Blog
Page 53 of 152
What is a Vendor Risk Assessment?
A vendor risk assessment provides visibility into the risks your business faces when using third-party vendors’ products or services. Risk assessments are critical when a vendor handles a vital business function on your behalf, accesses sensitive customer data, or interacts with customers. A company should always conduct vendor and third-party risk assessments when onboarding a […]
Tags: Third-Party Management
December 7, 2022
ISACA Europe Road Trip Led Me to a Strange Connection Between Rental Cars, Packed Bags and Risk Management
December 6, 2022
How to Interpret New White House Software Supply Chain Security Guidance
In September, the United States Office of Management and Budget (OMB) issued a memorandum directing federal agencies to comply with the NIST guidance that resulted from Executive Order (EO) 14028. This executive order directed NIST to find or come up with guidance about securing the software supply chain, which was captured in NIST SP 800-218, […]
November 29, 2022
Reciprocity Introduces New Leadership to Accelerate Cyber Risk Strategy and Market Adoption
Company Appoints Technology Veterans in Marketing, Sales and Product Management REDWOOD CITY, CA – November 29, 2022 – Reciprocity, a leader in information security risk and compliance, today announced a series of new executive appointments to strengthen its management team in support of the Company’s accelerated growth in the cybersecurity risk management market. Chuck Conley […]
The Most Common Corporate Cybersecurity Risks
“Corporate cybersecurity” refers to the tactics and methods an organization uses to safeguard sensitive data, prevent unauthorized access to information systems, and protect itself from cyber attacks such as malware or ransomware attacks, viruses, phishing emails, endpoint breaches, and so forth. Cybercrime can be catastrophic for small businesses, but even large enterprises don’t have the […]
How Can RMIS Support Risk Management?
A risk management information system (RMIS) allows you to automate many of the difficult to organize tasks involved in compiling, storing, and communicating risk information.
Tags: Compliance, Cybersecurity, GRC, Risk Management
What Does Risk Management Involve?
What Does Risk Management Involve? Every organization faces unexpected events that could disrupt business operations, cost money, or even destroy the company. Risk management helps businesses prepare for these possibilities and limit the damage they can cause. This article explains the basics of risk management and how an organization’s risk management program can help protect […]
Tags: Risk Management
How You Can Seize Opportunity in 2023
Surface Cyber Risk to Seize the “Opportunity of a Lifetime” Speaker(s): Michael Maggio CEO at Reciprocity Rob Ellis SVP of Strategy at Reciprocity Christopher Gerg CISO at Perforce Software Rick Bill CISO at Fayetteville Technical Community College “The opportunity of a lifetime could be behind why so many CISOs are moving from job to job.” […]
November 16, 2022
Page 53 of 152