Blog
Page 62 of 152
What is the Risk Management Process?
Enterprise risk management (ERM) is the process of identifying, assessing, managing, and monitoring potential risks. Its overarching goal is to minimize the harm that risks might cause an organization. Most organizations do face many risks, after all. Examples include cyber attacks, data breaches, operational disruptions, system failures, economic or political crises, and natural disasters. With […]
Tags: Risk Management
July 27, 2022
Employee Spotlight: Nick Brown, Technical Product Manager
Technical product managers play a crucial role in an organization, helping with the development and marketing of a company’s products while also serving as the main point of contact between the product development team, the marketing team, and customers. Nick Brown recently joined Reciprocity as a Technical Product Manager for our ROAR platform, and is […]
Combat Limited Resources & Threats With Automation
IN COLLABORATION WITH ELLIOTT DAVIS: EMERGING DEVELOPMENTS & HOT TOPICS, GRC In a 2021 survey of CIOs, respondents cited limited resources, new or changing regulations, and tracking and maintaining compliance as the top three challenges keeping them up at night. With teams stretched thin trying to keep up with compliance requirements and growing numbers of […]
July 26, 2022
Keep Up With the Ever-evolving Cybersecurity Threat Landscape
It seems like the next flavor of cyberattack is always making the news, a constant reminder of how vigilant businesses need to be to try and keep themselves, their customers and their suppliers safe. Almost every organization of any size will have some sort of vulnerability assessment and management program, security hardening framework and basic […]
What Is Cyber Risk Modeling?
In March 2022, Security Magazine published a list of cybersecurity predictions for the upcoming year. This list showed that criminals are constantly improving their craft employing ever-more advanced weapons to attack organizations. These new-age cybersecurity threats include deep fakes as part of social engineering attacks, threats targeting satellite networks, and Edge-Access Trojans (EATs) that stealthily […]
What is a Compliance Framework?
Regulatory compliance is a substantial challenge for many organizations— but that doesn’t mean you can give compliance short shrift. On the contrary, mastering compliance is critical for sustainable growth, protection against data breaches (and ensuing monetary penalties from regulators), and maintaining a competitive advantage over rivals. One crucial tool to develop your compliance program is […]
Tags: Compliance
Automating GRC: The Next Frontier in Risk Management
Because of the dramatic acceleration of digital transformation, many organizations have accepted associated risk rather than taking the time to conduct full security and risk assessments. Bad actors have quickly seized the opportunity by increasing the size, frequency and sophistication of attacks. Clearly, GRC as usual is no longer sufficient. The typical approach – a […]
July 19, 2022
Making the Shift From Vendor Risk Management to Third-Party Risk Management (and Leaving Your Questionnaires Behind!)
There’s an old expression that says the most dangerous statement a person can make is “we’ve always done it this way.” I think we can all agree that we need to grow and adapt as the world around us changes. That’s why over the past few months, we’ve shown you ways to switch to a […]
July 18, 2022
Page 62 of 152