Blog
Page 59 of 152
5 Essential Steps Toward Better Third-Party Risk Management
I think it’s fair to say that as your company grows, you will likely need to engage with outside parties to supplement or outsource elements of your business. This may include vendors and suppliers, contractors or service providers. Engaging with third parties has a lot of benefits, but it also comes with challenges. Mainly, you […]
September 13, 2022
A Pocket Guide to Risk and Compliance Automation
You don’t have to be an expert to know that risk management and corporate compliance are different things. Risk management refers to events that can result in some unexpected or undesirable consequence, and how your organization keeps those threats at bay. Corporate compliance is about conforming your business operations to various rules or requirements set […]
September 10, 2022
Reciprocity Announces $60M Growth Investment from Francisco Partners
SAN FRANCISCO, Calif. – September 8, 2022 – Reciprocity (the “Company”), a leader in information security, risk, and compliance, today announced it has closed on a $60M strategic growth investment from Francisco Partners (“FP”), a leading global investment firm that specializes in partnering with technology businesses. This investment will support Reciprocity to build on the […]
September 8, 2022
Wisdom From a Compliance Dinosaur
This article first appeared on radicalcompliance.com August 16th, 2022 The other week I had coffee with a veteran compliance officer passing through town. This CCO has worked at numerous global organizations, some of the biggest names in his industry and to the public at large. So when my friend – we’ll call him the Dinosaur, […]
August 31, 2022
Guide to Strategic Risk Assessment and Management
Today’s organizations operate in a highly risky business environment comprising many types of risks. One such risk is strategic risk. Strategic risk is the risk that an internal or external event may prevent your organization from executing or achieving its strategic objectives. These failures can have severe long-term consequences for the firm and its stakeholders. […]
How To Respond To Tough Questions From Leadership Teams Faster and Better
Have you ever been asked difficult questions from your leadership teams that you couldn’t answer? How do you intelligently and succinctly respond to the following questions and have the supporting data to back up your metrics and business outcomes? Are we secure? When was our last security incident, how did we respond and will it […]
August 30, 2022
What is the ISO 27001 Standard?
ISO 27001, formally known as ISO/IEC 27001:2013, is a globally recognized standard for Information Security Management Systems (ISMS). Published by the International Organization for Standardization (ISO), it provides organizations with a systematic approach to managing sensitive company information, including financial data, intellectual property, customer information, and employee personal data. Unlike prescriptive security frameworks that mandate […]
Tags: Audit Management, ISO
Does ISO 27001 Require Penetration Testing?
ISO 27001, published by the International Organization for Standardization (ISO), is a set of standards to govern cybersecurity and information security management systems (ISMS) within your business and among your third parties. Being certified as ISO 27001-compliant requires a thorough analysis and testing of your IT systems’ functionality and capabilities. One requirement of ISO 27001 […]
IRM, ERM, and GRC: Is There a Difference?
The various niches of risk management have become a veritable alphabet soup of acronyms. The advent of the digital age is partly to blame. Virtually every organization is “going digital” across multiple business processes and operations. For example, retail is now “e-tail,” manufacturing plants are increasingly automated, and nearly every step of the hiring and […]
Tags: Retail, Risk Management, Technology
August 24, 2022
Important KPIs for Successful Vendor Management
An effective vendor management program needs automation to help document and monitor third-party cybersecurity. By establishing KPIs, you can create a more robust program.
Tags: Third-Party Management
Page 59 of 152