Browse the SRC




Search within: Entire SIG Website
  


Today many organizations are coming under increased regulatory pressures causing them to reevaluate and formalize their risk management strategies. In this presentation you will learn how one...

Original Source: Steele Global

"Best practices relating to the systematic vetting of third parties such as resellers, agents, distributors, sales and marketing representatives, and joint...

Original Source: CNN Money by Julia Horowitz

"What's in a name? A boatload of problems, if you're The Honest Company.

Jessica Alba's Honest brand made its name by selling nontoxic,...

Original Source: Proviti

"The conclusions of a technology risk study, which explored whether technology risk functions have the right strategy, skills and operating models in place to...

Original Source: bizmanualz

"Imagine what a professional football team would be like without an Effective Management System focused on a regimen of practice drills. Now take away their...

Original Source: https://www.ssae-16.com/

"SSAE 18 is a series of enhancements aimed to increase the usefulness and quality of SOC reports, now,...

Original Source: FCPA Compliance Report

"Last week’s announcement by the Securities and Exchange Commission (SEC) of the resolution of its outstanding Foreign Corrupt Practices Act (FCPA)...

Original Source: Bizfluent by James Green

"Economics tends to be broken into two schools of study. When analyzing a firm, microeconomic issues tend to be those that involve the problems and...

Original Source: Search Security / Tech Target

"Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT...

Original Source: BITSight

"In today’s security climate, talk of proper cybersecurity procedures must include discussion of a continuous monitoring plan that applies both internally and...

Pages