Blog
Page 76 of 152
8 Cybersecurity Questions You Should Be Asking Your Vendors
Given the sharp rise of ransomware in recent years, and how cybercriminals have evolved in the tactics they use to launch cyberattacks, organizations must be able to protect their businesses from cyber threats. The more vendors you have in your extended enterprise, the less easy that is. In the past year alone, several major breaches […]
February 4, 2022
What is Downstream Liability?
Recent cyberattacks on Colonial Pipeline, NEW Cooperative, Oldsmar, and other critical infrastructure companies have highlighted the harm of downstream liability for organizations, and the importance of its proper assessment. Assigning responsibility for downstream liability is a challenge, especially given the lack of clear regulations that identify who is responsible for downstream liability among companies, distributors, […]
5 Benefits of the Digital Supply Chain & How to Implement One at Your Company
A supply chain is a broad ecosystem of activities, business processes, people, resources, and information that lead to the completion of a company’s product or service. The strength of a company’s supply chain of vendors and distributors allows that company to bring its offerings to customers and to achieve a competitive advantage. Conversations about supply […]
What Is Open Source Intelligence (OSINT)?
Open-source intelligence (OSINT) is any information that can be accessed by the public. This accessibility is defined as anything that doesn’t require hacking or private credentials to read or collect the information. Google search results, broadcast news, online forums, and social media (sometimes called SOCMINT) are all examples of OSINT. OSINT includes information from the […]
February 3, 2022
Cyber Hygiene: What Is it and How to Implement it for Your Business
Since the dawn of COVID, we have become more conscious of washing our hands and other personal hygiene practices. What about cyber hygiene? What is it? Is it important? And if so, why? Cyber hygiene refers to the set of practices and precautions that allow organizations to: Secure networks and resources Protect sensitive information from […]
Using Compliance as a Catalyst for Reducing Risk
LEARN HOW TO USE YOUR COMPLIANCE PROGRAM AS A JUMPING OFF POINT FOR RISK MANAGEMENT Through regulations and countless best practices, industry has been pushing organizations to take a more proactive approach to compliance and risk, which means making thoughtful, strategic decisions on where to prioritize investments. Are your security and compliance initiatives helping you […]
February 2, 2022
How Reciprocity Onboarding Services Deliver Lightning-Fast Time to Value
When your organization makes a substantial investment in new technology, the last thing you want is for it to go underused. Digital transformation is intended to make people more productive and give them more time to focus on what matters most. But you can’t reap those benefits unless the onboarding process is swift, smooth, and […]
Tags: GRC
Beyond Compliance: How a Risk Maturity Model Advances Strategic Business Objectives
THE BUSINESS CASE FOR MATURE RISK MANAGEMENT Does your organization lack the right tools and processes to identify, assess, and mitigate or eliminate risk? Have you yet to establish an enterprise-wide “language” of risk? Is an opaque risk management program impairing your company’s ability to address threats outside of its risk threshold? Because these are […]
February 1, 2022
Your 4-Step Guide to Setting Up a Risk Committee
BECAUSE CHANGING RISK ENVIRONMENTS REQUIRE OBJECTIVITY If your Board of Directors is solely responsible for monitoring and mitigating risk, then your enterprise’s risk exposure may be greater than you think… Because studies show the professionals closest to projects often fail to understand the risks: When scientists first tested nuclear weapons in the Mojave Desert, their […]
January 31, 2022
Page 76 of 152