Thursday, January 1, 1970

Partner

Amazon Web Services Amazon Web Services Amazon Web Services Amazon Web Services Amazon Web Services Amazon Web Services Amazon Web Services




Speakers

 

CPE

We are registered with and adhere to the Statement on Standards for Continuing Professional Education programs of the National Registry of CPE Sponsors. Our registration number is 109066. Please check with the governing body of your license and state for specific CPE requirements. Grievances may be forwarded to the company at 650 620 3961. Grievances may also be forwarded to the National Registry of CPE Sponsors-NASBA, 150 Fourth Avenue North, Suite 700, Nashville, TN 37219-2417, 615-880-4200, www.learningmarket.org, e-mail cpe@nasba.org.

Field of Study:
Management Adv Services : 3 CPE Credit
Program Delivery Method: Group Live 
Program Level: Intermediate 
Advance Preparation/Program Prerequisites: None



Agenda



2:00 - 2:30 PM

 Registration & Coffee

2:30 - 3:10 PM

Presentation: The return of ERM

3:10 - 4:00 PM

 Panel Discussion: The Role of Internal Audit in Ensuring Effectiveness of Risk and Compliance Programs

  • How the Internal Audit program can be used to support risk and compliance activities
  • Evolving role of auditor in acting as a strategic business advisor influencing key business decisions
  • How do auditors collaborate with the first and second line of defense and ensure effectiveness of risk and compliance programs?
  • With business disruptions and emerging risks, should auditors relook at their current approach and structure of their internal audit programs?

 

4:00 - 4:15 PM

 Networking Break

4:15 - 4:45 PM

 Presentation: The Attack of the Bots and Trolls: The Social Media Risks that are Destroying Public Confidence in Institutions 

4:45 - 5:30 PM

 Panel Discussion: Converging Across Current, Top, Emerging and Strategic Risks - Building an Enterprise Strategy

  • Discuss the convergence of ERM with cyber risk, third party, strategic, reputational risk profiles
  • How does an organization converge across the risk profiles to create a single view of the risk exposures? Is a single view even necessary?
  • How to create a strategy around ERM encompassing all the risk profiles and ensure that it aligns with the strategic plan
  • How organizations can create an integrated federated risk framework, used by all the three lines of defense functions and across Strategic, Operational and IT risk profiles,  as a single source of truth

5:30 - 6:30 PM

Cocktail Reception

12:00 – 1:00 pm

Registration & Networking Lunch

1:00 – 1:20 pm

Welcome Address Presentation

1:20 – 2:10 pm

Panel Discussion: Enabling Agile Cybersecurity: 

  • What are the business benefits of implementing a risk-based approach to data security?
  • Why is it essential to include a business impact analysis as an integral part of the cyber risk management process?
  • Why is it imperative to maintain a Cyber-Security Incident Response Team (CSIRT)?
  • What is the impact of artificial intelligence (AI) and machine learning on cyber security?
  • What steps should enterprises be taking today to mitigate cybersecurity risks and manage compliance?

2.10 - 2.50 pm

Presentation on Enterprise Risk

2.50 - 3.30 pm

Networking Coffee and Close of Event

12:00 – 1:00 pm

Registration & Networking Lunch

1:00 – 1:20 pm

Welcome Address Presentation

1:20 – 2:10 pm

Panel Discussion: Enabling Agile Cybersecurity: 

  • What are the business benefits of implementing a risk-based approach to data security?
  • Why is it essential to include a business impact analysis as an integral part of the cyber risk management process?
  • Why is it imperative to maintain a Cyber-Security Incident Response Team (CSIRT)?
  • What is the impact of artificial intelligence (AI) and machine learning on cyber security?
  • What steps should enterprises be taking today to mitigate cybersecurity risks and manage compliance?

2.10 - 2.50 pm

Presentation on Enterprise Risk

2.50 - 3.30 pm

Networking Coffee and Close of Event

12:00 – 1:00 pm

Registration & Networking Lunch

1:00 – 1:20 pm

Welcome Address Presentation

1:20 – 2:10 pm

Panel Discussion: Enabling Agile Cybersecurity: 

  • What are the business benefits of implementing a risk-based approach to data security?
  • Why is it essential to include a business impact analysis as an integral part of the cyber risk management process?
  • Why is it imperative to maintain a Cyber-Security Incident Response Team (CSIRT)?
  • What is the impact of artificial intelligence (AI) and machine learning on cyber security?
  • What steps should enterprises be taking today to mitigate cybersecurity risks and manage compliance?

2.10 - 2.50 pm

Presentation on Enterprise Risk

2.50 - 3.30 pm

Networking Coffee and Close of Event

12:00 – 1:00 pm

Registration & Networking Lunch

1:00 – 1:20 pm

Welcome Address Presentation

1:20 – 2:10 pm

Panel Discussion: Enabling Agile Cybersecurity: 

  • What are the business benefits of implementing a risk-based approach to data security?
  • Why is it essential to include a business impact analysis as an integral part of the cyber risk management process?
  • Why is it imperative to maintain a Cyber-Security Incident Response Team (CSIRT)?
  • What is the impact of artificial intelligence (AI) and machine learning on cyber security?
  • What steps should enterprises be taking today to mitigate cybersecurity risks and manage compliance?

2.10 - 2.50 pm

Presentation on Enterprise Risk

2.50 - 3.30 pm

Networking Coffee and Close of Event

12:00 – 1:00 pm

Registration & Networking Lunch

1:00 – 1:20 pm

Welcome Address Presentation

1:20 – 2:10 pm

Panel Discussion: Enabling Agile Cybersecurity: 

  • What are the business benefits of implementing a risk-based approach to data security?
  • Why is it essential to include a business impact analysis as an integral part of the cyber risk management process?
  • Why is it imperative to maintain a Cyber-Security Incident Response Team (CSIRT)?
  • What is the impact of artificial intelligence (AI) and machine learning on cyber security?
  • What steps should enterprises be taking today to mitigate cybersecurity risks and manage compliance?

2.10 - 2.50 pm

Presentation on Enterprise Risk

2.50 - 3.30 pm

Networking Coffee and Close of Event

12:00 – 1:00 pm

Registration & Networking Lunch

1:00 – 1:20 pm

Welcome Address Presentation

1:20 – 2:10 pm

Panel Discussion: Enabling Agile Cybersecurity: 

  • What are the business benefits of implementing a risk-based approach to data security?
  • Why is it essential to include a business impact analysis as an integral part of the cyber risk management process?
  • Why is it imperative to maintain a Cyber-Security Incident Response Team (CSIRT)?
  • What is the impact of artificial intelligence (AI) and machine learning on cyber security?
  • What steps should enterprises be taking today to mitigate cybersecurity risks and manage compliance?

2.10 - 2.50 pm

Presentation on Enterprise Risk

2.50 - 3.30 pm

Networking Coffee and Close of Event

2:00 - 2:30 PM

 Registration & Coffee

2:30 - 3:00 PM

 Keynote Presentation

3:00 - 3:40 PM

Presentation: Regulatory Compliance Management

3:40 - 3:55 PM

 Networking Break

3:55-4:55 PM

 Panel Discussion:   Evolution of Operational Risk Management – Adapting to Regulatory Changes and Evolving Risk Frameworks

  • The scope of operational risk management has expanded, especially with cyber security, data privacy etc. gaining focus. How do you see the ORM framework evolving in the coming years to cope with these changes?
  • ORM regulatory framework is undergoing changes with focus shifting from AMA to SMA. How do you see these regulatory changes impacting some of the ORM functions and framework?
  • Some disruptive models like distributed ledger and other technologies will change the way banks operate in the future. Where and how do you think the ORM framework needs to change to address such disruptions?
  • Risk frameworks like COSO and ISO have undergone changes. How do you see these affecting ORM models?
     

5:05 - 6:00 PM

Networking Reception

4:55 – 5:05 PM

Closing Note

12:00 – 1:00 pm

Registration & Networking Lunch

1:00 – 1:20 pm

Welcome Address Presentation

1:20 – 2:10 pm

Panel Discussion: Enabling Agile Cybersecurity: 

  • What are the business benefits of implementing a risk-based approach to data security?
  • Why is it essential to include a business impact analysis as an integral part of the cyber risk management process?
  • Why is it imperative to maintain a Cyber-Security Incident Response Team (CSIRT)?
  • What is the impact of artificial intelligence (AI) and machine learning on cyber security?
  • What steps should enterprises be taking today to mitigate cybersecurity risks and manage compliance?

2.10 - 2.50 pm

Presentation on Enterprise Risk

2.50 - 3.30 pm

Networking Coffee and Close of Event