Product related RiskWatch Content Libraries - RiskWatch

RiskWatch Content Libraries

  • Active Shooter – Active Shooter Preparedness
  • AEO (Authorized Economic Operator)– World Customs Organization’s standard to secure global trade.
  • Business Continuity – Assessment of an organization’s level of preparedness for product and service delivery following an unforeseen disruption.
  • California Consumer Privacy Act – Privacy rights and consumer protection for residents of California.
  • CFATS – Chemical Facility Anti-Terrorism Standards. Cybersecurity and Infrastructure Security Agency’s program focused specifically on security at high-risk chemical facilities.
  • CFPB (Consumer Financial Protection Bureau) – Financial Sector compliance for EOCA, EFTA, Fair Lending, HMDA, MLA, RESPA, SAFE, TILA, & TISA.
  • Cloud Security Alliance – Guidance for managing and mitigating the risks associated with the adoption of cloud computing technology.
  • COBIT 2019 – Control Objectives for Information and Related Technologies – Recommended best practices for governance and control process of information systems and technology.
  • COVID-19 Workplace Guidance – Based on OSHA’s document OSHA 3990-03 2020 Guidance on Preparing Workplaces for COVID-19. It focuses on engineering, administrative, and work practice controls and personal protective equipment (PPE).
  • C-TPAT – The Customs-Trade Partnership Against Terrorism (C-TPAT) is a voluntary supply chain security program led by U.S. Customs and Border Protection (CBP) focused on improving the security of private companies’ supply chains with respect to terrorism.
  • Cybersecurity Maturity Model Certification – A Department of Defense verification mechanism to ensure appropriate levels of cybersecurity practices and processes are in place to ensure basic cyber hygiene as well as protect controlled unclassified information (CUI) that resides on the Department’s industry partners’ networks.
  • DEA – Controlled substance storage security.
  • Enterprise Mobile Device Security – NIST 800-124 Guidelines for managing the security of mobile devices in the enterprise.
  • FEMA 426 – Federal Emergency Management Agency – Reference Manual to Mitigate Potential Terrorist Attacks.
  • FFIEC – Federal Financial Institutions Examination Council – A formal U.S. government interagency body.
  • GDPR – The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU).
  • GLBA Compliance – Gramm-Leach-Bliley Act (Financial Modernization Act of 1999) – A federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals.
  • HIPAA, HITECH, IAHSS, California Health & Safety Code 1257.7 & Joint Commission Health Insurance Portability and Accountability Act (including Omnibus Rule) – ensures equal access to certain health and human services and protects the privacy and security of health information. HITECH Breach Notification – Brings additional compliance standards to healthcare organizations regarding breach notification for unauthorized disclosure of unsecured PHI. IAHSS – International Association for Healthcare Security and Safety. Joint Commission – National patient safety goals. OCR Risk Analysis Final Rule – The Office for Civil Rights (OCR) – Guidance on the provisions in the HIPAA Security Rule. California Health & Safety Code 1257.7 – Hospital security and safety assessment.

  • Industrial Physical Security – Security standards that meet the guidelines of ASIS International.
  • IRS 1075 – Guidance for US government agencies and their agents to protect Federal Tax Information.
  • ISO 27001 – International Organization for Standards – Information technology, Security techniques, Information security management systems, Requirements.
  • NATF CIP 014 – Physical security standard for electric power substations.
  • NCUA – National Credit Union Administration – An independent federal agency created by the United States Congress to regulate, charter, and supervise federal credit unions.
  • New York Shield Act – New York state’s safeguard requirements for protecting “private information” of New York residents and security breach notification requirements.
  • New York DFS CybersecurityNew York State Department of Financial Services’ Cybersecurity Requirements for Financial Services Companies, 23 NYCRR 500.
  • NFPA 1600 – National Fire Protection Association – Disaster/Emergency Management and Business Continuity/Continuity of Operations Programs.
  • NIST 800-171 – Guidelines for protecting government controlled unclassified information
  • NIST 800-53 – National Institute of Standards and Technology – Security and Privacy Controls for Federal Information Systems and Organizations.
  • NIST 800-66 – Guidelines for Implementing the Health Insurance Portability and Accountability Act.
  • NIST CSF (Cyber Security Framework)– Voluntary guidance, based on existing standards, guidelines, and practices, for critical infrastructure organizations to better manage and reduce cybersecurity risk.
  • OSHA 3148 – Occupational Safety and Health Administration – Guidelines for preventing workplace violence for healthcare and social service workers.
  • PCI DSS – Payment Card Industry Data Security Standards – Information security standard for organizations that handle branded credit cards from the major card schemes.
  • Privacy Shield – Data protection requirements for transferring personal data from the European Union and Switzerland to the United States in support of transatlantic commerce.
  • Project Risk – Assessment of an organization’s Project Management policies and individual projects.
  • SOX – Sarbanes-Oxley Compliance – Requires that all publicly held companies must establish internal controls and procedures for financial reporting to reduce the possibility of corporate fraud.
  • Supplement to Authentication in an Internet Banking Environment – A FFIEC guidance supplements the FDIC’s supervisory expectations regarding customer authentication, layered security, and other controls in an increasingly hostile online environment.
  • Top 20 Cyber Controls – Compilation of the most critical cyber security controls.
  • Vendor Risk – Assessment of the level of inherited risk from your third-party vendors/service providers.
  • Vendor Risk Lite – Comprehensive, high-level survey of a vendor’s internal information security controls.
  • Wind Farm Security – Critical Infrastructure focused on wind farm facility physical security.
  • Workplace Violence Prevention

Not Quite What You’re Looking For?

Don’t see your content above or already have a form?
Send it to us and we’ll add it for you!

We’ll even convert your first paper form to a mobile version, free.
This information will be kept private and only added to your account.


    Product Overview

    An Intelligent Physical Security Risk Assessment Platform

     

    SecureWatch is a state of the art security and risk assessment platform that can be utilized for facility compliance and security risk assessments. Reduce exposure to liability, manage risk, monitor and maintain security, and track continuous improvement.

    SecureWatch assessment dashboard

    An Information Security Risk Management Platform

     

    CyberWatch is a modern assessment solution that can be utilized by various industries for cyber security and compliance risk assessments. The software enables you to reduce exposure to liability, manage risk, monitor and maintain cyber security, and track continuous improvement.

    CyberWatch assessment

    A Compliance Assessment and Management Platform

     

    ComplianceWatch is a compliance audit and management platform that can be utilized by various industries for measuring compliance to any regulation, standard, or policy. Reduce exposure to liability, maintain public credibility, ensure adherence to best practices, track policy compliance, and track continuous improvement.

    ComplianceWatch compliance widget

    A Client Security and Compliance Risk Assessment Platform

     

    ClientWatch can be utilized to manage client engagements in security audits, risk assessments, regulatory compliance, gap analysis, policy review, and more. Customize, standardize and automate the services provided to clients in pre engagement, onsite, and post engagement.

    ClientWatch Dashboard

    A Supplier Security Risk Assessment Platform

     

    SupplierWatch is a security risk assessment and management platform that can be utilized to reduce exposure to liability, manage third-party risk, monitor and manage your supply chain, ensure high business continuity, and track continuous improvement. Use it to identify, eliminate, and prevent problems in your suppliers processes, management, or products.

    SupplierWatch supplier analysis

    A Vendor Security Risk Assessment Platform

     

    VendorWatch is a security risk assessment and management platform that can be utilized for identifying security gaps and risks with vendors and addressing them. Reduce exposure to liability, manage third-party risk, and monitor and rank vendors. Keep track of a vendor’s compliance efforts to ensure expectations are being met. Archive contracts, manage compliance evaluations, manage contract reviews, and rate vendors objectively.

    VendorWatch vendor vulnerability
    Riskwatch Trial

    Reduce exposure to liability. Manage risk. Monitor and maintain security.

    Track continuous improvement. Sign up for instant access to a free trial.

    Professional email address to activate trial