Risk Management: How to take a targeted approach

This webinar occured on November 6, 2014

About This Webinar

During the first 15 minutes of this webinar, David will review with you key insights from a recently published piece of research, "Establish an Effective System of Internal IT Controls to Mitigate Risks."

After this, David and his invited subject-matter expert discussed our main topic "Risk Management: How to take a targeted approach."

Main Topic:
Establishing a risk management strategy can be complicated as every company has a unique risk profile that depends on organization size, industry, complexity, and culture.

Managing risk needs to be an ongoing process where the business and IT continuously collaborate to determine the optimal level of protection from risks for the organization. 

A formal strategy that prioritizes the mitigation of IT’s greatest risks will protect the business without sacrificing an excessive amount of operational efficiency.

During this webinar we discussed the following:

  • Components of a comprehensive risk management strategy.
  • Common mistakes made by IT organizations when dealing with risks.
  • Proper techniques for assessing risk severity.
  • Matching mitigation efforts with risk severity levels.
  • Strategies to ensure employees are compliant with your mitigation efforts.

This is an On-Demand webinar:

This webinar was previously recorded. To view our upcoming live sessions visit our Webinars page.

Featured Speakers

David Yackness
Director, CIO Advisory
Read Bio

James McCloskey
Senior Director, Advisory Services - Security & Risk
Read Bio

Help lead your peers

Help make our research the best it can be. Sign-up for a phone interview with our analyst and share your experience with this project.

Research Interview

Exclusive workshops for the early bird

We are offering upcoming workshops to qualified companies to help us “road-test” our research. Sign-up to see if this valuable offer is right for you.

Exclusive Workshop
GET HELP Contact Us
VL Methodology