Blog
Page 67 of 152
Should You Develop a Multi-Cloud Strategy?
As more and more businesses look for ways to take better advantage of the services offered by different cloud providers, many organizations are finding that a single cloud provider simply can’t meet all of their business needs. For this reason, many businesses are exploring what’s called a multi-cloud approach. Today almost every company uses various […]
May 20, 2022
How to Overcome Barriers Affecting Risk Management
Amidst today’s ever-changing threat landscape, business leaders are also facing an equally evolving and increasing range of uncertainty. Managing this uncertainty and its effects on your organization is called enterprise risk management (ERM) – an invaluable process, to which more businesses are starting to pay well-deserved attention. Enterprise risk management is an umbrella program that […]
Best Practices for Developing Internal Controls for Your Business
Best Practices for Developing Internal Controls for Your Business Most organizations assume their internal controls are working until a failed audit, inaccurate financial reporting, or a missed regulatory requirement proves otherwise. The real risk is relying on controls that don’t work as intended. An effective internal control framework does more than prevent errors. It ensures […]
What Is Third-Party Cyber Risk Management?
According to one 2021 report by the Ponemon Institute, 74 percent of organizations say they had experienced a cybersecurity breach in the previous 12 months because they gave “too much privileged access” to third parties. Despite this worrying trend, 54 percent of companies also say they don’t assess the security practices of third parties before […]
What Is a Vulnerability?
A vulnerability is a weakness that can cause or contribute to a risk of being exploited by a threat; it is a gap in protection that increases the likelihood that something bad will happen. In the realm of cyber threats, vulnerabilities allow cybercriminals to gain unauthorized access to a computer system to run malicious code, […]
FedRAMP and AWS Services: A Comprehensive Primer
Amazon Web Services (AWS) is a widely used cloud platform that allows organizations to leverage the many benefits of the cloud. They can choose from more than 200 services to move to a cloud infrastructure to lower costs, become more agile, and accelerate the pace of innovation. But for U.S. federal agencies to use AWS […]
May 16, 2022
How Do I Build a Scalable Risk Management Program?
In an increasingly interconnected world, anticipating and managing risk is more important — and more challenging — than ever before. Ultimately, you need a risk management program that will expand and evolve to meet the emerging and ever-changing threats to your organization. Maintaining your risk management program is an ongoing process, and one that will […]
Guide to Comparing Risk Assessment Methodologies
Risk assessment is a critical component of enterprise risk management – perhaps even the most important component. If you assess your risks incorrectly, all the steps you subsequently take to control those risks can fall short. Most risk management teams use two types of risk assessment methodologies: qualitative risk assessment and quantitative risk assessment. Within […]
The Changing Role of the CISO [Fireside Chat]
FROM THE BACK OFFICE TO THE BOARDROOM: EXECUTIVES DISCUSS THE ROLE’S EVOLUTION Increasingly since the global pandemic struck in 2020, the world is being exploited by cyber criminals. This has resulted in a record number of ransomware attacks and data breaches globally — and shows no signs of slowing. As these threats and the security […]
May 13, 2022
Page 67 of 152