Third Party Vendor Management Audit Program

Large organizations now depend on vendors and service providers to survive. They need those third parties to provide everything from critical components and goods to critical services, such ...
September 9, 2023

Continuous Auditing vs. Continuous Monitoring

Steering a company through the maze of regulatory compliance obligations that all organizations of any appreciable size face a maze of regulatory compliance obligations, and getting through ...
September 1, 2023

What is the CISO’s Role in Risk Management?

The chief information security officer (CISO) is a relatively new type of C-level executive. As cyber threats have grown in recent years, to the point that poor cybersecurity can jeopardize ...
April 5, 2023

Key Steps to Manage Operational Risk

As the repercussions of the Covid-19 pandemic linger, many organizations are still concerned about the pandemic's long-term effect on business operations, continuity, and service delivery. ...
March 23, 2023

PCI DSS Compliance: A Brief Overview

Compliance with the Payment Card Industry Data Security Standard (PCI DSS) means meeting 12 specific compliance requirements. If your organization processes credit- or debit card payments, y ...
February 3, 2023

Automating NIST Cybersecurity Framework Control Info

Automating the National Institute of Standards and Technology (NIST) Cybersecurity Framework control documentation and processes is one way to help build a strong cybersecurity foundation. T ...
January 30, 2023

Understanding the PCI Levels of Compliance

Every merchant and service provider that processes, stores, or transmits credit card data must comply with the Payment Card Industry Data Security Standard (PCI DSS) for cybersecurity and pr ...
January 24, 2023

CCPA Compliance Checklist

If your organization has a presence in California or does business with California residents, then it most likely needs to comply with the California Consumer Privacy Act (CCPA). Enacted ...
January 12, 2023
1 2 3 26