Blog

Explore our blogs for the latest insights, tips, and best practices in third-party risk management. Stay informed and protect your organization by navigating the complexities of third-party relationships with confidence. Read on to enhance your risk management strategy!

Blog Category - Cybersecurity

Cybersecurity, Risk Landscape

Visual Hacking: Who’s Looking Over Your Shoulder?

I recently attended the Ponemon Institute’s Responsible Information Management (RIM) Renaissance Privacy Event. While headlines and discussion continue to focus on cybersecurity; privacy professionals also had good conversations about the basics of visual privacy. Protecting confidential information is a basic...

Read More
Cybersecurity, Risk Landscape

No Playing Hide and Seek With Cyber Security

The FFIEC recently released its Cyber Security Assessment observations, after conducting a pilot on cyber security readiness with more than 500 community institutions. A key theme emerging from the observations was the need for enhanced sharing of threat and vulnerability...

Read More
Cybersecurity, Risk Landscape

Heightened Expectations, Cybersecurity, and the Board’s Role in Risk Management

The first quarter of 2014 has been marked by an increasing focus on the board’s role in risk management, not just in the financial services industry (where in January the OCC issued proposed rules detailing how a board of directors...

Read More
Cybersecurity, Risk Landscape

Shining the Flashlight on Privacy Notices

Privacy notices are under scrutiny whether due to the new California “Do Not Track” disclosure requirements for web sites; or the recent FTC Settlement with a smartphone developer on a “Flashlight” application that collected and shared geo-location information without the...

Read More
Cybersecurity, Risk Landscape

Data Breaches and Third Party Risk

Materiality and Mitigation Approaches Although most data breach headlines have centered on retail organizations continuing to expose payments related data, the reality is that data breaches are a fact of life in almost every economic sector. In its 2013 Data...

Read More
Cybersecurity, Risk Landscape

The Financial Impact of Breached Protected Health Information: A Business Case for Enhanced PHI Security

PHI data breaches are growing in frequency and in magnitude. Protecting valuable health data is an important business decision for all health care organizations. Authored by more than 100 health care industry leaders, this free report includes PHIve—a 5-step method...

Read More
1 15 16 17