understand the risk policies, mitigation processes and security technologies being used.

Join us for this informative webinar as we explore what it takes to create and maintain a proper IT risk management ecosystem. The health of your company depends on your knowledge and management of this important topic.

Available:
On Demand
Duration:
1h 00min

Attend and you’ll learn:

  • What IT assets are included in your extended enterprise and how to maintain control over them
  • How to analyze your vulnerabilities so you can prevent or lessen the impact of attacks on your data
  • Ways to not just understand where your data resides, but also what kind of data you’re protecting in order to reduce risk
  • How to determine the proper risk tolerance for different situations and data sets
  • Steps to take when a breach occurs so that you can address the impact with clarity and effectiveness

Featured Speakers

  • John Pironti
    John Pironti
    President
    IP Architects

    John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.

  • Jon Ehret, CISSP, CISA, CRISC
    Jon Ehret, CISSP, CISA, CRISC
    Vice President of Strategy and Risk
    RiskRecon

    Jon Ehret is Vice President of Strategy and Risk for RiskRecon. Jon brings 20+ years of experience in technology and risk, including extensive experience building, maturing, and running third-party risk programs in both the finance and healthcare industries. Before joining RiskRecon, Jon built and lead the third-party risk program for BlueCross BlueShield of WNY and also served as President and Co-founder of the Third-Party Risk Association, an international professional association of third party risk practitioners and vendors. Jon is a frequent speaker at third-party risk conferences and holds a BS in Information Technology from the Rochester Institute of Technology, as well as the CISSP, CISA, and CRISC professional certifications.

  • Sara Peters
    Sara Peters
    Editor in Chief
    InformationWeek

    Sara Peters is the Editor in Chief at InformationWeek and formally a Senior Editor at Dark Reading and editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By