Article

Why Buying SaaS GRC Software Is a Smart Investment

As organizations and businesses around the world and across industries migrate their IT to the cloud, C-suites are faced with a new dilemma for governance, risk management and compliance (GR ...
September 30, 2022
Article

Tips for Managing Third-Party Risk in Health Care

Data breaches against healthcare organizations affected more than 1 million people in 2020. The average total data breach cost in the same year was far higher in the healthcare industry ($7. ...
September 29, 2022
Article

CCPA vs. GDPR: Compliance Comparison

The California Consumer Privacy Act (CCPA), heralded as the U.S. version of the European Union's General Data Protection Regulation (GDPR), has many American companies overhauling their appr ...
September 23, 2022
Article

What is Vendor Risk Management (VRM)? The Definitive Guide

Vendor risk management (VRM), a part of vendor management, identifies, analyzes, monitors, and mitigates the risks that third-party vendors might pose to your organization. Such risks could ...
September 22, 2022
Article

IRM, ERM, and GRC: Is There a Difference?

The various niches of risk management have become a veritable alphabet soup of acronyms. The advent of the digital age is partly to blame. Virtually every organization is "going digital" ...
August 24, 2022
Article

Important KPIs for Successful Vendor Management

Every risk management program should include risks posed by your vendors. Beware, however: vendor risk management is a complex process unto itself, requiring ongoing monitoring and measureme ...
August 24, 2022
Article

5 Steps to Implement Enterprise Risk Management (ERM)

Enterprise risk management (ERM) is critical for success in the modern business landscape. Your ERM program should encompass all aspects of risk management and response in all business proce ...
August 18, 2022
Article

The Difference Between Strategic and Operational Risk

Modern organizations operate in a highly complex environment. New technologies, increasing digitization, and evolving customer demands create risks that can disrupt operations, weaken cybers ...
August 17, 2022
1 2 3 26