Blog

data

My Data Lies Over the Ocean, My Data Lies Over the Sea

by Sabine Zimmer | October 31, 2022 | Data & Cybersecurity

Data zips across the Atlantic over submarine communications cables and pings across the sea to and from satellites at light speed. These transatlantic data flows are critical to the economic relationship between the United States and the European Union: The White House places a $7.1 trillion value ....

PR23

It's Here! 2023 Shared Assessments Third-Party Risk Management Product Suite

by Colleen Milazzo | October 19, 2022 | Data Governance Tools, Standardized Control Assessment (SCA), Standardized Information Gathering (SIG), Tools & Templates, Vendor Risk Management Maturity Model (VRMMM)

[et_pb_section fb_built="1" admin_label="section" _builder_version="4.16" global_colors_info="{}"][et_pb_row admin_label="row" _builder_version="4.16" background_size="initial" background_position="top_left" background_repeat="repeat" global_colors_info="{}"][et_pb_column type="4_4" _builder_version ....

Penetration Testing1

Penetration Testing in Risk Management

by Marisa Sgambati | August 3, 2022 | Data & Cybersecurity

You wouldn’t leave your home without making sure the door was shut and locked behind you. You wouldn’t install an alarm system that doesn’t sound when a burglar enters. So, why would you not take the same precautions for your company? Consistently testing the effectiveness of application secur ....

Gramm Leach Bliley Act GLBA

Spotlight on the Gramm-Leach-Bliley Act (GLBA)

by Linnea Solem | July 5, 2022 | Data Protection, Public Policy

Last week Bob Maley, Chief Security Officer at Black Kite and I led a Fireside Chat discussion on the current regulatory landscape regarding privacy and security. While state laws continue to advance and there is momentum for a Federal U.S. Privacy Regulation, the update by the Federal Trade Commiss ....

inflation risk

Inflation Risk: High Interest Rates, Possible Stagflation – Is Your Risk Plan Ready?

by Joe Prochaska, Board Member, The Santa Fe Group | July 4, 2022 | Business Continuity, Corporate Culture, Incident Reponse

Paying more at the gas pump? Are those groceries costing you more than even a few weeks ago? Are the raw materials your company relies upon costing more? Are you debating or actually raising your prices to your customers? Are your stakeholders nervous? An Unsettled Economy This is clearly an uns ....

MicrosoftTeams image 1

Online Safety For Children

by Marisa Sgambati | June 8, 2022 | Cyber Risk, Cybersecurity, Data & Cybersecurity, Data Protection

Technology is all around us. Smartphones, smart watches, cars, computers, refrigerators, and cameras have become an enormous part of our everyday lives. These introductions have challenged us to constantly adapt. We are living in (and raising families in) an evolving technological society. As a p ....

File Integrity Monitoring

FIM (File Integrity Monitoring): Protecting Customer's Credit Card Data

by Ron Bradley | June 1, 2022 | Data & Cybersecurity

There’s FOMO (Fear of Missing Out) and then there’s FIM (File Integrity Monitoring). You do not want to miss out on understanding what FIM is all about and why the FBI (Federal Bureau Of Investigation) is concerned. The FBI Cyberdivision recently released a Flash Report reporting that cyber a ....

Third Party Business Continuity And Disaster Recovery Programs

Third Party Business Continuity and Disaster Recovery Programs

by Rachel Snare | May 31, 2022 | Business Continuity, Business Resiliency, Incident Reponse, Pandemic Planning

From natural disasters to software failures and cyberattacks, disasters bring considerable risk to businesses. While there is no way to prevent an unforeseen event, you can minimize the ensuing risks by working closely with third parties – those who provide your organization goods and services, to ....

Real-Time Bidding

Real-Time Bidding: Technology or Data Breach?

by Sabine Zimmer, Ron Bradley, Tom Garrubba | May 20, 2022 | Data & Cybersecurity, Privacy

What is Real-Time Bidding (RTB)? Real-Time Bidding (RTB) is a technology operating behind the scenes on all websites and apps, tracking everything you look at, no matter how private or sensitive. And, RTB records where you go. Every day, RTB shares data about you with a host of companies continuous ....

Right Sizing the SIG

Right-Sizing the SIG: A Q&A with Shared Assessments CEO Andrew Moyad

by Eric Krell | May 19, 2022 | Risk Management, Standardized Information Gathering (SIG), Third Party Risk, Third Party Risk Management, Tools & Templates

Shared Assessments CEO Andrew Moyad had a quite a head start getting up to speed after stepping into his current role in February. Moyad’s 25-plus years in risk management and information security includes leadership roles in vendor risk management at Blackstone, one of the world’s top global as ....

Next Page »