Blog
Page 69 of 152
Qualities of Effective Supplier Quality Management
When working with a supplier, you expect that the goods and services it delivers to you are of a certain quality. You also expect items to be delivered on time and to meet agreed-upon requirements, whether that’s simply to mitigate risk or work with internal infrastructure and processes you have. The best way to ensure […]
April 19, 2022
Rethink Your Third-Party Risk Strategy in an Uncertain World
DO YOU KNOW IF YOUR VENDORS ARE MEETING REQUIRED SECURITY AND PRIVACY OBLIGATIONS? As organizations begin to recover from the pandemic, third-party risk management (TPRM) is more important than ever. Faced with supply chain disruption and cyber threats, businesses are re-assessing their dependence on partners and taking a closer look at risks they introduce. How […]
April 15, 2022
The Imperative of Managing Cyber Risk in Business Context
People have long used mission statements, declarations and manifestos to publicly convey the intentions, motives or views of its issuer. While the historical political landscape has long used these actions to challenge and provoke, they are also advertisements to gain attention and to spark action. Whatever term you choose to use, there have been many […]
April 13, 2022
SEC’s Push for Better Cyber Governance
This article first appeared on radicalcompliance.com March 28th, 2022 Today I want to revisit the SEC’s proposed new rules requiring public companies to disclose more about their cybersecurity risks. Those plans would obligate companies to discuss how the board and senior management address cybersecurity risk at a strategic, enterprise level. What’s that all about? In […]
April 12, 2022
What is Compliance in Cybersecurity?
Definition of Compliance Businesses are required to comply with all relevant government laws, rules, and regulations, including those rules and regulations about data privacy. There is no choice here; either the organization complies, or it risks losing permission to operate. The requirements themselves can range from laws such as the Health Insurance Portability and Accountability […]
April 8, 2022
Best Practices to Mitigate Vendor Risk Within Your Supply Chain
As an organization grows, it becomes increasingly difficult to handle all workloads internally. Suppliers, service providers, and other third-party vendors are often necessary to meet your goals and to create a positive experience for your customers. That said, outsourcing tasks to vendors also means taking on new or additional risk. The vendors’ reputational risk, financial […]
Internal Controls Best Practices
Learn to develop strong internal controls to safeguard against security threats Internal controls protect your business from many operational, financial and compliance risks that compromise asset security and increase your vulnerability to theft. These risks can also result in operational uncertainties that disrupt business continuity and weaken competitiveness, which can ultimately decrease your ability to […]
April 5, 2022
Best Practices in Cyber Supply Chain Risk Management
Management of cybersecurity threats in your supply chain should be embedded into every part of your business. Every high-risk vendor relationship or third-party supplier from the front office to the far depths of your supply chain can introduce risk to your entire business. To be clear, supply chain risk management (SCRM) and cyber supply chain […]
Tags: Cybersecurity
April 4, 2022
What is a Third-Party Risk Assessment?
A third-party risk assessment is an analysis of the risks introduced to your organization via third-party relationships along the supply chain. Those third parties can include vendors, service providers, software providers and other suppliers. Third-party risk assessments are a crucial part of every third-party risk management program (TPRM). Assessments may be conducted in-house or by […]
Tags: Third-Party Management
Information Security vs. Cybersecurity: Main Differences
Cybersecurity and information security are often assumed to be synonymous terms. They’re not. On the contrary, they have several critical differences that security professionals should understand, if you want to deliver the best protection and risk management possible to your organization. This article will explore those differences, review how they affect your organization, and provide […]
Tags: Cybersecurity, GRC, Technology
Page 69 of 152