Blog
Page 57 of 152
ISO 27001 Requirements Checklist: Steps and Tips for Implementation
The ISO 27001 standard for management of information systems helps organizations of any size to manage the security of data assets such as employee information, financial information, intellectual property, and third-party information. ISO 27001 is primarily known for providing requirements for an information security management system (ISMS), and is part of a much larger set […]
Tags: ISO
September 30, 2022
How to Automate Vendor Risk Management
Every organization uses third-party vendors, and most organizations use lots of vendors – which brings lots of vendor risk in tow. At this point most risk managers understand that they need to manage that vendor risk somehow, but the work to assess and manage those risks has escalated to the point that it’s almost impossible […]
September 29, 2022
Cybersecurity Best Practices for Companies
The modern threat landscape has evolved significantly in the past few years. Cybercriminals launch increasingly sophisticated attacks, which have only gotten worse since the COVID-19 pandemic and the move to remote work. Think about all the sensitive information and critical assets that organizations store and handle as part of their business operations: personal information on […]
Tips for Managing Third-Party Risk in Health Care
Data breaches against healthcare organizations affected more than 1 million people in 2020. The average total data breach cost in the same year was far higher in the healthcare industry ($7.13 million) than any other sector. In 2021 the average cost rose to $9.41 million. As one can see, the healthcare industry is one of […]
Tags: Cybersecurity, Healthcare
How To Connect Risk With Your Business Objectives So Everyone Understands
Current Challenges in Risk Management A recent study from EY Global found that 77% of companies across industries and geographic regions report an increase in threats to their business.1 Yet, information security and business executives say that it’s unnecessary organizational complexity that poses “concerning” cyber and privacy risks. To effectively reduce risk, they need to […]
September 27, 2022
Best Practice Guide: Using Automation to Transform Risk Management
The past two years have seen many organizations’ risk management programs playing catch-up. Companies accelerated their digital transformation to accommodate a newly hybrid workforce, shifts in customer expectations and the need to make their supply chains more resilient to disruption without full security and risk assessments. Bad actors quickly seized upon the situation, upping the […]
September 26, 2022
Modernizing Your Third-Party Risk Management Program
Third-party risk management (TPRM) is a growing concern for organizations as their networks grow and cybersecurity threats increase. Here’s the story, by the numbers: DOWNLOAD THIS INFOGRAPHIC Share this Infographic on Your Site courtesy of RiskOptics Learn more about the RiskOptics® ROAR Platform, or sign up to try ROAR for free with the Community Edition. […]
What is a Security Automation Platform?
Enterprise cybersecurity has devolved into a war zone. Today’s cyber adversaries are armed with cutting-edge tools to launch sophisticated and devastating attacks and data breaches; and companies cannot afford to take a reactive stance to cyber defense. The need of the hour is a disciplined, programmatic way to identify, detect, investigate, and remediate incoming security […]
September 23, 2022
What is Third-Party Risk Monitoring?
Third-party risk monitoring is the continuous assessment of third-party vendors that have entered into a business relationship with your company, to understand how much risk they pose to your organization at any given moment. Monitoring is critical to any third-party risk management program (TPRM). The first step in third-party cyber risk management is due diligence […]
Page 57 of 152