Blog
Page 19 of 152
COBIT 2019 Audit Checklist
With COBIT 2019, you can leverage your COBIT 5 compliant IT program to create an integrated, holistic approach to cybersecurity by reassessing internal communications and responsibilities.
Tags: Audit Management, COBIT
January 23, 2024
Choosing a Governance Risk and Compliance Tool: Constant Vigilance
Choosing a governance risk and compliance tool is like Mad-Eye Moody choosing a 360-degree eye. To become a GRC Auror you need constant vigilance!
Tags: Risk Management, SOC
Key Steps To Becoming NIST Compliant
Identifying the key steps to becoming NIST compliant means determining whether you want to be NIST 800-52 or NIST 800-171 compliant.
Tags: NIST
A RiskInsiders’ Guide to PCI DSS v4.0 Compliance: Key Changes and Deadlines
In the ever-evolving landscape of data security and compliance, businesses must always stay current with the latest industry standards. As 2024 arrives, one such standard that demands your attention is the Payment Card Industry Data Security Standard (PCI DSS) version 4.0. PCI DSS v4.0 is a significant shift in how organizations must approach credit card […]
January 16, 2024
What Are the 12 Requirements of PCI DSS?
The Payment Card Industry Data Security Standard (PCI DSS) sets standards to keep the global payment card ecosystem trustworthy. Developed and maintained by the PCI Security Standards Council (PCI SSC), PCI DSS is meant to secure debit and credit card transactions to prevent cybersecurity issues like data theft or fraud. Any merchant or business that […]
January 14, 2024
Key Pillars of a Strategic Data Management Plan
Does your organization rely on data for decisions and actions? If so, you need Strategic Data Management (SDM) and an SDM plan. SDM is a systematic process to collect, analyze, store, and use data to achieve business goals. A solid SDM plan aligns data activities with business objectives. An effective SDM plan establishes accountability, policies, […]
ISO 9000 vs ISO 9001
ISO 9000 and ISO 9001 are terms often used mixed when discussing quality management at an organization, but they refer to separate things. While both are related to quality assurance and ISO compliance and certification, they have distinct differences in their fundamentals and approach. Understanding the difference between the two is crucial for any organization […]
Tags: Compliance, ISO, Risk Management
What Is the Threshold Application of the CCPA?
When the California Consumer Privacy Act was enacted at the start of 2020, many businesses scrambled to determine whether the law applied to them. The CCPA is the most stringent privacy law in the United States, and for various reasons, its reach can extend well beyond the state’s borders. The objective of the CCPA is […]
What is Third-Party Vendor Management?
Your company may be exposed to financial, operational, and reputational risks when conducting business with third parties. While third-party providers may be required to run your organization smoothly, you must manage risks proactively. This is where vendor management and evaluation programs come into play. What is a Third-Party Vendor Management Program? Third-party vendor management consists […]
Tags: Third-Party Management
Compliance Automation and Its Benefits for Reporting
What are some of the worries that keep compliance professionals up at night? For one, stressful stakeholder meetings and keeping abreast of the latest regulatory requirements. So is reporting bad news to the board or senior management, certainly. Another nagging worry for many: Despite your best efforts, you may “misreport” an issue – not report […]
Page 19 of 152