Exploits in iOT garage door opener, Samsung smart TVs

"see no evil, hear no evil, speak no evil" . More exploits found in things that our daily life depends on.

read more

Cyber Security Playbook (Cookbook)

Correspondingly, we share a playbook by IT Governance Lt.d to get everyone oriented with "Cyber & its Security" 

read more

ISO 27001 - the de facto global information security management standard

 

Take the chance on those who go through the challenges, and learn from them the successful practices now.

 

 

read more

iTGRC, fuels your business with a resilient ecosystem

Emulate the law of nature for your business ecosystem

read more

Comply with the GDPR and NIS Directive by May 2018

Treat it with Priority in Asia, 2017. Comply with the GDPR and NIS Directive by May 2018 to avoid the fines associated with a data breach. Click the above for further detail. 
read more

a Short article on AML, anti-money laundering

In response to the launch of Anti-Bribery Management Systems ISO 37001:2016, we share a short article on AML

read more

ISO 37001:2016 Anti-Bribery Management System launches

ISO 37001:2016 ABMS is designed to help organisations put in place an anti-bribery management system to support compliance with bribery and corruption laws across the world

read more

Singapore’s Ministry of Defence hit by cyber attack

System used at military premises to access the Internet has resulted in the theft of the personal data

read more

Rising cost of data breaches to $2.1 trillion by 2019, and now targeting LAMP-POST ?

From counting the no. of records leaked to anticipating the global cost of the data breaches

read more

Cloudflare, Cloudbleed, CloudPets and Yahoo

For the cyber security savvy one.
read more

CAPA and Your QMS Internal Audit

What CAPA means after your Internal Audit findings? 

read more

WordPress breach, Dozens of law firms hacked

Client confidentiality is sacrosanct. Firms aggregate sensitive information and so are high on the target list for organized criminals

read more

A "GIVE" from the heart

It's from the bottom of our heart, that's all it take 

read more

The journey least traveled - Cyber Resilience

'Innovation is great thing but introduces new cyber threat, and "they" know the target  that is of the price of a jewel crown.

read more

Find the journey to Governance, Risk&(Cyber)Security Management and Regulatory Compliance

Kicking off an Open Conference in Singapore - "Find the journey to Governance, Risk&(Cyber)Security Management and Regulatory Compliance"

read more

Understand Accredited certification of internationally recognised Management System Standards, by iTGRC

It is important to ensure that the certification body you use for the certification of your management system standard is accredited by the official national accreditation body, who is a member of the IAF.

read more

Subconscious mind of information risk, or cyber security

A lot has been shared, spoken of or published in market about Information Risk and Cyber Security. It boils down to the subconscious mind of Business impacts. 
read more

Look at the fundamental IT issues within the business

Due care is not always taken with IT and information or constantly faced with issues that threaten your organisation’s security
read more

IT Governance partners with iTGRC Asia

IT Governance partners with iTGRC Asia to deliver cyber security solutions

read more

Need an approach to align strategy and performance with Fraud & Compliance risk management?

Identify a strategy but need an approach to align that with Fraud & Compliance risk management?

read more