- Views: 6
- Report Article
- Articles
- News & Society
- Environmental
Learn Exactly How I [Improved Security] Risks in the Supply Chain
Posted: Mar 08, 2019
Compliance4All, a reputable provider of professional training for all the areas of regulatory compliance, is organizing as webinar on the topic, "Identifying Information Security Risks in the Supply Chain" on February 25. Robert E. Davis, a senior information systems security specialist, will be the speaker at this webinar.
Please log on to https://t2m.io/y8kuD5MV to enroll for this webinar.
- p>
Integration of the external factor, consisting of the supply chain, and the internal factor, in which business processes strategies are central, is something all organizations should strive to achieve. The supply chain should dthus help the organization derive value. Organizations typically design and deploy supply chain process integration to achieve specific objectives while imbigin best-practice solutions at the same time, aimed at reducing inappropriate or poor responses to environmental conditions.
At this webinar, the speaker will show how to implement standards and best practices into the supply chain by quoting real-life examples. He will show how employees can take steps and processes for initiating, documenting and compiling supply chain security risks. He will impart the knowledge needed for understanding the centrality of information system security in the supply chain.
ISG usually occurs at different organizational strata, with team leaders reporting to and receiving direction from their managers, with managers reporting up to an executive, and the highest-level executive conferring with and receiving instruction from the entity's oversight committee.
Usually, a formal ISG program is required to promote information assets safeguarding.ISG programs should ensure the Control Objectives for Information and related Technology (COBIT) framework confidentiality, integrity, availability, compliance, and reliability information criteria compromise does not occur through gaps in controls.
Therefore, the information security program and associated systems, processes, and activities need regular quality and compliance assessments. Monitoring and evaluating information security drives assurances provided or obtained through due care and due diligence as well as enables managerial fiduciary oversight expectations fulfilment. Planning and organizing are essential to organizational cohesiveness.
Robert will cover the following areas at this webinar:
Forces Affecting the Supply Chain
Information Security Principles
Information Security Practices
Strategic information Risk Considerations
Tactical information Risk Considerations
Operational information Risk Considerations.
This webinar is of value to Risk Management Personnel, External Auditors, Internal Auditors, Supply Chain Professionals, Information Officers, Compliance Assessors and Information Security Officers.
- p>
Robert E. Davis is an invited Golden Key International Honor Society member. He is a Doctor of Business Administration student specializing in Information Systems Management at Walden University. As a seasoned information systems (IS) auditor, Robert has provided data security consulting and IS auditing services to the United States Securities and Exchange Commission, United States Enrichment Corporation, Raytheon Company, United States Interstate Commerce Commission, Dow Jones & Company and Fidelity/First Fidelity (Wells Fargo) corporations, as well as other organizations.
Compliance4All is a professional trainings provider for the regulated industries. It offers professional trainings for regulatory compliance professionals and offers innovative strategic consulting and advice to a broad range of organizations.