MICHAEL C. REDMOND
Dr. Michael C. Redmond, PhD is Consultant, Speaker, and Author. Her certifications Include MBCP, FBCI, PMP, CEM ISO 27001 Lead Implementer and Lead Auditor, as well as many other ISO certifications. Michael also conducts ISO Certification Implementation and Audit Training for PECB. Michael is the Chapter President for Association of Contingency Planners Eastern Great Lake Chapter and an active member of ISSA. She has consulted in the area of Cyber Security for clients in the areas of Healthcare, Insurance, Financial, and Manufacturing. Her projects have included SIEM Security information and event management which is Combining software products and services combining security information management (SIM) and security event management (SEM) (CSIRT) which is Cyber Security Incident Response Programs, Plans, Playbooks, Training, and Testing Audit of CSIRT programs and documentation Information Security Programs and Implementation Michael has consulted in the fields of Business Continuity and Disaster Recovery in the areas of Healthcare, Insurance, Financial, Manufacturing, Education, and Government. She has 2 books which are coming out in 201yand are being published by one of the Top International Publishers in the world. The first is a Cyber Security book and the second is a Business Continuity and Disaster Recovery book
Successful business continuity planningInvolves the entire organization Requires clear and consistent communication Encompasses how employees will communicate, where they will go and how they will keep doing their jobsPrepares the organization for disruptive eventsWhy is BCP Important? 61% of companies surveyed had to invoke their BCP 43% had to invoke it more than onceKey Causes: Natural Disaster, Power Ou..
A robust Information Security Management System manages and securities information security in a company. Governance, Risk, and Compliance are three areas needed to enhance confidentiality, the integrity of data, and the availability of data. Protecting your organization's information is critical for the successful management and smooth operation of your organization. A robust Information Security Managemen..
How to Establish an Effective IT Governance, Risk, and Compliance (GRC) Framework through Organization and Responsibilities
Enterprise IT Governance, Risk, Compliance is a systematic approach to managing Risk so that it remains secure. It includes people, processes and IT systems by applying a risk management process.Learning ObjectivesIncluding a management system into managing Enterprise Risk Areas of Enterprise Risk ManagementISO standards family - for what purpose should each standard be usedImplementation Tips- ..
The California Consumer Privacy Act of 2018 (the “Act”) was signed into law by California Governor Jerry Brown on June 28, 2018. The Act gives consumers” (defined as natural persons who are California residents) specified basic rights in relation to their personal information. The Act requires that companies make certain disclosures to consumers via their privacy policies, or otherwise at the time the perso..
ISO 27001 describes how to manage information security in a company. According to its documentation, ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system." By applying ISO 27001 standards effectively in your organization you can ensure a robust security for your organization's vital i..
Risk Assessment and Business Impact Analysis using PMI and ISO/IEC 21500 Project Management Methodologies
Learn to properly use Project Management Principles to prepare for an impact to the business for any organization. We will cover how to identify, analyze and document the events and environmental surroundings that can adversely affect the organization. You will learn how to both prepare and review the continuity planning program. Areas such as Project Management of IT Outsourcing and other risks will ..
Information Cyber Security Planning for Governance, Risk and Compliance (GRC) Framework - Organization and Responsibilities
Information Cyber Security Planning for Governance, Risk and Compliance (GRC) is essential in this world of new technologies, cyber events, natural an manmade disasters. GRC refers to a company's coordinated strategy for managing the broad issues of corporate governance, enterprise risk management (ERM) and corporate compliance with regard to regulatory requirementsEnterprise IT Governance, Risk, Compliance..
IT governance (ITG) is defined as the processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals. Organizations today are subject to many regulations governing the protection of confidential information, financial accountability, data retention, and disaster recovery, among others. They're also under pressure from shareholders, stakeholders, and customers.To..
The best way forward is an efficient Incident Response Program that allows an organization to respond with speed and agility while empowering businesses to maintain continuous operations. Such a solution also reduces revenue loss, reduces fines and lawsuits and protects brand reputation.Information Security, Governance & Risk, are all critical aspects of the planning and execution of the Information Sec..