ITGRC Combining the disciplines for better enterprise security

How CISOs and organizations can adopt unified governance, risk management and compliance strategies to build a successful IT GRC program that adds true business values.

 

read more

Understanding the PCI DSS

The Payment Card Industry Data Security Standard (PCI DSS) is a regulatory standard created by the PCI Security Standards Council. The purpose of the standard is to decrease the risk of payment card fraud online.
 
read more

New Cybersecurity Act to be tabled in 2017, Singapore

SINGAPORE: There will be a new, standalone Cybersecurity Act that will be tabled in Parliament next year, said Minister for Communications and Information Yaacob Ibrahim on Monday (dated Apr 11, 2016).

read more

The reality of implementing ISO 27001

According to ISO, adoption of the information security standard, ISO 27001, in the US has grown significantly over recent years.
 
 
read more

New 2017 training course schedule – more dates, more locations and new courses

IT Governance Training Schedule for 2017/18 release. iTGRC Asia will collaborate with IT Governance and cater for your companies, individual training needs in Asia. Click for more Course detail

read more

The softer side of a CISO role when you are at the board level

In order for CISOs to stay relevant in their field today, they must add communication and soft skills to their list of capabilities

read more

Magda Chelly is now the finalist for “Women in IT Awards 2017”

Couldn't be happier, that iTGRC Asia’s business partner, Magda Chelly of Responsible Cyber Pte is now the finalist for “Women in IT Awards 2017”. 
read more

A Holistic Approach to Cybersecurity; Technologies, Process, & People

Everyone talks about the approach to Cyber Security. Under different conditioning will have different thought and belief. Take a slightly different path, a practitioner way that focus on "Coordinated and Integrated..."

read more

Discover the fundamentals of information security risk management auditing

While going into 2017, look back at the hindsights and mistakes, and discover more from the fundamentals.. 

read more

Cyber Essentials Scheme, how it benefits you, and fits your business budget

Turn back the clock and back to 2014. Take five and listen to "What is the Cyber Essentials scheme and how to comply with it" to help build a business case for your business. 

read more

Finding similarities between AML and IT Access (Account) Management

AML and Systems Access Control, they both are not linked in anyway, neither they share any close proximity. When slicing them into smaller chunks, it begins to show some insights...

read more

A year in review – 3.1 billion records leaked!

According to Lewis Morgan, a resident bloggers from IT Governance recently compiled a terrifying year’s end list of cyber attacks & data breaches. It comes to a shocking figure that 2016’s tops the last figure of 480 million from 2015 at 3.1 billion! What’s to come for 2017? The Calculation now runs at a total of 3,154,135,541 leaked records. The final number is bound to increase ... 

read more

Is there a need of GRC- Governance, Risk and Compliance for Small and Medium Enterprises, without suffering a heavy cost or discontinuity?

After a 3 hours meeting with senior folks from various organizations of different sectors, came to learn deeper about their difficulties in onboarding governance, risk and compliance.

read more

Third Party Risk Management, is this a pain only today to the enterprises?

Continue from previous post, the topic on Third Party risk came into the limelight. We begin to heavily leverage third party to do what we don’t specialize in, or not our business focus... 

read more