Author Archive
RSVP Form:Default
RSVP Form:Default
Note:
Cyber Insurance – The Questions that You Should Ask When You Transfer Technology Risk! Webinar Movie
IT Security Conference: The Night Between!
Thursday October 13, 2016 6:00 PM IT Security Conference: 10/13 and 10/14/2016! Hello! I’m so excited about the upcoming IT Security Conference that I’m reaching out to you before we even finalize the Conference Brochures! Won’t you join us for dinner? As you know, we’ve got a wonderful tradition of Dinner on the Night […]
cyberinsurance_movie
How to Review a SOC One and Two! Webinar Movie
How to Review a SOC One or Two! Webinar This is the seventh stop on our 2016 IT Governance Tour.
FREE infotex Webinar – Training Your Incident Response Team – The CAT MAIT Almanac
FREE infotex Webinar – Training Your Incident Response Team – The CAT MAIT Almanac November 16th 2016 at 9AM EDT Start planning for easy ways to Train Your Incident Response Team in 2017. Dan will run through an almanac of CAT statements and suggest how existing guidance can be leveraged. Register Now!
FREE infotex Webinar – Technology Planning
FREE infotex Webinar – Technology Planning for Small Institutions October 26th 2016 at 9AM EDT If you’ve found time to read the December 2015 update to the FFIEC’s Management Booklet, you might already have a new “to-do” for the fourth quarter of 2016: creating and documenting a Technology Plan. Our annual webinar on the subject […]
FREE infotex Webinar – Disaster Planning Meets Awareness Training Meets Risk Monitoring
FREE infotex Webinar – Disaster Planning Meets Awareness Training Meets Risk Monitoring September 9th 2016 at 9AM EDT Integrating the Technical with the Nontechnical Aspects of incident Response Planning. Case studies back up the need for a monthly Incident Response Team process. Register Now!
FREE infotex Webinar – Awareness in All Directions
FREE infotex Webinar – Awareness in All Directions August 23rd 2016 at 9AM EDT Back to the rest of Technology Risk Management, through IT Governance . . . . whether your most likely threat is cyber or non-technical pretext calling, no matter where the risk falls, the number one control that takes care of everything […]