Skip navigation Jump to main navigation Jump to main navigation

Morningside Campus Access Updates

All Columbia affiliates have access to the Morningside campus. CUID holders can request campus access for guests by completing the registration form. Campus entry points remain limited. Read More.
Close alert

Tools for Risk Management Seminar, Presented by the ERM Program

Tools

May 31 – June 28, 2024
Time for all workshops: 4:30 – 6:00 pm ET

The Tools for Risk Management Seminar workshops survey some 3rd party vendor platforms used for risk management. Entire companies are devoted to supporting these platforms. In these workshops, we explore what these tools can do and how to use them.

How To Join a Session

Click here at 4:30 pm ET on the day of your desired workshop to join virtually. Each workshop ends at 6:00 pm ET.

Workshop Info 

Friday, May 31 | 4:30 pm to 6:00 pm ET
Archer Session 1
Introduction to the RSA Archer Platform. In this session, you will learn about the foundational elements of the RSA Archer Platform. We will guide you through setting up access to the Columbia Archer test environment, enabling hands-on experience in real-time. The session covers key aspects of Archer, such as utilizing the user interface, report generation, dashboard creation, and the development of custom applications and menu items. You will also gain proficiency in essential skills like browsing, searching, and data input, which are crucial for effective use of the platform.

Friday, June 7 | 4:30 pm to 6:00 pm ET
Beacon Session 1
Introduction to the Beacon Platform. In this session we will set up a guest account on Beacon so that you can practice. We will tour how Beacon works and what makes it special.

Friday, June 21 | 4:30 pm to 6:00 pm ET
Beacon Session 2
Gromit. In this second session, we will explore one of the things that makes Beacon special: the graphical dependency network.

Friday, June 28 | 4:30 pm to 6:00 pm ET
Archer Session 2
Conducting Top-Down Risk Assessments in Archer. This session revisits the process of logging into Archer, ensuring all participants can smoothly access the platform. We will delve into a practical example of a top-down operational risk assessment, such as compliance with a new set of risk policies. The session will demonstrate how to conduct these assessments, integrating both qualitative and quantitative approaches. Key steps include policy definition, data collection, and the generation of reports tailored for enterprise risk management, providing a comprehensive understanding of the process.