Tuesday
Aug 7
2018

Cyber Series:
Expanding & Improving Your Required IT Risk Assessment Program

Registration Options & Pricing

Please select your membership status.


Live Webinar Includes

  • One connection to the Live Webinar
  • Handout and Take-Away Toolkit
  • Available on Desktop, Mobile & Tablet
  • Presenter’s Contact Info for Follow-Up

Recorded Webinar Includes

  • Recording of the Live Webinar
  • Available 6 business days following Live date
  • Available for 6 months following Live
  • Handout and Take-Away Toolkit
  • Available on Desktop, Mobile & Tablet
  • Free Digital Download, yours to keep
  • Share link with anyone at your bank
  • Presenter’s contact info for follow-up
150+
Webinars
Available
100%
Satisfaction
Guaranteed

12:00 pm – 1:30 pm PT
1:00 pm – 2:30 pm MT
2:00 pm – 3:30 pm CT
3:00 pm – 4:30 pm ET

Do you know the difference between a risk assessment, an IT audit, and an IT compliance assessment? These can mean different things, depending on the speaker and audience. This session will examine different types of risk assessments and IT audits that organizations frequently need and address the pros and cons of each. Attendees will receive practical recommendations and insights to improve their IT risk management program and IT risk assessments.

Continuing Education:   Attendance verification for CE credits upon request

Save with this series!

HIGHLIGHTS

  • Pros and cons of different types of IT risk assessments
  • How to explain overlap with the FFIEC cybersecurity risk assessment guidance on an IT risk assessment
  • Case study example of asset-based IT risk assessment
  • Examples of IT risk assessment models from a variety of standards, governance, and compliance frames such as NIST, CIS, etc.
  • Common risk mitigation strategies

  • TAKE-AWAY TOOLKIT
    • Sample IT risk assessment work program
    • Sample standards document for IT risk assessments, IT audits, and IT penetration testing
    • Employee training log
    • Quiz you can administer to measure staff learning and a separate answer key

WHO SHOULD ATTEND?

This informative session is designed for those responsible for risk management, including internal auditors, IT operations, and executive management with oversight of the IT and cybersecurity operations.

 

NOTE:  All materials are subject to copyright. Transmission, retransmission, or republishing of any webinar to other institutions or those not employed by your financial institution is prohibited. Print materials may be copied for eligible participants only.

MEET THE PRESENTER

CliftonLarsonAllen LLP
You might be interested in:

We provide bank webinars on compliance, lending, regulations, security, operations, new accounts, collections, fraud, security & other topics. For more information on bank education and online training opportunities, join our mailing list.