RiskWatch

Five Must Knows About GDPR

Five Must Knows About GDPR April 18, 2018 Compliance | Cyber Security | Cyber Threats | Disaster Recovery Planning | Identity Theft | Managing the Risk Assessment | Regulatory Compliance | Risk Assessment | Risk Assessment & Compliance | Uncategorized What is GDPR? A trending topic these days is the latest data regulation that businesses […]

New Software as a Service coming to RiskWatch to Improve Your Experience—Soon!

New Software as a Service coming to RiskWatch to Improve Your Experience—Soon! April 4, 2018 Managing the Risk Assessment | Risk Assessment | Risk Assessment & Compliance New Announcement Last month, we made an exciting announcement to our email subscribers. Now we want to expand more on that and share it with our blog subscribers […]

Risk Management: Third-Party Breach Impact & Preparedness

Risk Management: Third-Party Breach Impact & Preparedness August 21, 2012 Facilities Security | Managing the Risk Assessment Michaels craft stores. TRICARE. Global Payments Inc. These are among the most recent and prominent examples of third-party data breaches that adversely impacted financial institutions, healthcare providers and other affiliated entities. How prepared is your organization to respond […]

Does the Future Hold a Bigger, Better Role for Risk Management?

Does the Future Hold a Bigger, Better Role for Risk Management? July 30, 2012 Managing the Risk Assessment | Risk Assessment A report from Accenture, “The Changing Face of Risk Management,” talks about how risk management within financial services firms (with a focus on insurance) is changing — and in my opinion, in a very […]

NSA Chief: Cybercrime constitutes the “greatest transfer of wealth in history”

NSA Chief: Cybercrime constitutes the “greatest transfer of wealth in history” July 11, 2012 Corporate Security | Corruption | Emergency Preparedness | Managing the Risk Assessment  The loss of industrial information and intellectual property through cyber espionage constitutes the “greatest transfer of wealth in history,” the nation’s top cyber warrior Gen. Keith Alexander said Monday. U.S. companies […]

Data-Driven Security – Using Metrics to Focus & Target Security Programs

Data-Driven Security – Using Metrics to Focus & Target Security Programs February 9, 2012 Corporate Security | Facilities Security | Hospital Security | Managing the Risk Assessment | Regulatory Compliance | Risk Assessment | Success Stories | Threat Assessment | Workplace Violence Prevention Security programs can be dramatically improved by using a metrics-based assessment to […]