Blog
Page 70 of 152
Strategies for Digital Risk Protection
No lock has ever been invented that was completely secure; if an intruder is determined to get in, he or she can usually find a way. So it is for houses and buildings – and the same principle is just as true for cybersecurity. Hence cybersecurity risk management is crucial to prevent and mitigate cyber […]
Tags: Cybersecurity, Risk Management
April 4, 2022
Risk Assessment vs Risk Analysis
Understanding the difference between risk assessment and risk analysis can help you prioritize your risk mitigation strategies to maintain a security-first approach to information security.
Tags: Risk Management
Reciprocity Announces New CEO in Support of Accelerating Growth
Michael Maggio Named CEO, Brings Diverse Experience and Skills to Transform IT Risk Management SAN FRANCISCO, CA – March 31, 2022 – Reciprocity, a leader in information security risk and compliance, today announced that Michael Maggio has been named as the Chief Executive Officer. Maggio, who currently serves as Chief Product Officer (CPO), will maintain […]
March 31, 2022
Driving Business Results with a Strategic Approach to Risk – and with ZenRisk
Every business activity involves risk, so simply viewing and measuring risk at a high level isn’t enough. InfoSec teams also need to identify and categorize risks as they relate to individual business activities and the context around them. Managing risk is all about delivering insights so that key stakeholders – including executives and the board […]
March 29, 2022
Operationalize Risk and Compliance with the Reciprocity ROAR Platform
The team at Reciprocity recently conducted a live poll and asked our audience, “Are you currently using your compliance program to guide your risk management program?” Here’s what our respondents said: These results reflected what we had already determined during previous customer surveys: most organizations want to manage risk and compliance together. But they don’t […]
March 28, 2022
Cyber Hygiene: How to Implement Best Practices for Your Business
Cyber hygiene is the cybersecurity equivalent to the idea of personal hygiene. Applying good cyber hygiene practices, every day, is the only way to assure your business isn’t identified as “digitally unclean” and therefore a risk to customers and business partners. But what is cyber hygiene? The idea of cyber hygiene can be traced back […]
How to Renew Your ISO 27001 Certification
Since 1947, the International Organization for Standardization (ISO) has developed thousands of international standards geared toward quality assurance across a multitude of sectors and activities. The organization does not, however, carry out the ISO certification process. That is done by an external accredited certification body. The ISO 27001 standard allows organizations to maintain the security […]
How to Integrate ESG Risks into Your Enterprise Risk Management Framework
Many companies are coming to realize that an effective environmental, social, and governance (ESG) strategy supports better financial performance and long-term business success. As a result, efforts to define and manage ESG issues are rising ever higher on corporate executives’ priority list. Including ESG concerns in your strategy and risk management program, however, is easier […]
Do FedRAMP and CMMC Have Reciprocity?
Government cybersecurity standards such as FedRAMP and CMMC can be challenging to comprehend. There are a host of details to decipher for each one, let alone both. Let’s dive into common questions about these two programs: How they work together, how they work independently, and other questions that frequently arise. What is FedRAMP? The Federal […]
What is Internal Control in Auditing?
A system of internal controls is a set of policies and procedures that an organization can use to provide reasonable assurance that the organization achieves its objectives and goals. Generally, these controls include segregation of duties, limiting access to cash or sensitive data, management reviews and approval, and reconciliations. A company’s internal audit function assesses […]
Tags: Audit Management, Risk Management
Page 70 of 152