COBiT 5 – Control Objectives for Information and Related Technologies – Recommended best practices for governance and control process of information systems and technology.
C-TPAT – The Customs-Trade Partnership Against Terrorism (C-TPAT) is a voluntary supply chain security program led by U.S. Customs and Border Protection (CBP) focused on improving the security of private companies’ supply chains with respect to terrorism.
DEA – Controlled substance storage security.
FEMA 426 – Federal Emergency Management Agency – Reference Manual to Mitigate Potential Terrorist Attacks.
FFIEC – Federal Financial Institutions Examination Council – A formal U.S. government interagency body.
GDPR – The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU).
GLBA Compliance – Gramm-Leach-Bliley Act (Financial Modernization Act of 1999) – A federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals.
HIPAA – Health Insurance Portability and Accountability Act – ensures equal access to certain health and human services and protects the privacy and security of health information.
HIPAA Omnibus Rule – Implements a number of provisions of the Health Information Technology for Economic and Clinical Health (HITECH) Act, to strengthen the privacy and security protections for health information established under the Health Insurance Portability and Accountability Act of 1996 (HIPAA).
HITECH – Health Information Technology for Economic and Clinical Health Act. Brings additional compliance standards to healthcare organizations and is directly related to HIPAA.
IAHSS – International Association for Healthcare Security and Safety.
Industrial Physical Security – Security standards that meet the guidelines of ASIS International.
ISO 27001 – International Organization for Standards – Information technology, Security techniques, Information security management systems, Requirements.
Joint Commission – National patient safety goals.
NCUA – National Credit Union Administration – An independent federal agency created by the United States Congress to regulate, charter, and supervise federal credit unions.
NFPA 1600 – National Fire Protection Association – Disaster/Emergency Management and Business Continuity/Continuity of Operations Programs.
NIST 800-171 – Guidelines for protecting government controlled unclassified information
NIST 800-53 – National Institute of Standards and Technology – Security and Privacy Controls for Federal Information Systems and Organizations.
NIST CSF (Cyber Security Framework)– Voluntary guidance, based on existing standards, guidelines, and practices, for critical infrastructure organizations to better manage and reduce cybersecurity risk.
OCR Risk Analysis Final Rule – The Office for Civil Rights (OCR) – Guidance on the provisions in the HIPAA Security Rule.
OSHA 3148 – Occupational Safety and Health Administration – Guidelines for preventing workplace violence for healthcare and social service workers.
PCI DSS – Payment Card Industry Data Security Standards – Information security standard for organizations that handle branded credit cards from the major card schemes.
Project Risk – Assessment of an organization’s Project Management policies and individual projects.
SOX – Sarbanes-Oxley Compliance – Requires that all publicly held companies must establish internal controls and procedures for financial reporting to reduce the possibility of corporate fraud.
Supplement to Authentication in an Internet Banking Environment – A FFIEC guidance supplements the FDIC’s supervisory expectations regarding customer authentication, layered security, and other controls in an increasingly hostile online environment.
Top 20 Cyber Controls – Compilation of the most critical cyber security controls.
Vendor Risk – Assessment of the level of inherited risk from your third-party vendors/service providers.
An Intelligent Physical Security Risk Assessment Platform
SecureWatch is a state of the art security and risk assessment platform that can be utilized for facility compliance and security risk assessments. Reduce exposure to liability, manage risk, monitor and maintain security, and track continuous improvement.
CyberWatch is a modern assessment solution that can be utilized by various industries for cyber security and compliance risk assessments. The software enables you to reduce exposure to liability, manage risk, monitor and maintain cyber security, and track continuous improvement.
ComplianceWatch is a compliance audit and management platform that can be utilized by various industries for measuring compliance to any regulation, standard, or policy. Reduce exposure to liability, maintain public credibility, ensure adherence to best practices, track policy compliance, and track continuous improvement.
A Client Security and Compliance Risk Assessment Platform
ClientWatch can be utilized to manage client engagements in security audits, risk assessments, regulatory compliance, gap analysis, policy review, and more. Customize, standardize and automate the services provided to clients in pre engagement, onsite, and post engagement.
SupplierWatch is a security risk assessment and management platform that can be utilized to reduce exposure to liability, manage third-party risk, monitor and manage your supply chain, ensure high business continuity, and track continuous improvement. Use it to identify, eliminate, and prevent problems in your suppliers processes, management, or products.
VendorWatch is a security risk assessment and management platform that can be utilized for identifying security gaps and risks with vendors and addressing them. Reduce exposure to liability, manage third-party risk, and monitor and rank vendors. Keep track of a vendor’s compliance efforts to ensure expectations are being met. Archive contracts, manage compliance evaluations, manage contract reviews, and rate vendors objectively.
Reduce exposure to liability. Manage risk. Monitor and maintain security.
Track continuous improvement. Sign up for instant access to a free trial.
Professional email address to activate trial