Privacy. Security. Risk. 2015: En Garde! The Duels to Protect Customer Information

November 4, 2015 | Privacy, Risk, Risk Management, Security

By Brad Reimer, Deluxe Corporation Reposted with permission. Originally posted on Deluxe Blog I recently attended the 2015 Privacy. Security. Risk. (P.S.R.) conference presented by the International Association of Privacy Professionals (IAPP) and the Cloud Security Alliance (CSA). The keynote speak ....

Untitled 1

It’s Not Just a Check The Box Exercise: Building a Culture of Compliance

October 13, 2015 | Compliance, Corporate Culture, Payments, Risk

Last week I outlined ideas on implementing appropriate best practices in structuring effective compliance programs. Leveraging program management disciplines can streamline the logistics of compliance management. However, process alone is not sufficient without the right “tone at the top” to foc ....

Business Continuity: What Do Those Words Mean To You?

September 22, 2015 | Business Continuity, Risk, Risk Management

For many businesses, they are nothing more than words. Business Continuity is more than simply having a slightly modified template version of a Business Continuity Plan (BCP) that took a few hours to complete in order to satisfy your Manager or an outside entity. Instead, it is a never-ending proce ....

Is a New Certification Program the Key to Reducing Third Party Risk?

June 26, 2015 | Certification, Certified Third Party Risk Professional (CTPRP), Data Breach, Risk, Risk Assessment, Risk Professionals, Third Party Risk, Third Party Risk Management

Hacker data breaches that exploit vulnerable third party vendors dominate news headlines, boardroom discussions, and C-suite meeting agendas. As a result of the proliferation of such attacks, it has become increasingly imperative for organizations to ensure successful evaluation, monitoring, and man ....

Using Peer Collaboration to Manage Supply Chain Risk

May 29, 2015 | Collaborative Onsite Assessment, Program Tools, Risk, Risk Management, Supply Chain, Third Party Risk Management, Tools & Templates

Today’s companies are outsourcing more critical functions as part of their business operations in today’s complex environment. Every member of the supply chain must be evaluated to ensure they are properly protecting systems and data. With hackers specifically targeting third parties as a way to ....

The Next Generation of Third Party Risk

May 26, 2015 | Cyber Risk, Cybersecurity, Data & Cybersecurity, Risk, Risk Management

As a follow up to the 8th annual Shared Assessments Summit, the themes of governance continued to focus on third party risk, when I conducted a webinar hosted by the New York Stock Exchange (NYSE) Governance services and sponsored by Prevalent. The focus on third party risk has shifted from a line ....

« Previous PageNext Page »