WordPress breach, Dozens of law firms hacked
Client confidentiality is sacrosanct. Firms aggregate sensitive information and so are high on the target list for organized criminals
Client confidentiality is sacrosanct. Firms aggregate sensitive information and so are high on the target list for organized criminals
'Innovation is great thing but introduces new cyber threat, and "they" know the target that is of the price of a jewel crown.
Kicking off an Open Conference in Singapore - "Find the journey to Governance, Risk&(Cyber)Security Management and Regulatory Compliance"
It is important to ensure that the certification body you use for the certification of your management system standard is accredited by the official national accreditation body, who is a member of the IAF.
IT Governance partners with iTGRC Asia to deliver cyber security solutions
Identify a strategy but need an approach to align that with Fraud & Compliance risk management?
Did I get the real requirements from the real key stakeholders? Some tips to share
Series 1.1
Cyber Certification program, tailored for end-user environment across all business sectors.
Overrun of Governance, or a different connotation of Governance
To achieve business robustness and resilience, Get a free demo of “IT Governance Control Framework”
Main points from the cisco 2017 annual report that goes into "Increased attack surface area, More equipped adversaries, Proverbial needle in the haystack" and MORE...
Almost every company interacts with a third-party on a daily basis. If the party has access to a company’s intellectual property or network along the value chain, a risk is imposed that needs to be recognized and managed.
An unceasing flow of a small amount, it amounts to many brighter days for those who are less fortunate.
What comes between between human psychology and information security or compliance?
“Corrective Action and Preventative Action” known as CAPA falls under FDA 21 CFR 820.100. Those who are in FDA Regulatory Compliance space or holding Quality Assurance responsibility would appreciate the following.
Penetration testing and ISO 27001: How do they fit together?