際際滷shows by User: ResolverInc / http://www.slideshare.net/images/logo.gif 際際滷shows by User: ResolverInc / Thu, 04 Apr 2019 13:14:37 GMT 際際滷Share feed for 際際滷shows by User: ResolverInc How to Prove the Value of Security Investments /slideshow/how-to-prove-the-value-of-security-investments/139549535 asiswebinar-howtoprovethevalueofcorporatesecurity-finalcompressed-190404131437
The role of a corporate security professional is complicated. You know that your job has been done when no one knows that youve done your job, you give people the confidence to take risks knowing that there is someone to protect them, and you act as the backstop in the case of a once in a lifetime catastrophic event like a terrorist attack or natural disaster. While all these things are true, they are very hard to qualify and quantify. The good news? You dont need these variables to make your case, but you can definitely make a case based on the more mundane incidents that happen all the time. This presentation walks you through the exercise of qualifying and quantifying what you do every day to keep your organization protected from security risks. It will help you clearly communicate the source and magnitude of the value of security investments to your leadership, giving them the confidence that you will get that return! Content was created by Resolver and presented by Security Management, an ASIS publication, on April 4th as a live webinar.]]>

The role of a corporate security professional is complicated. You know that your job has been done when no one knows that youve done your job, you give people the confidence to take risks knowing that there is someone to protect them, and you act as the backstop in the case of a once in a lifetime catastrophic event like a terrorist attack or natural disaster. While all these things are true, they are very hard to qualify and quantify. The good news? You dont need these variables to make your case, but you can definitely make a case based on the more mundane incidents that happen all the time. This presentation walks you through the exercise of qualifying and quantifying what you do every day to keep your organization protected from security risks. It will help you clearly communicate the source and magnitude of the value of security investments to your leadership, giving them the confidence that you will get that return! Content was created by Resolver and presented by Security Management, an ASIS publication, on April 4th as a live webinar.]]>
Thu, 04 Apr 2019 13:14:37 GMT /slideshow/how-to-prove-the-value-of-security-investments/139549535 ResolverInc@slideshare.net(ResolverInc) How to Prove the Value of Security Investments ResolverInc The role of a corporate security professional is complicated. You know that your job has been done when no one knows that youve done your job, you give people the confidence to take risks knowing that there is someone to protect them, and you act as the backstop in the case of a once in a lifetime catastrophic event like a terrorist attack or natural disaster. While all these things are true, they are very hard to qualify and quantify. The good news? You dont need these variables to make your case, but you can definitely make a case based on the more mundane incidents that happen all the time. This presentation walks you through the exercise of qualifying and quantifying what you do every day to keep your organization protected from security risks. It will help you clearly communicate the source and magnitude of the value of security investments to your leadership, giving them the confidence that you will get that return! Content was created by Resolver and presented by Security Management, an ASIS publication, on April 4th as a live webinar. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/asiswebinar-howtoprovethevalueofcorporatesecurity-finalcompressed-190404131437-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The role of a corporate security professional is complicated. You know that your job has been done when no one knows that youve done your job, you give people the confidence to take risks knowing that there is someone to protect them, and you act as the backstop in the case of a once in a lifetime catastrophic event like a terrorist attack or natural disaster. While all these things are true, they are very hard to qualify and quantify. The good news? You dont need these variables to make your case, but you can definitely make a case based on the more mundane incidents that happen all the time. This presentation walks you through the exercise of qualifying and quantifying what you do every day to keep your organization protected from security risks. It will help you clearly communicate the source and magnitude of the value of security investments to your leadership, giving them the confidence that you will get that return! Content was created by Resolver and presented by Security Management, an ASIS publication, on April 4th as a live webinar.
How to Prove the Value of Security Investments from Resolver Inc.
]]>
1960 2 https://cdn.slidesharecdn.com/ss_thumbnails/asiswebinar-howtoprovethevalueofcorporatesecurity-finalcompressed-190404131437-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ERM Benchmarking Survey Results /slideshow/erm-benchmarking-survey-results/125914975 ermbenchmarkingsurveyresults-181214181417
On December 6th, 2018, Resolver and The Risk Management Society (RIMS) hosted a webinar titled, Proving the Value of Your ERM Program. 215 risk professionals attended and participated in a benchmarking survey. These are the results.]]>

On December 6th, 2018, Resolver and The Risk Management Society (RIMS) hosted a webinar titled, Proving the Value of Your ERM Program. 215 risk professionals attended and participated in a benchmarking survey. These are the results.]]>
Fri, 14 Dec 2018 18:14:17 GMT /slideshow/erm-benchmarking-survey-results/125914975 ResolverInc@slideshare.net(ResolverInc) ERM Benchmarking Survey Results ResolverInc On December 6th, 2018, Resolver and The Risk Management Society (RIMS) hosted a webinar titled, Proving the Value of Your ERM Program. 215 risk professionals attended and participated in a benchmarking survey. These are the results. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ermbenchmarkingsurveyresults-181214181417-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> On December 6th, 2018, Resolver and The Risk Management Society (RIMS) hosted a webinar titled, Proving the Value of Your ERM Program. 215 risk professionals attended and participated in a benchmarking survey. These are the results.
ERM Benchmarking Survey Results from Resolver Inc.
]]>
460 1 https://cdn.slidesharecdn.com/ss_thumbnails/ermbenchmarkingsurveyresults-181214181417-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Best Practices and ROI for Risk-based Vulnerability Management /slideshow/best-practices-and-roi-for-riskbased-vulnerability-management/120699364 resolverriskvisiontvmwebinar-oct24-181025143447
Risk Vision explores the best practices and ROI of the most successful business risk-centric vulnerability management programs. Watch the full webcast here: https://youtu.be/gW_ZAFpTK20]]>

Risk Vision explores the best practices and ROI of the most successful business risk-centric vulnerability management programs. Watch the full webcast here: https://youtu.be/gW_ZAFpTK20]]>
Thu, 25 Oct 2018 14:34:47 GMT /slideshow/best-practices-and-roi-for-riskbased-vulnerability-management/120699364 ResolverInc@slideshare.net(ResolverInc) Best Practices and ROI for Risk-based Vulnerability Management ResolverInc Risk Vision explores the best practices and ROI of the most successful business risk-centric vulnerability management programs. Watch the full webcast here: https://youtu.be/gW_ZAFpTK20 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/resolverriskvisiontvmwebinar-oct24-181025143447-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Risk Vision explores the best practices and ROI of the most successful business risk-centric vulnerability management programs. Watch the full webcast here: https://youtu.be/gW_ZAFpTK20
Best Practices and ROI for Risk-based Vulnerability Management from Resolver Inc.
]]>
938 3 https://cdn.slidesharecdn.com/ss_thumbnails/resolverriskvisiontvmwebinar-oct24-181025143447-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Taking a Data-Driven Approach to Business Continuity /slideshow/taking-a-data-driven-approach-to-business-continuity/99773376 kevinhall-datadrivenbusinesscontinuity-180531171828
When it comes to business continuity, we all know that data is king. Reporting on metrics is one of the few ways to truly know that what youre doing works, but for many, this is a huge challenge. Learn the top 7 metrics that you should be reporting on in your BC/DR program and share strategies and tools to collect these metrics from other departments in your organization.]]>

When it comes to business continuity, we all know that data is king. Reporting on metrics is one of the few ways to truly know that what youre doing works, but for many, this is a huge challenge. Learn the top 7 metrics that you should be reporting on in your BC/DR program and share strategies and tools to collect these metrics from other departments in your organization.]]>
Thu, 31 May 2018 17:18:28 GMT /slideshow/taking-a-data-driven-approach-to-business-continuity/99773376 ResolverInc@slideshare.net(ResolverInc) Taking a Data-Driven Approach to Business Continuity ResolverInc When it comes to business continuity, we all know that data is king. Reporting on metrics is one of the few ways to truly know that what youre doing works, but for many, this is a huge challenge. Learn the top 7 metrics that you should be reporting on in your BC/DR program and share strategies and tools to collect these metrics from other departments in your organization. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/kevinhall-datadrivenbusinesscontinuity-180531171828-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> When it comes to business continuity, we all know that data is king. Reporting on metrics is one of the few ways to truly know that what youre doing works, but for many, this is a huge challenge. Learn the top 7 metrics that you should be reporting on in your BC/DR program and share strategies and tools to collect these metrics from other departments in your organization.
Taking a Data-Driven Approach to Business Continuity from Resolver Inc.
]]>
306 4 https://cdn.slidesharecdn.com/ss_thumbnails/kevinhall-datadrivenbusinesscontinuity-180531171828-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Terrorism in a Corporate Setting /slideshow/terrorism-in-a-corporate-setting/99772790 trapintersectmay2018-180531171529
Dr. Reid Meloy is a forensic psychologist and the co-creator of the Workplace Assessment of Violence Risk (WAVR-21) and Terrorist Radicalization Assessment Protocol (TRAP-18) instruments. In this session, Dr. Meloy will discuss the warning signs of lone actor terrorist threats in a corporate setting through the lens of the TRAP-18 (Terrorist Radicalization Assessment Protocol) methodology. Such indicators are considered proximal warning behaviors for targeted violence, and have been shown to be both reliable and valid measures of terrorism risk.]]>

Dr. Reid Meloy is a forensic psychologist and the co-creator of the Workplace Assessment of Violence Risk (WAVR-21) and Terrorist Radicalization Assessment Protocol (TRAP-18) instruments. In this session, Dr. Meloy will discuss the warning signs of lone actor terrorist threats in a corporate setting through the lens of the TRAP-18 (Terrorist Radicalization Assessment Protocol) methodology. Such indicators are considered proximal warning behaviors for targeted violence, and have been shown to be both reliable and valid measures of terrorism risk.]]>
Thu, 31 May 2018 17:15:29 GMT /slideshow/terrorism-in-a-corporate-setting/99772790 ResolverInc@slideshare.net(ResolverInc) Terrorism in a Corporate Setting ResolverInc Dr. Reid Meloy is a forensic psychologist and the co-creator of the Workplace Assessment of Violence Risk (WAVR-21) and Terrorist Radicalization Assessment Protocol (TRAP-18) instruments. In this session, Dr. Meloy will discuss the warning signs of lone actor terrorist threats in a corporate setting through the lens of the TRAP-18 (Terrorist Radicalization Assessment Protocol) methodology. Such indicators are considered proximal warning behaviors for targeted violence, and have been shown to be both reliable and valid measures of terrorism risk. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/trapintersectmay2018-180531171529-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Dr. Reid Meloy is a forensic psychologist and the co-creator of the Workplace Assessment of Violence Risk (WAVR-21) and Terrorist Radicalization Assessment Protocol (TRAP-18) instruments. In this session, Dr. Meloy will discuss the warning signs of lone actor terrorist threats in a corporate setting through the lens of the TRAP-18 (Terrorist Radicalization Assessment Protocol) methodology. Such indicators are considered proximal warning behaviors for targeted violence, and have been shown to be both reliable and valid measures of terrorism risk.
Terrorism in a Corporate Setting from Resolver Inc.
]]>
523 7 https://cdn.slidesharecdn.com/ss_thumbnails/trapintersectmay2018-180531171529-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Reporting to the Board on Corporate Compliance /slideshow/reporting-to-the-board-on-corporate-compliance/99772384 johnjason-intrsect2018-180531171327
Boards of directors are expected to provide oversight and challenge for the compliance program. To assist them, compliance professionals need to provide more sophisticated reporting based on observable facts. Fortunately, this is one of the biggest payoffs of the Resolver regulatory compliance management tool. Learn how Resolver can facilitate your board reporting and align to the challenges of a modern regulatory environment.]]>

Boards of directors are expected to provide oversight and challenge for the compliance program. To assist them, compliance professionals need to provide more sophisticated reporting based on observable facts. Fortunately, this is one of the biggest payoffs of the Resolver regulatory compliance management tool. Learn how Resolver can facilitate your board reporting and align to the challenges of a modern regulatory environment.]]>
Thu, 31 May 2018 17:13:27 GMT /slideshow/reporting-to-the-board-on-corporate-compliance/99772384 ResolverInc@slideshare.net(ResolverInc) Reporting to the Board on Corporate Compliance ResolverInc Boards of directors are expected to provide oversight and challenge for the compliance program. To assist them, compliance professionals need to provide more sophisticated reporting based on observable facts. Fortunately, this is one of the biggest payoffs of the Resolver regulatory compliance management tool. Learn how Resolver can facilitate your board reporting and align to the challenges of a modern regulatory environment. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/johnjason-intrsect2018-180531171327-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Boards of directors are expected to provide oversight and challenge for the compliance program. To assist them, compliance professionals need to provide more sophisticated reporting based on observable facts. Fortunately, this is one of the biggest payoffs of the Resolver regulatory compliance management tool. Learn how Resolver can facilitate your board reporting and align to the challenges of a modern regulatory environment.
Reporting to the Board on Corporate Compliance from Resolver Inc.
]]>
2141 7 https://cdn.slidesharecdn.com/ss_thumbnails/johnjason-intrsect2018-180531171327-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
An Intro to Resolver's Compliance Application /slideshow/an-intro-to-resolvers-compliance-application/99769012 intersect2018-complianceapplication-180531165618
The velocity and volume of regulatory changes suggests that the environment is continuously becoming more complex. As new laws are enacted, organizations must adapt the way they conduct business. In this presentation you will learn how a software tool can help reduce compliance exposure by assessing ethical and legal risks, identifying process gaps, and reporting critical compliance developments to executives and the board.]]>

The velocity and volume of regulatory changes suggests that the environment is continuously becoming more complex. As new laws are enacted, organizations must adapt the way they conduct business. In this presentation you will learn how a software tool can help reduce compliance exposure by assessing ethical and legal risks, identifying process gaps, and reporting critical compliance developments to executives and the board.]]>
Thu, 31 May 2018 16:56:18 GMT /slideshow/an-intro-to-resolvers-compliance-application/99769012 ResolverInc@slideshare.net(ResolverInc) An Intro to Resolver's Compliance Application ResolverInc The velocity and volume of regulatory changes suggests that the environment is continuously becoming more complex. As new laws are enacted, organizations must adapt the way they conduct business. In this presentation you will learn how a software tool can help reduce compliance exposure by assessing ethical and legal risks, identifying process gaps, and reporting critical compliance developments to executives and the board. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/intersect2018-complianceapplication-180531165618-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The velocity and volume of regulatory changes suggests that the environment is continuously becoming more complex. As new laws are enacted, organizations must adapt the way they conduct business. In this presentation you will learn how a software tool can help reduce compliance exposure by assessing ethical and legal risks, identifying process gaps, and reporting critical compliance developments to executives and the board.
An Intro to Resolver's Compliance Application from Resolver Inc.
]]>
193 2 https://cdn.slidesharecdn.com/ss_thumbnails/intersect2018-complianceapplication-180531165618-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Information Security Best Practices: Keeping Your Company's Data Safe /slideshow/information-security-best-practices-keeping-your-companys-data-safe/99768447 bestpracticesinfosecjamespatterson-180531165326
As a cloud-first software vendor, you trust us to manage your critical data. Protecting it is job zero. How do we do it? Attend this session to learn the details of Resolvers Information Security Program and learn some practices you can apply to your organization.]]>

As a cloud-first software vendor, you trust us to manage your critical data. Protecting it is job zero. How do we do it? Attend this session to learn the details of Resolvers Information Security Program and learn some practices you can apply to your organization.]]>
Thu, 31 May 2018 16:53:26 GMT /slideshow/information-security-best-practices-keeping-your-companys-data-safe/99768447 ResolverInc@slideshare.net(ResolverInc) Information Security Best Practices: Keeping Your Company's Data Safe ResolverInc As a cloud-first software vendor, you trust us to manage your critical data. Protecting it is job zero. How do we do it? Attend this session to learn the details of Resolvers Information Security Program and learn some practices you can apply to your organization. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bestpracticesinfosecjamespatterson-180531165326-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As a cloud-first software vendor, you trust us to manage your critical data. Protecting it is job zero. How do we do it? Attend this session to learn the details of Resolvers Information Security Program and learn some practices you can apply to your organization.
Information Security Best Practices: Keeping Your Company's Data Safe from Resolver Inc.
]]>
177 5 https://cdn.slidesharecdn.com/ss_thumbnails/bestpracticesinfosecjamespatterson-180531165326-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Trends: From "Silos" to Integrated Risk Management /slideshow/security-trends-from-silos-to-integrated-risk-management/99755022 resolverintersectpptpresentation2-180531154345
Learn about the recent trend that sees security practitioners moving away from a traditional siloed approach to problem solving that relies heavily on unique individual responsibilities and expertise. By breaking down information silos and employing a multi-disciplinary approach to problem solving, organizations can achieve better results through more efficient and effective risk management.]]>

Learn about the recent trend that sees security practitioners moving away from a traditional siloed approach to problem solving that relies heavily on unique individual responsibilities and expertise. By breaking down information silos and employing a multi-disciplinary approach to problem solving, organizations can achieve better results through more efficient and effective risk management.]]>
Thu, 31 May 2018 15:43:45 GMT /slideshow/security-trends-from-silos-to-integrated-risk-management/99755022 ResolverInc@slideshare.net(ResolverInc) Security Trends: From "Silos" to Integrated Risk Management ResolverInc Learn about the recent trend that sees security practitioners moving away from a traditional siloed approach to problem solving that relies heavily on unique individual responsibilities and expertise. By breaking down information silos and employing a multi-disciplinary approach to problem solving, organizations can achieve better results through more efficient and effective risk management. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/resolverintersectpptpresentation2-180531154345-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn about the recent trend that sees security practitioners moving away from a traditional siloed approach to problem solving that relies heavily on unique individual responsibilities and expertise. By breaking down information silos and employing a multi-disciplinary approach to problem solving, organizations can achieve better results through more efficient and effective risk management.
Security Trends: From "Silos" to Integrated Risk Management from Resolver Inc.
]]>
188 1 https://cdn.slidesharecdn.com/ss_thumbnails/resolverintersectpptpresentation2-180531154345-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Modelling your Business Processes with Resolver Core /slideshow/modelling-your-business-processes-with-resolver/99753533 intersect2018-processesrtandtim-180531153547
How can Resolver work for you? Take a look at some internal processes of the participants in the room, how to intelligently map them to look for greater efficiency, and then how to integrate those processes right into Resolver Core. Learn how to use design thinking to improve your departments work, and how Resolver can adapt to meet even the most esoteric workflows. ]]>

How can Resolver work for you? Take a look at some internal processes of the participants in the room, how to intelligently map them to look for greater efficiency, and then how to integrate those processes right into Resolver Core. Learn how to use design thinking to improve your departments work, and how Resolver can adapt to meet even the most esoteric workflows. ]]>
Thu, 31 May 2018 15:35:47 GMT /slideshow/modelling-your-business-processes-with-resolver/99753533 ResolverInc@slideshare.net(ResolverInc) Modelling your Business Processes with Resolver Core ResolverInc How can Resolver work for you? Take a look at some internal processes of the participants in the room, how to intelligently map them to look for greater efficiency, and then how to integrate those processes right into Resolver Core. Learn how to use design thinking to improve your departments work, and how Resolver can adapt to meet even the most esoteric workflows. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/intersect2018-processesrtandtim-180531153547-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How can Resolver work for you? Take a look at some internal processes of the participants in the room, how to intelligently map them to look for greater efficiency, and then how to integrate those processes right into Resolver Core. Learn how to use design thinking to improve your departments work, and how Resolver can adapt to meet even the most esoteric workflows.
Modelling your Business Processes with Resolver Core from Resolver Inc.
]]>
177 2 https://cdn.slidesharecdn.com/ss_thumbnails/intersect2018-processesrtandtim-180531153547-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How Resolver Uses Resolver /slideshow/how-resolver-uses-resolver/99752954 howresolverusesresolver-jamesp-180531153247
It should come as no surprise that we practice what we preach! In this session, learn how Resolver uses Core to support its internal risk and information security practices like SOC 2 compliance and vendor risk management. Walk away with best practices on how to protect what matters in your own organization.]]>

It should come as no surprise that we practice what we preach! In this session, learn how Resolver uses Core to support its internal risk and information security practices like SOC 2 compliance and vendor risk management. Walk away with best practices on how to protect what matters in your own organization.]]>
Thu, 31 May 2018 15:32:47 GMT /slideshow/how-resolver-uses-resolver/99752954 ResolverInc@slideshare.net(ResolverInc) How Resolver Uses Resolver ResolverInc It should come as no surprise that we practice what we preach! In this session, learn how Resolver uses Core to support its internal risk and information security practices like SOC 2 compliance and vendor risk management. Walk away with best practices on how to protect what matters in your own organization. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/howresolverusesresolver-jamesp-180531153247-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> It should come as no surprise that we practice what we preach! In this session, learn how Resolver uses Core to support its internal risk and information security practices like SOC 2 compliance and vendor risk management. Walk away with best practices on how to protect what matters in your own organization.
How Resolver Uses Resolver from Resolver Inc.
]]>
183 2 https://cdn.slidesharecdn.com/ss_thumbnails/howresolverusesresolver-jamesp-180531153247-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Scammed: Defend Against Social Engineering /slideshow/scammed-defend-against-social-engineering/99752455 scammeddefendagainstsocialengineering-2018-v3-180531152951
Do you know how to identify and respond to cyberattacks? As the size, severity and frequency of hacks continues to grow, A-LIGN President Gene Geiger looks to assist organizations in managing and minimizing the risk of cyberattacks. This presentation will evaluate different security trends and risks, review a client environment and account compromise through social engineering, and provide practical advice on how to avert your organization from becoming compromised. As hackers become increasingly savvy at accessing accounts and sensitive information, this session will help your organization build a security foundation to avoid becoming another target. This presentation reviews the current data breach landscape, reviewing examples of real-world breaches; security trends and risks, including the consequences of a data breach; a case study of a social engineering attack; Actionable prevention tips and IT audits to secure your organization]]>

Do you know how to identify and respond to cyberattacks? As the size, severity and frequency of hacks continues to grow, A-LIGN President Gene Geiger looks to assist organizations in managing and minimizing the risk of cyberattacks. This presentation will evaluate different security trends and risks, review a client environment and account compromise through social engineering, and provide practical advice on how to avert your organization from becoming compromised. As hackers become increasingly savvy at accessing accounts and sensitive information, this session will help your organization build a security foundation to avoid becoming another target. This presentation reviews the current data breach landscape, reviewing examples of real-world breaches; security trends and risks, including the consequences of a data breach; a case study of a social engineering attack; Actionable prevention tips and IT audits to secure your organization]]>
Thu, 31 May 2018 15:29:51 GMT /slideshow/scammed-defend-against-social-engineering/99752455 ResolverInc@slideshare.net(ResolverInc) Scammed: Defend Against Social Engineering ResolverInc Do you know how to identify and respond to cyberattacks? As the size, severity and frequency of hacks continues to grow, A-LIGN President Gene Geiger looks to assist organizations in managing and minimizing the risk of cyberattacks. This presentation will evaluate different security trends and risks, review a client environment and account compromise through social engineering, and provide practical advice on how to avert your organization from becoming compromised. As hackers become increasingly savvy at accessing accounts and sensitive information, this session will help your organization build a security foundation to avoid becoming another target. This presentation reviews the current data breach landscape, reviewing examples of real-world breaches; security trends and risks, including the consequences of a data breach; a case study of a social engineering attack; Actionable prevention tips and IT audits to secure your organization <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/scammeddefendagainstsocialengineering-2018-v3-180531152951-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Do you know how to identify and respond to cyberattacks? As the size, severity and frequency of hacks continues to grow, A-LIGN President Gene Geiger looks to assist organizations in managing and minimizing the risk of cyberattacks. This presentation will evaluate different security trends and risks, review a client environment and account compromise through social engineering, and provide practical advice on how to avert your organization from becoming compromised. As hackers become increasingly savvy at accessing accounts and sensitive information, this session will help your organization build a security foundation to avoid becoming another target. This presentation reviews the current data breach landscape, reviewing examples of real-world breaches; security trends and risks, including the consequences of a data breach; a case study of a social engineering attack; Actionable prevention tips and IT audits to secure your organization
Scammed: Defend Against Social Engineering from Resolver Inc.
]]>
146 2 https://cdn.slidesharecdn.com/ss_thumbnails/scammeddefendagainstsocialengineering-2018-v3-180531152951-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A Peek at adidas Group's Integrated Risk & Security Management Strategy /slideshow/a-peek-at-adidas-groups-integrated-risk-security-management-strategy/99752003 resolveruserconference2018sandiegokbupdate11-180531152709
Ever wonder how a multinational corporation pulls off integrated risk and incident management? This session will be presented by guest speakers and Resolver users Dennis Glisson and Ken Bohnert, members of the adidas Groups Profit Protection Team. From IT security and profit protection to incident and investigations management, you'll get a peek into the adidas Groups team structures, strategies, and the tools used to achieve an enterprise-wide integrated risk and security management strategy at adidas.]]>

Ever wonder how a multinational corporation pulls off integrated risk and incident management? This session will be presented by guest speakers and Resolver users Dennis Glisson and Ken Bohnert, members of the adidas Groups Profit Protection Team. From IT security and profit protection to incident and investigations management, you'll get a peek into the adidas Groups team structures, strategies, and the tools used to achieve an enterprise-wide integrated risk and security management strategy at adidas.]]>
Thu, 31 May 2018 15:27:09 GMT /slideshow/a-peek-at-adidas-groups-integrated-risk-security-management-strategy/99752003 ResolverInc@slideshare.net(ResolverInc) A Peek at adidas Group's Integrated Risk & Security Management Strategy ResolverInc Ever wonder how a multinational corporation pulls off integrated risk and incident management? This session will be presented by guest speakers and Resolver users Dennis Glisson and Ken Bohnert, members of the adidas Groups Profit Protection Team. From IT security and profit protection to incident and investigations management, you'll get a peek into the adidas Groups team structures, strategies, and the tools used to achieve an enterprise-wide integrated risk and security management strategy at adidas. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/resolveruserconference2018sandiegokbupdate11-180531152709-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ever wonder how a multinational corporation pulls off integrated risk and incident management? This session will be presented by guest speakers and Resolver users Dennis Glisson and Ken Bohnert, members of the adidas Groups Profit Protection Team. From IT security and profit protection to incident and investigations management, you&#39;ll get a peek into the adidas Groups team structures, strategies, and the tools used to achieve an enterprise-wide integrated risk and security management strategy at adidas.
A Peek at adidas Group's Integrated Risk & Security Management Strategy from Resolver Inc.
]]>
763 2 https://cdn.slidesharecdn.com/ss_thumbnails/resolveruserconference2018sandiegokbupdate11-180531152709-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
An Intro to Resolver's Resilience Application /slideshow/an-intro-to-resolvers-resilience-application/99751323 intersect2018-resilienceapplication-180531152235
In 2017, Resolver acquired Global AlertLink, an industry leading platform for business continuity, disaster recovery and emergency management. This presentation will walk you through a data breach scenario and showcase an integrated approach to response with cyber and physical security, disaster recovery, business continuity, and crisis management.]]>

In 2017, Resolver acquired Global AlertLink, an industry leading platform for business continuity, disaster recovery and emergency management. This presentation will walk you through a data breach scenario and showcase an integrated approach to response with cyber and physical security, disaster recovery, business continuity, and crisis management.]]>
Thu, 31 May 2018 15:22:35 GMT /slideshow/an-intro-to-resolvers-resilience-application/99751323 ResolverInc@slideshare.net(ResolverInc) An Intro to Resolver's Resilience Application ResolverInc In 2017, Resolver acquired Global AlertLink, an industry leading platform for business continuity, disaster recovery and emergency management. This presentation will walk you through a data breach scenario and showcase an integrated approach to response with cyber and physical security, disaster recovery, business continuity, and crisis management. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/intersect2018-resilienceapplication-180531152235-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In 2017, Resolver acquired Global AlertLink, an industry leading platform for business continuity, disaster recovery and emergency management. This presentation will walk you through a data breach scenario and showcase an integrated approach to response with cyber and physical security, disaster recovery, business continuity, and crisis management.
An Intro to Resolver's Resilience Application from Resolver Inc.
]]>
150 4 https://cdn.slidesharecdn.com/ss_thumbnails/intersect2018-resilienceapplication-180531152235-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Data Driven Risk Assessment /slideshow/data-driven-risk-assessment/99751035 datadrivenriskmanagement2018-joecrampton-180531152039
This presentation will contrast traditional risk assessment with some emerging techniques that use internal and market risk event (incident ) data to drive a more accurate risk model.]]>

This presentation will contrast traditional risk assessment with some emerging techniques that use internal and market risk event (incident ) data to drive a more accurate risk model.]]>
Thu, 31 May 2018 15:20:38 GMT /slideshow/data-driven-risk-assessment/99751035 ResolverInc@slideshare.net(ResolverInc) Data Driven Risk Assessment ResolverInc This presentation will contrast traditional risk assessment with some emerging techniques that use internal and market risk event (incident ) data to drive a more accurate risk model. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/datadrivenriskmanagement2018-joecrampton-180531152039-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation will contrast traditional risk assessment with some emerging techniques that use internal and market risk event (incident ) data to drive a more accurate risk model.
Data Driven Risk Assessment from Resolver Inc.
]]>
1249 3 https://cdn.slidesharecdn.com/ss_thumbnails/datadrivenriskmanagement2018-joecrampton-180531152039-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to Achieve a Fully Integrated Approach to Business Resilience /slideshow/how-to-achieve-a-fully-integrated-approach-to-business-resilience/99750368 kevinhall-integratedapproachtobusinessresilience-180531151634
How does risk, business continuity, disaster recovery, emergency planning and corporate security all align to create a truly resilient organization? When disaster strikes, how should all these functions come together to minimize the impact of the disruption? In this session, we will share strategies and tips to break down the silos between these critically important teams and discuss how you can achieve a fully integrated approach to business resilience.]]>

How does risk, business continuity, disaster recovery, emergency planning and corporate security all align to create a truly resilient organization? When disaster strikes, how should all these functions come together to minimize the impact of the disruption? In this session, we will share strategies and tips to break down the silos between these critically important teams and discuss how you can achieve a fully integrated approach to business resilience.]]>
Thu, 31 May 2018 15:16:34 GMT /slideshow/how-to-achieve-a-fully-integrated-approach-to-business-resilience/99750368 ResolverInc@slideshare.net(ResolverInc) How to Achieve a Fully Integrated Approach to Business Resilience ResolverInc How does risk, business continuity, disaster recovery, emergency planning and corporate security all align to create a truly resilient organization? When disaster strikes, how should all these functions come together to minimize the impact of the disruption? In this session, we will share strategies and tips to break down the silos between these critically important teams and discuss how you can achieve a fully integrated approach to business resilience. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/kevinhall-integratedapproachtobusinessresilience-180531151634-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How does risk, business continuity, disaster recovery, emergency planning and corporate security all align to create a truly resilient organization? When disaster strikes, how should all these functions come together to minimize the impact of the disruption? In this session, we will share strategies and tips to break down the silos between these critically important teams and discuss how you can achieve a fully integrated approach to business resilience.
How to Achieve a Fully Integrated Approach to Business Resilience from Resolver Inc.
]]>
220 5 https://cdn.slidesharecdn.com/ss_thumbnails/kevinhall-integratedapproachtobusinessresilience-180531151634-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
An Intro to Resolver's Risk Application /slideshow/an-intro-to-resolvers-risk-application/99749302 intersect2018-riskmanagement-180531150903
As you know, mitigating risk is a crucial part of maintaining your organizations health. But whats your next step in ensuring the risks youve identified are actually being managed? In this presentation, you will learn the following aspects of an integrated approach to risk assessments and risk management: delegating responsive action and tracking action plan progress with automated reminders, easy re-assessment with or without a group workshop, trending, and alerts and analytics over time through web-based dashboards. ]]>

As you know, mitigating risk is a crucial part of maintaining your organizations health. But whats your next step in ensuring the risks youve identified are actually being managed? In this presentation, you will learn the following aspects of an integrated approach to risk assessments and risk management: delegating responsive action and tracking action plan progress with automated reminders, easy re-assessment with or without a group workshop, trending, and alerts and analytics over time through web-based dashboards. ]]>
Thu, 31 May 2018 15:09:03 GMT /slideshow/an-intro-to-resolvers-risk-application/99749302 ResolverInc@slideshare.net(ResolverInc) An Intro to Resolver's Risk Application ResolverInc As you know, mitigating risk is a crucial part of maintaining your organizations health. But whats your next step in ensuring the risks youve identified are actually being managed? In this presentation, you will learn the following aspects of an integrated approach to risk assessments and risk management: delegating responsive action and tracking action plan progress with automated reminders, easy re-assessment with or without a group workshop, trending, and alerts and analytics over time through web-based dashboards. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/intersect2018-riskmanagement-180531150903-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As you know, mitigating risk is a crucial part of maintaining your organizations health. But whats your next step in ensuring the risks youve identified are actually being managed? In this presentation, you will learn the following aspects of an integrated approach to risk assessments and risk management: delegating responsive action and tracking action plan progress with automated reminders, easy re-assessment with or without a group workshop, trending, and alerts and analytics over time through web-based dashboards.
An Intro to Resolver's Risk Application from Resolver Inc.
]]>
188 1 https://cdn.slidesharecdn.com/ss_thumbnails/intersect2018-riskmanagement-180531150903-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Keeping Your Data Clean /slideshow/keeping-your-data-clean/99748963 diritokeepingdatacleanintrsectfinal1-180531150635
Data integrity is integral to both effective incident management and to a successful integrated risk management process. As a former Unit Chief in the FBI Counterterrorism Division, Steve was responsible for managing the FBI Terrorist Watchlist and led efforts to resolve problems identified in several internal audits which ultimately updated and improved the accuracy of the database. In this presentation, learn how he leveraged his experience at the FBI to improve data integrity in his role at Discover Financial Services.]]>

Data integrity is integral to both effective incident management and to a successful integrated risk management process. As a former Unit Chief in the FBI Counterterrorism Division, Steve was responsible for managing the FBI Terrorist Watchlist and led efforts to resolve problems identified in several internal audits which ultimately updated and improved the accuracy of the database. In this presentation, learn how he leveraged his experience at the FBI to improve data integrity in his role at Discover Financial Services.]]>
Thu, 31 May 2018 15:06:35 GMT /slideshow/keeping-your-data-clean/99748963 ResolverInc@slideshare.net(ResolverInc) Keeping Your Data Clean ResolverInc Data integrity is integral to both effective incident management and to a successful integrated risk management process. As a former Unit Chief in the FBI Counterterrorism Division, Steve was responsible for managing the FBI Terrorist Watchlist and led efforts to resolve problems identified in several internal audits which ultimately updated and improved the accuracy of the database. In this presentation, learn how he leveraged his experience at the FBI to improve data integrity in his role at Discover Financial Services. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/diritokeepingdatacleanintrsectfinal1-180531150635-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Data integrity is integral to both effective incident management and to a successful integrated risk management process. As a former Unit Chief in the FBI Counterterrorism Division, Steve was responsible for managing the FBI Terrorist Watchlist and led efforts to resolve problems identified in several internal audits which ultimately updated and improved the accuracy of the database. In this presentation, learn how he leveraged his experience at the FBI to improve data integrity in his role at Discover Financial Services.
Keeping Your Data Clean from Resolver Inc.
]]>
153 2 https://cdn.slidesharecdn.com/ss_thumbnails/diritokeepingdatacleanintrsectfinal1-180531150635-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marketplace /slideshow/why-you-should-prioritize-third-party-risk-management-tprm-in-todays-marketplace/99748538 ksiazekpresentationprioritizingtprm20180508v2-180531150332
Did you know that 63% of data breaches are linked to third party access, and this number is on the rise? This presentation explores the increasing priority of Third Party Risk Management (TPRM) in todays marketplace. Learn why TPRM should play a critical role in your overall Corporate Risk Management Strategy and best practices for how to implement a successful TPRM program in your own organization.]]>

Did you know that 63% of data breaches are linked to third party access, and this number is on the rise? This presentation explores the increasing priority of Third Party Risk Management (TPRM) in todays marketplace. Learn why TPRM should play a critical role in your overall Corporate Risk Management Strategy and best practices for how to implement a successful TPRM program in your own organization.]]>
Thu, 31 May 2018 15:03:32 GMT /slideshow/why-you-should-prioritize-third-party-risk-management-tprm-in-todays-marketplace/99748538 ResolverInc@slideshare.net(ResolverInc) Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marketplace ResolverInc Did you know that 63% of data breaches are linked to third party access, and this number is on the rise? This presentation explores the increasing priority of Third Party Risk Management (TPRM) in todays marketplace. Learn why TPRM should play a critical role in your overall Corporate Risk Management Strategy and best practices for how to implement a successful TPRM program in your own organization. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ksiazekpresentationprioritizingtprm20180508v2-180531150332-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Did you know that 63% of data breaches are linked to third party access, and this number is on the rise? This presentation explores the increasing priority of Third Party Risk Management (TPRM) in todays marketplace. Learn why TPRM should play a critical role in your overall Corporate Risk Management Strategy and best practices for how to implement a successful TPRM program in your own organization.
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marketplace from Resolver Inc.
]]>
838 4 https://cdn.slidesharecdn.com/ss_thumbnails/ksiazekpresentationprioritizingtprm20180508v2-180531150332-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
An Intro to Resolver's InfoSec Application (RiskVision) /slideshow/an-intro-to-resolvers-infosec-application-riskvision/99747780 stevefineganintrotoriskvisionfinal11-180531145810
In 2017, Resolver acquired RiskVisiona recognized leader in integrated risk management software for security operations. In this presentation you will learn how to prioritize efforts around risk mitigation and response to cyber threats. Youll also learn where were heading on the product roadmap and how it will drive your IT efficiency even further and make it easier to share real-time information with your C-suite, board, and other stakeholders. ]]>

In 2017, Resolver acquired RiskVisiona recognized leader in integrated risk management software for security operations. In this presentation you will learn how to prioritize efforts around risk mitigation and response to cyber threats. Youll also learn where were heading on the product roadmap and how it will drive your IT efficiency even further and make it easier to share real-time information with your C-suite, board, and other stakeholders. ]]>
Thu, 31 May 2018 14:58:10 GMT /slideshow/an-intro-to-resolvers-infosec-application-riskvision/99747780 ResolverInc@slideshare.net(ResolverInc) An Intro to Resolver's InfoSec Application (RiskVision) ResolverInc In 2017, Resolver acquired RiskVisiona recognized leader in integrated risk management software for security operations. In this presentation you will learn how to prioritize efforts around risk mitigation and response to cyber threats. Youll also learn where were heading on the product roadmap and how it will drive your IT efficiency even further and make it easier to share real-time information with your C-suite, board, and other stakeholders. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/stevefineganintrotoriskvisionfinal11-180531145810-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In 2017, Resolver acquired RiskVisiona recognized leader in integrated risk management software for security operations. In this presentation you will learn how to prioritize efforts around risk mitigation and response to cyber threats. Youll also learn where were heading on the product roadmap and how it will drive your IT efficiency even further and make it easier to share real-time information with your C-suite, board, and other stakeholders.
An Intro to Resolver's InfoSec Application (RiskVision) from Resolver Inc.
]]>
266 4 https://cdn.slidesharecdn.com/ss_thumbnails/stevefineganintrotoriskvisionfinal11-180531145810-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-ResolverInc-48x48.jpg?cb=1558468161 Resolver Protects What Matters. Over 1,000 of the worlds largest organizations use our cloud software to protect their employees, customers, supply chain, brand and shareholders. www.resolver.com https://cdn.slidesharecdn.com/ss_thumbnails/asiswebinar-howtoprovethevalueofcorporatesecurity-finalcompressed-190404131437-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/how-to-prove-the-value-of-security-investments/139549535 How to Prove the Value... https://cdn.slidesharecdn.com/ss_thumbnails/ermbenchmarkingsurveyresults-181214181417-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/erm-benchmarking-survey-results/125914975 ERM Benchmarking Surve... https://cdn.slidesharecdn.com/ss_thumbnails/resolverriskvisiontvmwebinar-oct24-181025143447-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/best-practices-and-roi-for-riskbased-vulnerability-management/120699364 Best Practices and ROI...