Best Practices in Cyber Supply Chain Risk Management

Management of cybersecurity threats in your supply chain should be embedded into every part of your business. Every high-risk vendor relationship or third-party supplier from the front offic ...
April 4, 2022

What is Internal Control in Auditing?

A system of internal controls is a set of policies and procedures that an organization can use to provide reasonable assurance that the organization achieves its objectives and goals. Genera ...
March 28, 2022

What are GDPR Fines and Penalties?

Organizations that fail to comply with the European Union's General Data Protection Regulation (GDPR) standards for data protection, data security, and data processing can face steep fines. ...
February 24, 2022

What is the COSO Framework?

COSO, the Committee of Sponsoring Organizations, is an advisory group that designs frameworks to help organizations with risk management issues. One of its most popular frameworks is the COS ...
January 27, 2022

What is Supply Chain Compliance?

Most companies sit in the middle of a supply chain; that means they need to practice due diligence in supply chain compliance: mitigating the risk that one or more of your suppliers might po ...
October 20, 2021

What is a Data Retention Policy?

A data retention policy is a company's established protocol for keeping records for a set period of time. It may also be called a records retention policy or backup retention policy. The goa ...
October 4, 2021

What is the Gramm-Leach-Bliley Act?

In 1999, the United States Congress passed the Gramm-Leach-Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999, with numerous, substantial requirements to prote ...
September 17, 2021

Why you need a vendor risk management policy

In virtually every industry, organizations work with third parties such as suppliers and vendors, to improve operational efficiency, save money, and achieve greater flexibility, scalability, ...
September 15, 2021
1 2 3 9