Blog
Page 45 of 152
New Industry Report Finds InfoSec and GRC Teams Don’t Define Risk, Vulnerability and Threats Equally–Hinting at Major Challenges in Cyber Risk Management
RiskOptics survey finds increasing cyberattacks, staffing problems, decreased funding and a lack of understanding by company leadership as other key industry obstacles SAN FRANCISCO—April 18, 2023—RiskOptics (formerly Reciprocity), a leader in information security risk and compliance, today announced the results of its first Cyber Risk Viewpoints Survey. The report reveals that while those working in […]
What Is Continuous Control Monitoring (CCM)?
When creating a strong risk management program within your organization, your business processes need controls in place for maintaining security and mitigating risks. And to assure the continued effectiveness of these controls, the compliance team should also have continuous control monitoring in place. Continuous control monitoring, or CCM, is a subset of continuous data assurance. […]
April 13, 2023
Benefits of Vendor Risk Management Software
Vendor risk management (VRM) has become a critical component of business continuity, especially given today’s cybersecurity threat landscape. That said, VRM is challenging. Collaborating with vendors involves the sharing of sensitive information and presents difficult tasks. In particular, assessing a vendor’s role in an organization’s business operations is crucial to mitigate supply chain risks. Still, […]
April 12, 2023
What Are Risk Management Methodologies in Compliance?
In the modern business environment, managing risk is critical for both business continuity and achievement of financial and strategic goals. A robust risk management program helps your organization do that, because it helps you to better predict and respond to risks before those risks cause any damage – and a cybersecurity incident (such as a […]
Tags: Risk Management
April 10, 2023
How to Assess and Improve Your Cybersecurity Posture
As an enterprise leader or cybersecurity professional, you know that the threat landscape is expanding. You know that cybercriminals get smarter every day, using ever-more sophisticated weapons to attack organizations, disrupt operations, and compromise sensitive IT assets. To protect your organization from these attackers, you must assess and strengthen your cybersecurity posture. In this blog […]
April 7, 2023
What is the CISO’s Role in Risk Management?
The Chief Information Security Officer (CISO) role has become one focused on risk management to protect critical information assets from malicious actors.
Tags: Risk Management
April 5, 2023
Page 45 of 152