Modulo Signs On as Gold Sponsor of ISACA's Information Security and Risk Management Conference [Manufacturing Close - Up]
(Manufacturing Close - Up Via Acquire Media NewsEdge) Modulo, a provider of Technology Governance, Risk and Compliance (GRC) solutions, announced the company is a gold sponsor of the ISACA 2013 North American Information Security and Risk Management (ISRM) conference in Las Vegas, November 6-8, at The Cosmopolitan of Las Vegas.
Modulo experts will present sessions on three trends in IT GRC: "Shadow IT," "Business Continuity Management" and "Enterprise Risk Management."
In a release, the company noted that soon as much as 90 percent of a company's IT budget will come from outside the IT department. It is therefore a business imperative for IT security and risk professionals to understand and embrace the rapid growth of "Shadow IT" - a term used to describe IT systems and solutions deployed within organizations by departments outside the IT department. Shadow IT can serve as a source of innovation but it can also present significant risks to an organizations information security. Attendees will learn techniques to best control Shadow IT without stifling it, including: building risk councils with other business units, setting up risk surveys and assessment programs, understanding risk analytics to gain visibility into business impact, and supporting scale and flexibility needs.
Join Modulo for these presentations and download the presentations here:
Embracing Shadow IT: How to Encourage Innovation Within a Secure Shadow IT infrastructure
-Thursday November 7, 11:45am-1pm Lunch & Learn
-Presented by John Ambra, CISA, Director of Technical Services, Modulo
-Shadow IT can serve as a source of innovation but it can also present significant risks to an organizations information security. Attendees will learn techniques to best control Shadow IT without stifling it.
Megatrend Session: Time for BCM? Why and When to Include BCM in Broader Risk Management Efforts
-Wednesday, November 6, 2:15-3:15pm
-Presented by Carlos Krause, CISA, Manager of Professional Services, Modulo
-Modern organizations depend heavily on IT infrastructure to deliver products and services. The availability of servers, networks, applications, and - of course - the Internet are now crucial to daily operations and success. Maturing information security departments perceive Business Continuity Management (BCM) as an important component of broader governance, risk, and compliance management programs. How do you know your organization is ready to implement BCM automation?
-Download presentation here: http://www.isaca.org/Education/ Conferences/Documents/NAISRM-2013-Presentations/135.pdf
Risk Management 2.0: From Information Security to Enterprise Risk Management
-Thursday, November 7, 5:30-6pm
-Presented by Portia Mills, Head of Marketing, Modulo
-Learn how information security officers have evolved IT risk management programs to incorporate expand risk management objectives and report risk on a higher and broader level. Case studies describe how security officers have begun by automating vulnerability and threat management, IT control assessments, and vendor risk management into enterprise and built enterprise-level risk management programs.
The conference will offer panel and interactive discussions, networking events and engaging workshops in the following tracks: Cybersecurity, Privacy/Security, Risk Management, Compliance, and Forums. Pre- and post-conference workshops will cover COBIT 5 for Information Security, data privacy risks, COBIT 5 for Risk, cybersecurity solutions, bring your own device (BYOD), and digital forensics.
((Comments on this story may be sent to firstname.lastname@example.org))
(c) 2013 ProQuest Information and Learning Company; All Rights Reserved.
[ Back To TMCnet.com's Homepage ]