WordPress breach, Dozens of law firms hacked

Client confidentiality is sacrosanct. Firms aggregate sensitive information and so are high on the target list for organized criminals

read more

A "GIVE" from the heart

It's from the bottom of our heart, that's all it take 

read more

The journey least traveled - Cyber Resilience

'Innovation is great thing but introduces new cyber threat, and "they" know the target  that is of the price of a jewel crown.

read more

Find the journey to Governance, Risk&(Cyber)Security Management and Regulatory Compliance

Kicking off an Open Conference in Singapore - "Find the journey to Governance, Risk&(Cyber)Security Management and Regulatory Compliance"

read more

Understand Accredited certification of internationally recognised Management System Standards, by iTGRC

It is important to ensure that the certification body you use for the certification of your management system standard is accredited by the official national accreditation body, who is a member of the IAF.

read more

Subconscious mind of information risk, or cyber security

A lot has been shared, spoken of or published in market about Information Risk and Cyber Security. It boils down to the subconscious mind of Business impacts. 
read more

Look at the fundamental IT issues within the business

Due care is not always taken with IT and information or constantly faced with issues that threaten your organisation’s security
read more

IT Governance partners with iTGRC Asia

IT Governance partners with iTGRC Asia to deliver cyber security solutions

read more

Need an approach to align strategy and performance with Fraud & Compliance risk management?

Identify a strategy but need an approach to align that with Fraud & Compliance risk management?

read more

Driving project by Not managing project

Did I get the real requirements from the real key stakeholders? Some tips to share

Series 1.1

read more

Cyber Certification for End-User Business environments

Cyber Certification program, tailored for end-user environment across all business sectors.

read more

Has Governance, Risk and Compliance gone South?

Overrun of Governance, or a different connotation of Governance

read more

Mind power and Synchronicity

Mind power and Synchronicity, how does it relate and work with Good Governance & Risk Control?
read more

IT Governance Control Framework Implementation Toolkit

To achieve business robustness and resilience, Get a free demo of “IT Governance Control Framework”

read more

Impartial perspectives about the "Highlights from the Cisco 2017 Annual Cybersecurity Report"

Main points from the cisco 2017 annual report that goes into "Increased attack surface area, More equipped adversaries, Proverbial needle in the haystack" and MORE...

read more

The Audit Committee’s Role in Third-Party Risk Oversight

Almost every company interacts with a third-party on a daily basis. If the party has access to a company’s intellectual property or network along the value chain, a risk is imposed that needs to be recognized and managed. 

read more

Give unconditionally

An unceasing flow of a small amount, it amounts to many brighter days for those who are less fortunate. 

read more

What's in between human behaviour, information security and compliance?

What comes between between human psychology and information security or compliance?

read more

What is CAPA under FDA 21 CFR 820.100?

“Corrective Action and Preventative Action” known as CAPA falls under FDA 21 CFR 820.100. Those who are in FDA Regulatory Compliance space or holding Quality Assurance responsibility would appreciate the following.

read more

Fitting Together Penetration Testing and ISO27001

Penetration testing and ISO 27001: How do they fit together?

read more