Anti-Bribery Management System

Choose a well-recognized and comprehensive ABMS, Anti-Bribery Management System documentation Toolkit - ISO 37001:2016

read more

CLOUD CUSTOMER ARCHITECTURE FOR ENTERPRISE SOCIAL COLLABORATION

A new reference architecture that illustrates how to leverage social collaboration tools to harness ideas, exchange information, and increase the speed of innovation across the business

read more

Cyber Security Testing 360 Degree Cyber Security Assessment Package

Launching a "360 Degree Cyber Security Assessment Package" in Asia by end Q1'2017 is in the pipeline of iTGRC Asia Advisory and Consulting road-map. Early soft-launch will be offered to selective clients. 
 
read more

$4 million stolen by infiltrating law firms’ emails

Three Chinese criminal hackers made $4 million by gaining access to insider information from law firms.
read more

Building business case for ISO27001?

In need of compelling business case when putting together a convincing proposal for an ISMS? Click here to find out More

read more

IT Governance’s executive chairman Alan Calder to speak at The Future of Cyber Security Manchester on the GDPR and NIS Directive

Tune in to IT Governance Executive Chairman's speech about The Future of the GDPR and NIS Directive 

read more

A Glance at the key Findings from Cyber Security Breaches Survey

 
Useful Learning from the other side of the world. To bring more awareness to Asia on the necessary precautionary actions.
read more

FBI warns financial sector about infected ATMs

ATMs around the world have been spewing millions of dollars following ‘jackpotting’ malware attacks by a cyber criminal group linked to the well-known cyber crime syndicate Buhtrap, according to Russian cybersecurity firm Group IB.

read more

ITGRC Combining the disciplines for better enterprise security

How CISOs and organizations can adopt unified governance, risk management and compliance strategies to build a successful IT GRC program that adds true business values.

 

read more

Understanding the PCI DSS

The Payment Card Industry Data Security Standard (PCI DSS) is a regulatory standard created by the PCI Security Standards Council. The purpose of the standard is to decrease the risk of payment card fraud online.
 
read more

New Cybersecurity Act to be tabled in 2017, Singapore

SINGAPORE: There will be a new, standalone Cybersecurity Act that will be tabled in Parliament next year, said Minister for Communications and Information Yaacob Ibrahim on Monday (dated Apr 11, 2016).

read more

The reality of implementing ISO 27001

According to ISO, adoption of the information security standard, ISO 27001, in the US has grown significantly over recent years.
 
 
read more

New 2017 training course schedule – more dates, more locations and new courses

IT Governance Training Schedule for 2017/18 release. iTGRC Asia will collaborate with IT Governance and cater for your companies, individual training needs in Asia. Click for more Course detail

read more

The softer side of a CISO role when you are at the board level

In order for CISOs to stay relevant in their field today, they must add communication and soft skills to their list of capabilities

read more

Magda Chelly is now the finalist for “Women in IT Awards 2017”

Couldn't be happier, that iTGRC Asia’s business partner, Magda Chelly of Responsible Cyber Pte is now the finalist for “Women in IT Awards 2017”. 
read more

A Holistic Approach to Cybersecurity; Technologies, Process, & People

Everyone talks about the approach to Cyber Security. Under different conditioning will have different thought and belief. Take a slightly different path, a practitioner way that focus on "Coordinated and Integrated..."

read more

Discover the fundamentals of information security risk management auditing

While going into 2017, look back at the hindsights and mistakes, and discover more from the fundamentals.. 

read more

Cyber Essentials Scheme, how it benefits you, and fits your business budget

Turn back the clock and back to 2014. Take five and listen to "What is the Cyber Essentials scheme and how to comply with it" to help build a business case for your business. 

read more

Finding similarities between AML and IT Access (Account) Management

AML and Systems Access Control, they both are not linked in anyway, neither they share any close proximity. When slicing them into smaller chunks, it begins to show some insights...

read more