Duration: 2 Days
This course provides an overview to the concepts, processes, and procedures necessary to successfully begin implementation of a Policy and Compliance Management system. You will gain knowledge of the key RSA Archer Policy and Compliance Management components through presentations and hands-on exercises.
What You Will Learn
- Basic Policy and Compliance Management issues and processes
- Illustrate the structure of the RSA Archer Policy and Compliance
Management Solution
- Begin implementation of a Policy and Compliance Management program
Audience
Policy and Compliance management team members who will be using the RSA Archer Policy and Compliance Management solution to define, implement, and maintain a policy and compliance management initiative. This may include managers, team leads, and anyone involved in consolidating policies and ensuring compliance with authoritative sources.
Prerequistes
Familiarity with the RSA Archer eGRC framework and a general familiarity with policy and compliance concepts
Course Outline
1. Introduction to Policy and Compliance Management
- Top Policy and
Compliance Management Issues
- Policy and Compliance Processes in a Nutshell
- Policy and Compliance Key Components
2. RSA Archer Policy Management
Solution
- RSA Archer Interface
- RSA Archer Policy Structure Components
- Phased Implementation Approach
- Post-Implementation Processes
3.
Policy Management Exercises
- Analyze Existing Policy
- Define Scope
- Extraction and Mapping
- Policy Extraction
- Control Standard Extraction and
Mapping
- Format/Import Content
- Perform a Gap Analysis
- Import Provided
Content
- Approve a Policy Change
- Policy Awareness Campaign
4. RSA
Archer Compliance Management Solution
- Sarbanes-Oxley Act Concerns
- RSA
Archer Compliance Structure Components
- How Compliance is Rated
- Exception
Requests Workflow
5. Compliance Management Exercises
- Review Control
Procedure Mapping
- Assess a Process Control
- Assess a Technical Control
- Address Findings: Remediation Plan
- Address Findings: Exception Request
6. Compliance Strategies
- Control-Based Compliance
- Asset-Based Compliance
- Compliance Testing Cycle
- Round Table Discussion
7. Additional
Resources
Course Labs