Blog
Page 73 of 152
Have a strong compliance program? Use it as a foundation for risk management.
In the spring of 2020, organizations around the globe suddenly had a new reality: Stay-at-home orders meant that they had to shift their operating models overnight to accommodate employees, customers and suppliers working remotely. The digital transformation many companies had planned over a period of years now had to happen in a matter of weeks […]
March 8, 2022
Changing the Game: Introducing the Reciprocity ROAR Platform and Product Suite
Security and risk management (SRM) leaders are under increasing pressure to both reduce risk and demonstrate and communicate the value, effectiveness, and maturity of their security program to a broad range of stakeholders with differing and evolving expectations. This includes board members who, after years of receiving quarterly reports on cybersecurity, are now asking for […]
Follow the Data: 5 Strategies to Managing Third Party Risk
For many organizations, managing third-party risk starts out as a relatively easy proposition because the company doesn’t have too many third-party relationships. As those companies mature, however, the endeavor soon becomes unwieldy. With only a few third parties in your supply chain, you can use spreadsheets to identify and manage third-party risk. But as your […]
Tags: Third-Party Management
Effective InfoSec Begins with Compliance + Risk
By Michael MaggioChief Product Officer As organizations increasingly shift to digital business models and expand their remote workforces, they’re being faced with a growing wave of security threats – including cyberattacks. In response, risk management is evolving and the role of CISOs is changing, as they can no longer focus solely on IT security. CISO’s […]
March 3, 2022
Advantages of An Internal Control System
Internal controls are designed to protect an organization from fraud, loss of assets, compliance failures, and other obstacles to overall business objectives. After the time, money, and effort you spent implementing a system of internal controls, you certainly don’t want that system to fail. The best way to assess the effectiveness of internal controls is […]
February 28, 2022
Compliance vs. Risk: Similarities + Key Differences
Regulation of corporate activity is increasing around the world, forcing boards of directors and senior management to take an active role in all matters of the company’s business- and especially in compliance with the law and industry regulations. Distinguishing risk management from compliance may not seem relevant to some businesses, but the two are most […]
Benefits of Supplier Tiering
Supplier tiering is the process of organizing suppliers into tiers based on their importance to your supply chain. Categorizing suppliers into tiers helps to streamline communications between a business and its suppliers. Supplier tiering also allows businesses to manage its supplier base more efficiently, perform supply chain risk management activities, and get the best possible […]
What Is Operational Resilience?
Operational resilience is your business’s ability to withstand a sudden disruption or shock to business operations. More specifically, it is the set of procedures that allow people, processes, and information systems to respond to changing forces. It enables critical business functions to keep running during a disruption or restore those functions to some predetermined level […]
What Is Cloud Security?
Cloud security can mean different things to different organizations. At the highest level, cloud security is how an organization applies cybersecurity to the technology and business processes it runs through the cloud. From there, the subject quickly gets more complex. When exploring cloud security, start by focusing on infrastructure as a service (IaaS) and platform […]
February 24, 2022
What is IT Vendor Risk Management?
Most companies rely on numerous cloud-based technology providers to manage their day-to-day business operations. These services can help you streamline and automate your business, but they can also bring vulnerabilities that hackers will happily exploit at your expense. To protect your company and prioritize your customers’ sensitive data, you’ll need to incorporate your information technology […]
Page 73 of 152