Our profession is undergoing a change in current. Yet to lead the change, meet rapidly rising expectations, keep or earn that ""seat at the table,"" attract and retain the best talent and leverage...
Browse the SRC
Original Source: Steele Global
"This paper will address issues of concern, including:
- Lawful Bases for Processing Personal Data Under GDPR
- Applications of Lawful Bases...
Original Source: Steele Global
"Five practical steps to overcoming the challenges of implementing a risk-based third-party program..."
Original Source: ITIL / Wikipedia
"ITIL (formerly an acronym for Information Technology Infrastructure Library) is a set of detailed practices for IT service management (ITSM) that focuses...
Original Source: Wikipedia / CMMI
"Capability Maturity Model Integration (CMMI) is a process level improvement training and appraisal program. Administered by the CMMI Institute, a...
Original Source: Fair Institute by Rachel Slabotsky
"I recently had a conversation with clients around a risk analysis they conducted and noticed as they walked me through it that they...
Original Source: Reciprocity WRITTEN BY KAREN WALSH
"PCI DSS compliance comes with over 100 pages of requirements. However, the Appendices offer ways to think about how you can limit your...
Original Source: Advocate Daily
"New causes of action for breach of privacy make data breach one of the most significant risks facing Canadian companies — but organizations may have an...
Original Source: GSX Blog by Eileen Fitzgerald
"We are delighted to post an article on the challenges of managing Service Leve Agreements by ITIL Standards, by Bill Heffernan of SureSkills...
Original Source: Vericode By Evan Wade
"The fact that communication is a vital aspect of successful third-party relationships is obvious. ("You mean to tell me I have to talk to the...