• RSA Archer Webcast Replays 2014 / 2013 / 2012

    WEBCAST TITLE WEBCAST AUDIO & PDFs Business Continuity Plans + Notifications = Business Value (02/06/15) LISTEN NOW & VIEW PDF Governance-Driven Identity Management - What, Why and How (09/30/14) ...
    Denise Sposato
    last modified by RSA Link Admin
  • CSO Security And Risk White Paper: Lower Your GRC Costs in One Hour

    Give us one hour...   And we'll show you how you can significantly lower the cost of deploying a leading governance risk and compliance (GRC) platform. According to Forrester, you can experience up to a 572% ret...
    Denise Sposato
    last modified by RSA Link Admin
  • RSA Archer Solution Overview Videos & Thought Leader Videos

    RSA ARCHER SOLUTION OVERVIEW VIDEOS: AUDIT MANAGEMENT Audit plays a critical role as the third line of defense in providing independent assurance of risk and compliance objectives. RSA Archer puts you in control...
    Denise Sposato
    last modified by RSA Link Admin
  • RSA Archer GRC Reference Architecture

    Governance, Risk and Compliance (GRC) represents a business oriented approach to establishing ownership and accountability throughout the organization to improve decision making.  Establishing a GRC program withi...
    Steve Schlarman
    last modified by RSA Link Admin
  • RSA Perspective Breaking Through the Value Ceiling

    Technologies implemented to meet operational needs bring tangible benefits to an organization with focused, tactical functions. These tools bring value to organizations due to the focus on the specific business challe...
    Steve Schlarman
    last modified by RSA Link Admin
  • AUGUST 2020: RSA Archer Community News Update

                                              New: RSA Named Leader for fifth consecutive year in just released G...
    Denise Sposato
    last modified by RSA Link Admin
  • White Paper Continuous Monitoring Part 3  Sept 2014.pdf

    Final installation of Continuous Monitoring white paper series. Part 3 covers "Managing Assessment Costs". CM has the potential to explode your IA budget. Learn how to lessen that impact.
    Chris Hoover
    last modified by RSA Link Admin
  • What is the "Defend the Kingdom" blog series?

    The Defend the Kingdom blog series is a fictional storyline following the adventures of Marty Bishop, a skilled, imaginative security administrator fighting cybercrime on the frontlines of the massive multi-national c...
    Steve Schlarman
    last modified by RSA Link Admin
  • RSA Archer IT Disaster Recovery Planning

    Use case for Business Resiliency  The ChallengeYour critical IT infrastructure must be designed to withstand disruptions. If they fail, they must be quickly recovered or restored. Disaster recovery (DR) teams a...
    alconj
    last modified by RSA Link Admin
  • RSA Archer Business Continuity & IT Disaster Recovery Planning

    Use Case for Business Resiliency    RSA Archer® Business Continuity & IT Disaster Recovery Planning enables you to perform risk assessments and document and test business continuity and IT disast...
    alconj
    last modified by RSA Link Admin
  • RSA Archer Crisis Management

    Use Case for Business Resiliency    RSA Archer® Crisis Management provides a coordinated, consistent and automated approach to handling crisis events. By aligning crisis management with incident respo...
    alconj
    last modified by RSA Link Admin
  • RSA Archer Incident Management

    Use Case for Business Resiliency    RSA Archer® Incident Management provides case management and incident response for reporting and categorizing cyber and physical incidents and determining the appr...
    alconj
    last modified by RSA Link Admin
  • RSA Archer Business Impact Analysis

    Use Case for Business Resiliency    RSA Archer® Business Impact Analysis is designed to help you determine the criticality of business processes and supporting infrastructure so you can protect and r...
    alconj
    last modified by RSA Link Admin
  • RSA Archer Audit Planning & Quality

    Use case for Audit Management    RSA Archer® Audit Planning & Quality enables internal audit teams to define and risk assess their audit entities and universe, plan for audit engagements in upcom...
    alconj
    last modified by RSA Link Admin
  • RSA Archer Audit Engagements & Workpapers

    Use case for Audit Management  RSA Archer Audit Engagements & Workpapers enables you to track your audit universe, perform audit engagements, maintain workpaper documentation, perform testing, and report ...
    alconj
    last modified by RSA Link Admin
  • RSA Archer Bottom-Up Risk Assessment

    Use Case for Enterprise & Operational Risk Management     RSA Archer® Bottom-Up Risk Assessment allows you to engage teams via targeted project risk assessments. Projects can include a fraud asses...
    Susan Jessee
    last modified by RSA Link Admin
  • RSA Archer Key Indicator Management

    Use Case for Enterprise & Operational Risk Management     RSA Archer® Key Indicator Management enables your organization to establish and monitor metrics related to individual. Depending on the ov...
    Susan Jessee
    last modified by RSA Link Admin
  • RSA Archer Loss Event Management

    Use Case for Enterprise & Operational Risk Management     RSA Archer® Loss Event Management allows organizations to capture and inventory actual loss events and near misses, as well as relevant ext...
    Susan Jessee
    last modified by RSA Link Admin
  • RSA Archer Operational Risk Management

    Use Case for Enterprise & Operational Risk Management     RSA Archer® Operational Risk Management is a combination of use cases that are core to a typical operational risk management program, inclu...
    Susan Jessee
    last modified by RSA Link Admin
  • RSA Archer Top-Down Risk Assessment

    Use Case for Enterprise & Operational Risk Management   RSA Archer Top-Down Risk Assessment enables practitioners to document risks and controls throughout the organization. Risks can be assessed on an inher...
    Susan Jessee
    last modified by RSA Link Admin