Newsletter | Volume 1

Issue I
Issue II
Issue III
Issue IV
Issue V
Issue VI
Issue VII
Issue VIII
Issue IX
Issue X
Issue XI
Issue XII
Issue XIII
Issue XIV
Issue XV
Issue XVI
Issue XVII
Issue XVIII
Issue XIX
Issue XX
Issue XXI
Issue XXII
Issue XXIII
Issue XXIV
Issue XXV
Issue XXVI
Issue XXVII
Issue XXVIII
Issue XXIX
Issue XXX
Issue XXXI
Issue XXXII
Issue XXXIII
Issue XXXIV
Issue XXXV
Issue XXXVI
Issue XXXVII
Issue XXXVIII

click here to

Subscribe to our newsletter



To Unsubscribe click here

Why should you attend the Copenhagen Compliance conferences


Resources are always limited, however every business, relatively large or small, is expected to comply and capture the information needed to be responsive if/when the regulatory authorities or oversight bodies knocks on your door.

Therefore, Copenhagen Compliance Conference is the event that updates you on what you should do to identify and manage Governance, risk management, compliance (GRC) and IT security risks and the extent of the documentation and tests that you need to have on hand.

However, many Governance, Risk Management and Compliance (GRC) officers are always active at the panel sessions after each 3-4 speeches to get answers to the 'how to' questions:
  1. How can I improve my GRC or IT security program's success while working within the allocated resources, budget and other constraints?
  2. How can I understand and structure good quality data
  3. How can I take the appropriate action on emerging risks and trends to safeguard my organization?
  4. How can I integrate data from multiple sources and make consistent and prompt decisions and provide management or directors with prudent recommendations?
  5. How do I execute a GRC and IT security program with the right balance of the behavioral side of risk and compliance with the necessary controls and business processes of GRC and IT security controls?

Those and other questions will be answered at the April and May conferences:
  1. How to identify the key issues that influence your GRC and IT security program's effectiveness
  2. How other organizations like yours manage similar GRC and IT security business challenges
  3. How to determine the appropriate balance between 'culture' and 'controls' of GRC and IT security
  4. How automating and connecting core compliance business processes like learning, policies, certifications, incidents, and risks influence behavior change
  5. What are some of the immediate steps you can take to evaluate the effectiveness of your GRC and IT security controls?

Register today.