COBIT Compliance and Framework
COBIT Compliance and Framework January 30, 2019 Compliance | Cyber Security | RiskWatch Blog The Value of Cobit Compliance With today’s prevalence of technology in the workplace, we can’t stress enough the importance of cybersecurity and keeping an effective cyber framework in place. As such, we often recommend COBIT compliance to anyone looking for best […]
Survey Management
Survey Management January 4, 2019 Compliance | Riskwatch Blog Survey Management Tools When it comes to survey management tools, the anticipated functionality is to collect accurate feedback and usable business data. The tool should also be easy to use, for both the person building the survey and the person answering it. In terms of measuring […]
IT Compliance Management: The What and Why
IT Compliance Management: The What and Why December 5, 2018 Compliance | Corporate Security | Cyber Security | Cyber Threats | Regulatory Compliance | Risk Assessment & Compliance | RiskWatch Blog IT Compliance Management IT compliance management can be difficult for many organizations that don’t understand the requirements of cyber data, especially when you have […]
Third Party Management Top Risks
Third Party Management Top Risks November 21, 2018 3rd Party Ecosystem | Compliance | Facilities Security | Managing the Risk Assessment | Risk Assessment & Compliance | Third Party Risks Top Risks in Third Party Management When you observe a business ecosystem, it’s important to note that it’s dynamic and constantly changing as it interacts […]
Supplier Audits and What You Need to Know
Supplier Audits and What You Need to Know October 10, 2018 Compliance | Risk Assessment | Risk Assessment & Compliance | Third Party Risks | Threat Assessment Performing Supplier Audits If you’re in business with a supplier, you’re going to want to make sure you perform regular audits as their business practices directly impact yours. […]
A Closer Look at IT Compliance
A Closer Look at IT Compliance September 26, 2018 Compliance | Cyber Security | Cyber Threats | Risk Assessment & Compliance | Threat Assessment | Uncategorized Importance of Implementing IT Compliance With the vast majority of businesses going digital, IT compliance is now more prevalent than ever. With that said, we wanted to utilize this […]
Top Five Risks in the Oil & Gas Industry
Top Five Risks in the Oil & Gas Industry September 12, 2018 Compliance | Corruption | OSHA | Regulatory Compliance | Risk Assessment | Risk Assessment & Compliance | Uncategorized | Workplace Violence Prevention The Dangers of the Oil and Gas Industry The oil and gas industry easily has a large impact on the mass […]
How to Prepare for a Security Audit
How to Prepare for a Security Audit August 22, 2018 Compliance | Corporate Security | Cyber Security | Cyber Threats | Emergency Preparedness | Facilities Security | HIPAA Risk Analysis | OSHA | Regulatory Compliance | Risk Assessment | Risk Assessment & Compliance | Uncategorized The Unnecessary Torture of Security Audits From financial services to […]
Financial Service Risks That Require a Powerful Risk Assessment Platform
Financial Service Risks That Require a Powerful Risk Assessment Platform July 23, 2018 Compliance | Cyber Security | Cyber Threats | Disaster Recovery Planning | Managing the Risk Assessment | Regulatory Compliance | Risk Assessment | Risk Assessment & Compliance | Threat Assessment | Uncategorized Financial Service Risk Over the last several years, the financial […]
Top Five Vendor Risks
Top Five Vendor Risks June 18, 2018 Compliance | Cyber Security | Cyber Threats | Regulatory Compliance | Risk Assessment | Risk Assessment & Compliance | Third Party Risks | Uncategorized A vendor can be defined as a person or a company that offers some service or product for a fee. Many companies hire third-party […]