Authorities on Risk Assurance

The Shared Assessments Blog

Starwood Breach Not Isolated

Published on November 23, 2015 By | Posted in: Data Breach, News, PII

Tracy Kitten, Executive Editor for Bank Info Security, today released an article about the recent Starwood breach. In the article, Tracy discusses how this incident may not be isolated and that “fraud patterns indicate that another, perhaps larger, breach is impacting cards across the country” Click here to read the full article.

Are You Effectively Managing Your Compliance Documentation?

Published on November 20, 2015 By | Posted in: News

By Susan Eilefson, Deluxe Corporation Reposted with permission. Originally posted on Deluxe Blogs. As the Compliance Enablement Documentation Specialist in the Business Risk & Compliance Department at Deluxe Corporation, one of my key responsibilities is to ensure that all of our documentation will stand the scrutiny of external auditors. All departmental documentation – written policies, […]

Practical Vendor Management to Minimize Compliance Risks

Published on November 16, 2015 By | Posted in: Third Party Risk Management, Vendor Risk, Vendor Risk Managment, Webinar

The Santa Fe Group Senior Vice President, Charlie Miller, recently participated on the Truste webinar, Practical Vendor Management to Minimize Compliance Risks Webinar Description Organizations will be judged by the company they keep. Don’t let third parties off the hook, when your data privacy compliance is at risk. While third parties come through breaches unscathed, […]

Bend, But Don’t Break: How to Minimize the Effects of a Privacy Breach

Published on November 12, 2015 By | Posted in: Blog, Data Breach, Privacy

By Elena Ames, Deluxe Corporation Reposted with Permission. Originally posted on Deluxe Blogs. Last week, my colleague Brad Reimer posted a great privacy blog on his recent attendance at the 2015 Privacy. Security. Risk. (P.S.R.) IAPP conference. Protecting sensitive information has been a key topic this year for many organizations across the globe. A few […]

Building Breach Resistance in Your Business Partners

Published on November 10, 2015 By | Posted in: Blog, Cybersecurity, Data Breach, Shared Assessments, Third Party Risk, Third Party Risk Management

According to the Ponemon Institute’s 2014 Global Report on the Cost of Cybercrime, a quarter of organizations worldwide fail to meet their own security requirements. If your organization is one of that 25 percent, given the surging rate of cybercrime, you are probably hurrying to ramp up privacy and information security programs, staff, and budget. […]

Privacy. Security. Risk. 2015: En Garde! The Duels to Protect Customer Information

Published on November 4, 2015 By | Posted in: Blog, Privacy, Risk, Risk Management, Security

By Brad Reimer, Deluxe Corporation Reposted with permission. Originally posted on Deluxe Blog I recently attended the 2015 Privacy. Security. Risk. (P.S.R.) conference presented by the International Association of Privacy Professionals (IAPP) and the Cloud Security Alliance (CSA). The keynote speakers offered good reminders about the ongoing duel that privacy and security professionals face in […]

Building Your Breach Resistance First Line of Defense

Published on November 2, 2015 By | Posted in: News

By Doug Pollack, ID Experts Originally posted on the ID Experts blog. Reposted with permission. Cyber-attacks and the resulting data breaches are all over the headlines. Just this year, we’ve seen the Anthem breach (80 million individuals affected), a billion-dollar cyber-heist that affected up to 100 banks worldwide, the OPM data breach (21.5 million people […]

EMA and Prevalent Publish Infographic Focused on Vendor Threat Management and Executive Management

Published on October 29, 2015 By | Posted in: Infograph, Vendor Risk, Vendor Risk Managment, Vendor Security, Vendor Threat

This week, Prevalent published an infographic developed by analyst firm EMA focused on vendor threat management. The infographic starts with a simple question ‘Do We Need Vendor Threat Management?’ It highlights a senior executive speaking with a team member asking whether his organization is prepared to take on third-party risk. The team member answers that […]

The Seemingly Illusive Nature of Tone at the Top

Published on October 28, 2015 By | Posted in: Newsletter, Tone at the Top

Think Tone at the Top doesn’t matter? A front page headline in the Friday, September 25th New York Times Business Day section, commenting on Volkswagen’s use of sophisticated software to circumvent omissions standards, read “Problems at VW Start at the Boardroom” and continued “The governance of Volkswagen was a breeding ground for scandal. It was […]

The Not-So-Secret Service: What Your Company Can Learn From the Rep. Chaffetz Scandal

Published on October 21, 2015 By | Posted in: Blog, Cybersecurity, Data, Data, Huffington Post, Secret Service

Of all the scandals that have struck the U.S. Secret Service over the past few years, I can’t think of any more damaging than the current controversy involving Congressman Jason Chaffetz (R-Utah), House Oversight and Government Reform Committee Chairman. While it’s probably safe to assume the U.S. Secret Service (like most government agencies) has established […]

Shared Assessments Program licensee Churchill & Harriman logo
Shared Assessments Logo radian
Shared Assessments Logo Bank Of New York Mellon
Shared Assessments Licensee Pivot Point Security
Aujas Information Risk Services Logo
Shared Assessments Logo usbank
Shared Assessments Logo Deloitte
Shared Assessments Logo first data
Shared Assessments Program licensee Nice logo
Online Business Systems logo
Shared Assessments Licensee White Hat
Shared Assessments Licensee Pro Teck
Shared Assessments Licensee ctg
Shared Assessments Logo tsys
Shared Assessments Licensee Rsam
Shared Assessments Licensee Telerex
Alsbridge Logo-Tag 176x84bw
Shared Assessments Licensee Power Advocate
Shared Assessments Logo sei
MetricStream logo
Shared Assessments Licensee LTD Financial Services
Early Warning Logo
Shared Assessments Licensee-Brainshark
Shared Assessments Logo Ernst & Young
Shared Assessments Logo Deluxe Corp
Shared Assessments Logo Iron Mountain
Shared Assessments Licensee Bank of the West
Shared Assessments Logo yodlee
Shared Assessments Licensee Protiviti
Shared Assessments Logo jpmorgan
Shared Assessments Logo dtcc
Shared Assessments Licensee Caanes
el paso electric logo
Ellie Mae Logo
Shared Assessments Licensee Identity Theft 911
Viewpoint Logo
Shared Assessments Logo Lerner Sampson & Rothfuss
Shared Assessments Licensee TD Ameritrade
Shared Assessments Licensee BSI
Shared Assessments Licensee ControlCase
Shared Assessments Logo pwc
Shared Assessments Licensee Lockpath
Shared Assessments Licensee ZS logo
Shared Assessments Licensee-Copytalk