Guide

Your Guide to Defense in Depth

Modern cybersecurity requires a multi-layered approach to detecting and repelling threats. Emerging cyber risks can adapt to your initial firewalls or encryptions, so having more than one la ...
April 26, 2022
FAQ

What Are PCI DSS Standards?

Everything you need to know about the Payment Card Industry Data Security Standard (PCI DSS) including its goals and requirements, and how your business or organization can achieve and maint ...
April 26, 2022
Article

What Are Risk Management Methodologies in Compliance?

Discover everything there is to know about compliance risk management including common methodologies and best practices with this guide from Reciprocity. In the modern business environmen ...
April 18, 2022
Webinar

Rethink Your Third-Party Risk Strategy in an Uncertain World

DO YOU KNOW IF YOUR VENDORS ARE MEETING REQUIRED SECURITY AND PRIVACY OBLIGATIONS? As organizations begin to recover from the pandemic, third-party risk management (TPRM) is more importan ...
April 15, 2022
Infographic

5 Pitfalls of a Compliance-Only Solution

You're not using spreadsheets to manage your compliance programs. That's great! But if you chose a solution that is built exclusively for compliance, you may be missing out on some key capab ...
April 13, 2022
FAQ

What Is Data Classification & Why Is It Important?

Data classification refers to the process of analyzing data (both structured and unstructured) and then organizing that data into defined categories based on its contents, file type, and oth ...
April 8, 2022
FAQ

What is Compliance in Cybersecurity?

Definition of Compliance Businesses are required to comply with all relevant government laws, rules, and regulations, including those rules and regulations about data privacy. There is no c ...
April 8, 2022
Article

Best Practices to Mitigate Vendor Risk Within Your Supply Chain

As an organization grows, it becomes increasingly difficult to handle all workloads internally. Suppliers, service providers, and other third-party vendors are often necessary to meet your g ...
April 8, 2022
E-book

Internal Controls Best Practices

Learn to develop strong internal controls to safeguard against security threats Internal controls protect your business from many operational, financial and compliance risks that compromi ...
April 5, 2022
Article

Best Practices in Cyber Supply Chain Risk Management

Management of cybersecurity threats in your supply chain should be embedded into every part of your business. Every high-risk vendor relationship or third-party supplier from the front offic ...
April 4, 2022
FAQ

What is a Third-Party Risk Assessment?

A third-party risk assessment is an analysis of the risks introduced to your organization via third-party relationships along the supply chain. Those third parties can include vendors, servi ...
April 4, 2022
Press Release

Reciprocity Announces New CEO in Support of Accelerating Growth

Michael Maggio Named CEO, Brings Diverse Experience and Skills to Transform IT Risk Management SAN FRANCISCO, CA - March 31, 2022 - Reciprocity, a leader in information security risk and ...
March 31, 2022
1 2 3 4 5 45