Blog
Page 61 of 152
Key Principles of Operational Risk Management
Operational risk is any risk that arises from your company’s business processes and could result in financial loss or disruption to your ability to serve customers. Operational risk management (ORM) is the art of protecting your company from such risks and minimizing any damage that may occur. ORM began in financial institutions and became streamlined […]
August 15, 2022
What Does a Compliance Management System Look Like?
For the modern financial institution, your compliance management system needs to incorporate cybersecurity monitoring to effectively limit compliance risk.
Tags: Compliance, Risk Management
Employee Spotlight: Devin Harris, Technical Product Manager
Every member of Reciprocity’s Technical Product Management team is a GRC expert, lending their product knowledge to our customers while providing internal guidance as we build out our next-generation platform. Devin Harris is a member of this elite team of ZenGRC experts, and is helping to ensure our game-changing approach to risk management continues to […]
August 9, 2022
Gather Your Team and Conquer Dystopian Vendor Security Reviews
Let’s talk about vendor security reviews. If you felt some form of unpleasant emotion just reading the phrase “vendor security review,” I understand. You and I are not so different. You have likely participated in completing at least one vendor security review in your career. During the process you may have questioned humanity, your career […]
All You Wanted to Know About Data Security Fabric
Data is one of the most valuable assets for modern organizations. The right type and quality of data allows companies to resolve problems and improve business performance; it guides enterprise decision-making and drives business strategy. Data is also vital to improve cybersecurity, maintain regulatory compliance, and strengthen the competitive posture. In short, data matters. Organizations […]
August 4, 2022
Using Business Analytics for Risk Performance Management
Risk management is the process of identifying, evaluating, and controlling risks to an organization’s operations and financial performance. These dangers can be caused by several things, such as economic unpredictability, legal responsibilities, technological problems, strategic management blunders, accidents, and natural calamities. An effective risk management program helps a business navigate all potential hazards. Managing risk […]
What is Cyber Threat Intelligence?
As the cybersecurity threat landscape evolves, attack vectors are becoming more sophisticated and widespread. Cybercriminals are also constantly improving their tradecraft. To guard against these sophisticated and malicious adversaries, you must actively seek out and mitigate cyber threats before they can cause too much damage. This is where threat intelligence comes in. Threat intelligence – […]
July 28, 2022
What is a Chief Risk Officer (CRO) & Why Does Your Organization Need One?
All organizations have a team of C-suite executives to set strategy and run the business. Typically that group looks quite similar from one organization to the next, with the chief executive officer, chief technology officer, and chief financial officer among the most important. But do you also have a chief risk officer? Do you even […]
What is Cyber Governance?
Modern organizations operate in a challenging threat landscape. It’s impossible to eliminate all the threats that might affect their systems, data, or people, but organizations can minimize the possibility that these threats result in catastrophic damages. This is where strong cybersecurity and robust cybersecurity governance come in. Cybersecurity and cybersecurity governance go hand in hand […]
How COVID-19 Affected and Caused Cyberattacks on Hospital Systems
Healthcare organizations such as hospitals and clinics are vulnerable to all manner of cyberattacks, particularly phishing and business email compromise (BEC) scams, man-in-the-middle (MitM) attacks, and data breaches. Third-party risks and ransomware risks are also serious security problems in healthcare, especially in the post-COVID era. The medical world had already noted such cyberattacks years ago. […]
July 27, 2022
Page 61 of 152