This post is brought to you by Xerox. With Xerox driving your non-core business processes, you are free to focus on what matters most. You are ready for real business. As always, VentureBeat is ...
Risk remediation and identification is one of those concentrations within cybersecurity that tends to create some anxiety among cybersecurity professionals—it is hard to explain to someone not in the ...
MSIT Adjunct Professor Tina Hauri talks about how COVID-19 has impacted the IT field and how Chief Information Security Officers and businesses have had to adapt. Adjunct Professor Tina Hauri teaches ...
Recently, NAVEX hosted a webinar featuring Carol Williams, CEO and principal consultant at Strategic Decision Solutions where she discussed best practices on how to assess and mature third-party and ...
Third-Party Risk Management (TPRM) has advanced from being an annual checklist exercise to a critical daily function. In this post, we define TPRM, reveal program drivers, and discuss the value of ...
The authors of the new Cyber Risk Management Program framework explain how it can set an organization up to better comply with SEC and other disclosure and reporting regulations. In a landmark ...
As organizations continually increase their dependence on information technology (IT) systems to conduct business, mitigating IT risk has become a top priority. But effectively managing IT risk is no ...
CTEM helps government IT teams shift from vulnerability management to continuous, risk-based exposure reduction aligned with ...
Forbes contributors publish independent expert analyses and insights. I cover logistics and supply chain management. If I was asked to vote for the most interesting solution set that has come to the ...