Has Governance, Risk and Compliance gone South?

Overrun of Governance, or a different connotation of Governance

read more

Mind power and Synchronicity

Mind power and Synchronicity, how does it relate and work with Good Governance & Risk Control?
read more

IT Governance Control Framework Implementation Toolkit

To achieve business robustness and resilience, Get a free demo of “IT Governance Control Framework”

read more

Impartial perspectives about the "Highlights from the Cisco 2017 Annual Cybersecurity Report"

Main points from the cisco 2017 annual report that goes into "Increased attack surface area, More equipped adversaries, Proverbial needle in the haystack" and MORE...

read more

The Audit Committee’s Role in Third-Party Risk Oversight

Almost every company interacts with a third-party on a daily basis. If the party has access to a company’s intellectual property or network along the value chain, a risk is imposed that needs to be recognized and managed. 

read more

Give unconditionally

An unceasing flow of a small amount, it amounts to many brighter days for those who are less fortunate. 

read more

What's in between human behaviour, information security and compliance?

What comes between between human psychology and information security or compliance?

read more

What is CAPA under FDA 21 CFR 820.100?

“Corrective Action and Preventative Action” known as CAPA falls under FDA 21 CFR 820.100. Those who are in FDA Regulatory Compliance space or holding Quality Assurance responsibility would appreciate the following.

read more

Fitting Together Penetration Testing and ISO27001

Penetration testing and ISO 27001: How do they fit together?

read more

iTGRC Asia introduces COBIT in Asia

iTGRC Asia is proud to introduce COBIT training for organization and individuals in Asia. Click here for more detail, or visit http://itgrc.asia/promotions/cobit

read more

List of data breaches and cyber attacks in January 2017

Cyber criminals have not given any surprises in January 2017. Ransomware attacks continue

read more

Anti-Bribery Management System

Choose a well-recognized and comprehensive ABMS, Anti-Bribery Management System documentation Toolkit - ISO 37001:2016

read more

CLOUD CUSTOMER ARCHITECTURE FOR ENTERPRISE SOCIAL COLLABORATION

A new reference architecture that illustrates how to leverage social collaboration tools to harness ideas, exchange information, and increase the speed of innovation across the business

read more

Cyber Security Testing 360 Degree Cyber Security Assessment Package

Launching a "360 Degree Cyber Security Assessment Package" in Asia by end Q1'2017 is in the pipeline of iTGRC Asia Advisory and Consulting road-map. Early soft-launch will be offered to selective clients. 
 
read more

$4 million stolen by infiltrating law firms’ emails

Three Chinese criminal hackers made $4 million by gaining access to insider information from law firms.
read more

Building business case for ISO27001?

In need of compelling business case when putting together a convincing proposal for an ISMS? Click here to find out More

read more

IT Governance’s executive chairman Alan Calder to speak at The Future of Cyber Security Manchester on the GDPR and NIS Directive

Tune in to IT Governance Executive Chairman's speech about The Future of the GDPR and NIS Directive 

read more

A Glance at the key Findings from Cyber Security Breaches Survey

 
Useful Learning from the other side of the world. To bring more awareness to Asia on the necessary precautionary actions.
read more

FBI warns financial sector about infected ATMs

ATMs around the world have been spewing millions of dollars following ‘jackpotting’ malware attacks by a cyber criminal group linked to the well-known cyber crime syndicate Buhtrap, according to Russian cybersecurity firm Group IB.

read more