Return-Path: <training@email.complianceonline.com>
Delivered-To: allan@transocean.com
Received: from vps.transocean.com
	by vps.transocean.com with LMTP id KG0WHUAC2lo0FAAAInt2oQ
	for <allan@transocean.com>; Fri, 20 Apr 2018 08:07:44 -0700
Return-path: <training@email.complianceonline.com>
Envelope-to: allan@transocean.com
Delivery-date: Fri, 20 Apr 2018 08:07:44 -0700
Received: from mta.email.complianceonline.com ([74.122.218.171]:10414)
	by vps.transocean.com with esmtp (Exim 4.89_1)
	(envelope-from <training@email.complianceonline.com>)
	id 1f9XdQ-0001O4-N9
	for allan@transocean.com; Fri, 20 Apr 2018 08:07:44 -0700
DKIM-Signature: v=1; a=rsa-sha1; d=email.complianceonline.com; s=ei0; c=simple/simple;
	q=dns/txt; i=@email.complianceonline.com; t=1524236816;
	h=From:Subject:Date:To:MIME-Version:Content-Type;
	bh=tLNmB71LOjUi9f6JtS7g0m40mVA=;
	b=gS6PHkTc1TaMfFUqv6ze5G8RvsSRH9NHoLdBFs0P+VHkfJFqLuNEg+ZlFsz/7cUO
	KKCPd81gSVQM6oHCtH0KEwG4+Y3Q2vdO9C1vPUMkvry9CNcn5JW2buerRjsBAsH8
	zz2q/bdAFgtlGl8QotcYGZc7LDQczvpMIIJZL5i+u2w=;
Received: from [10.21.250.231] ([10.21.250.231:2496] helo=CORE18PUMPER1)
	by pc1udsmta1n26 (envelope-from <training@email.complianceonline.com>)
	(ecelerity 2.2.2.45 r(34222M)) with ESMTP
	id 8F/DE-23222-F020ADA5; Fri, 20 Apr 2018 11:06:56 -0400
Date: Sat, 21 Apr 2018 00:06:55 +0900 (JST)
Message-Id: <Kilauea578207-441145-449111177-1-1018@flonetwork.com>
X-DMHA-ID-Packet: Z4gvK5o622gzTBxIWzQ7JzhVnQYQZ9b2YlyPKQZno2F4De-etzQtCVgUbJUEXG9As2khkTAkUTI=
From: "Compliance Training" <training@email.complianceonline.com>
Reply-To: "Editor complianceonline" <editor@complianceonline.com>
To: allan@transocean.com
Subject: How to Establishing an Effective IT Governance, Risk and Compliance Framework
MIME-Version: 1.0
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, score=-1.3
X-Spam-Score: -12
X-Spam-Bar: -
X-Ham-Report: Spam detection software, running on the system "vps.transocean.com",
 has NOT identified this incoming email as spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 
 Content preview:  ComplianceOnline ComplianceOnline The Largest GRC Advisory
    Network +1-888-717-2436 How to Establish an Effective IT Governance, Risk
    and Compliance (GRC) Framework - Organization and Responsibilities Wednesday,
    May 02, 2018 | 11:00 AM PDT (60 Min) • View Details Speaker: Michael C
   Redmond, CEO and Lead Consultant This training program will discuss how to
    develop a great GRC program that ensures proper governance, risk management
    and compliance management of all IT systems and processes that support the
    business operations. [...] 
 
 Content analysis details:   (-1.3 points, 3.0 required)
 
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was blocked.
                             See
                             http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [URIs: complianceonline.com]
 -0.0 SPF_PASS               SPF: sender matches SPF record
 -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%
                             [score: 0.0013]
  0.0 HTML_MESSAGE           BODY: HTML included in message
  0.7 MIME_HTML_ONLY         BODY: Message only has text/html MIME parts
 -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from author's
                             domain
  0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily valid
 -0.1 DKIM_VALID             Message has at least one valid DKIM or DK signature
X-Spam-Flag: NO

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; Channelarset=utf-8" />
<title>ComplianceOnline</title>
</head>

<body style="background-color:#F2F2F2;">
<table style="width: 100%;" cellspacing="0" cellpadding="0" border="0">
<tbody>
<tr>
<td align="center">
<table style="max-width: 650px; min-width: 300px; -webkit-text-size-adjust: 100%;" cellspacing="0" cellpadding="0" border="0">
<tbody>
<tr>
<td style="border: #ACACAC solid 1px; padding: 8px 20px 20px 20px;" bgcolor="#FFFFFF">
<table cellspacing="0" cellpadding="0" border="0" bgcolor="#ffffff" align="center">
<tbody>
<tr>
<td width="650">
<table style="width: 100%;" cellspacing="0" cellpadding="5" border="0">
<tbody>
<tr>
<td valign="top">
<table style="width: 100%;" cellspacing="0" cellpadding="0" border="0">
<tbody>
<tr>
<td style="font-family: Arial, Helvetica, sans-serif;"><span style="font-family: Impact; color: #1062b2; font-size: 24px;">Compliance</span><span style="font-family: Arial, Helvetica, sans-serif; font-size: 28px; color: #ac130d;">Online<br> <span style="font-family: Arial, Helvetica, sans-serif; font-size: 11px; color: #000;">The Largest GRC Advisory Network </span></span></td>
<td colspan="2" valign="middle" align="right"><span style="font-family: Arial, Helvetica, sans-serif; font-size: 18px;"><strong>+1-888-717-2436</strong></span></td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td valign="top" height="0" align="left"></td>
</tr>
<tr>
<td valign="top" height="5" align="left"></td>
</tr>
<tr>
<td style="font-family: Arial, Helvetica, sans-serif; color: #444444; ; font-size: 22.5pt;" valign="top" align="center"><strong>How to Establish an Effective IT Governance, Risk and Compliance (GRC) Framework - Organization and Responsibilities</strong></td>
</tr>
<tr>
<td style="font-family: Arial, Helvetica, sans-serif; color: #444444; font-size: 11.5pt;" valign="top" align="center"><strong>Wednesday, May 02, 2018 | 11:00 AM PDT (60 Min)</strong> &#8226; <a href="http://email.complianceonline.com/cgi-bin18/DM/t/hCokv0inNGR0CCgZ0iQ3Q0EP" target="_blank"><strong>View Details</strong></a></td>
</tr>
<tr>
<td style="font-family: Arial, Helvetica, sans-serif; color: #444444; font-size: 11.5pt; line-height: 18.0pt;" height="40" align="center"><strong>Speaker:</strong> <strong>Michael C Redmond,</strong> CEO and Lead Consultant</td>
</tr>
<tr>
<td valign="top" height="0" align="left"></td>
</tr>
<tr>
<td style="font-family: Arial, Helvetica, sans-serif; color: #444444; font-size: 11.5pt; line-height: 18.0pt;" valign="top" height="" align="left">This training program will discuss how to develop a great GRC program that ensures proper governance, risk management and compliance management of all IT systems and processes that support the business operations. <br><br> This training will cover governance and an overall management approach to IT risk, while updating attendees on compliance and knowing which standards and regulations are key to your organization.
<table style="width: 100%;" cellspacing="0" cellpadding="0" border="0">
<tbody>
<tr>
<td align="right"><a href="http://email.complianceonline.com/cgi-bin18/DM/t/hCokv0inNGR0CCgZ0iQ3Q0EP" target="_blank" style="font-family: Arial, Helvetica, sans-serif; font-size: 11.5pt;"><strong>Register Now</strong></a></td>
</tr>
</tbody>
</table>
<strong><br> Areas Covered:</strong>
<ul style="font-family: Arial, Helvetica, sans-serif; color: #444444; font-size: 11.5pt;">
<li>Adopting a systematic approach to risk tracking to enhance the effectiveness of the cyber incident program</li>
<li>Outlining the critical actions to take if an event affects the company or its partners</li>
<li>Understanding an organizations&#8217; susceptibility to a cyber attack</li>
<li>Cyber incident response: Getting started, research, training, testing and maintaining</li>
<li>Standards and best practices: ISO 27001, ISO 27035, ISO 27005. NIST, FFIEC, HIPPA and HITRUST</li>
</ul>
<strong>Speaker Profile: <br></strong> <br> <strong>Dr. Michael C. Redmond</strong> PhD, is a certified project manager, PMP, has two masters&#8217; certifications in business continuity/disaster recovery MBCP and FBCI and is certified in emergency management. She is active in cyber security and holds multiple ISO certifications (ISO/IEC 27001 Information Security Management, ISO/IEC 27032 Lead Cyber Security Manger, ISO/IEC 27035 Security Incident Response, ISO/IEC 22301 Business Continuity Management Systems, ISO/IEC 21500 Project Management, and ISO/IEC 41001 Environmental Management). She is an international consultant, speaker and published author.
<table style="width: 100%;" cellspacing="0" cellpadding="0" border="0">
<tbody>
<tr>
<td height="10" align="right"></td>
</tr>
<tr>
<td align="right"><a href="http://email.complianceonline.com/cgi-bin18/DM/t/hCokv0inNGR0CCgZ0iQ3Q0EP" target="_blank"><strong>View Details</strong></a></td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td>
<table style="width: 650px; -webkit-text-size-adjust: 100%;" cellspacing="0" cellpadding="0" border="0" align="center">
<tbody>
<tr>
<td style="color: #999999; font-size: 8.5pt; font-family: Arial, Helvetica, sans-serif; line-height: 16.1pt;" valign="bottom" height="55" align="center">&#169; Copyright 2018 | 2479 East Bayshore Road, Suite 200 Palo Alto, CA 94303, USA | +1-888-717-2436<br> <span style="font-size: 11px;">This message was sent to allan@transocean.com | <a href="http://email.complianceonline.com/cgi-bin18/DM/t/hCokv0inNGR0CCgZ0iQ3R0EQ?dm_params=JkVtYWlsQWRkcj1hbGxhbkB0cmFuc29jZWFuLmNvbSZETUFJTFZBUl9VTlNVQj0xYW1iN3VhYWkya3BydnJoZXJmbm51YXFwYWkzYQ==&dm_params_sha256=3d95fa2684aa31937888346506585a0492d3b31cb087bb12866e78fd1f5d733c" target="_blank" style="color: #999999; text-decoration: none;">Unsubscribe</a>.</span></td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</body>

<IMG SRC="http://email.complianceonline.com/cgi-bin18/flosensing?z=Cokv0inNGR0CCgZ0BG"></html>
