Evidence collection is one of the most important and difficult parts of a successful compliance program, and one of the best ways your organization can demonstrate that it takes compliance... Read More
Blog
Fetch Audit Evidence with Splunk Integration for ZenGRC
Preparing your organization for an external audit can be a difficult and time-consuming process. One of the hardest parts: collecting audit evidence. External audits are examinations performed by an independent... Read More
How to Create an Information Security Questionnaire for Vendors
In this article we’ll review how to create an information security questionnaire as a means to assess vendor risk, and to protect your organization from potential cyber-threats that might use... Read More
Why Segregation of Duties is Important for Information Security
Segregation of duties can be a tricky concept for many business owners. For example, if Adam knows how to do systems administration and handles corporate finance too, then why would a... Read More
Bring Your Own Device Policy Best Practices
Building an effective Bring Your Own Device policy can be one of the keys to security success in an increasingly mobile world.
Read More