Digital Transformation: New Security Challenges & Renewed Call for Governance

Despite increased investment in security, the number of large-scale breaches continues to grow. PWC?s Paul O?Rourke weighs in on what organizations need to do to address the challenge of digital risk ...

A Theoretical Riskicist?s Guide to the Universe

Risk has so many variables it is really overwhelming to investigate the future and predict how risk management will transform. When thinking about the future of risk management, it must be approached ...

A Theoretical Riskicist’s Guide to the Universe

Risk has so many variables it is really overwhelming to investigate the future and predict how risk management will transform. When thinking about the future of risk management, it must be approached ...
Leave the Stone Age (and Spreadsheet) Behind

Leave the Stone Age (and Spreadsheet) Behind

People have been using spreadsheets for all sorts of applications, regardless of whether they were appropriate or not. Including using them for risk management. At the RSA Archer Summit 2018 this week, ...

Identity & Access Managements, GRC, SIEM: Tackling Identity Risk as One

Managing identity risk starts with a strong identity and access management system?but it doesn?t end there. Truly effective identity risk management requires identity and access management, GRC and SIEM systems all working ...

Identity & Access Management, GRC, SIEM: Tackling Identity Risk as One

Managing identity risk starts with a strong identity and access management system?but it doesn?t end there. Truly effective identity risk management requires identity and access management, GRC and SIEM systems all working ...

Yanny or Laurel? Integrated Risk Management or GRC?

The debate rages on ? Yanny or Laurel? Which do you hear? This isn?t the only dispute blistering across media. While not featured on Ellen or The Today Show, risk management has ...

Technology for GDPR Compliance: Turning Plans into Action

There?s nothing as important to GDPR compliance as careful strategic planning and following a risk-based approach?except the technology that?s essential to turn plans into action. Here?s a look at the role played ...

The Role of Identity in GDPR Compliance

When people think of GDPR, they often think of the fines they may face for failing to put proper safeguards in place. In the rush to encrypt data and prepare for breaches, ...

Hey RSA Archer Summit fans ? Pre-Summit Training Course(s) are Discounted!

RSA Archer Summit and RSA University team up to offer pre-conference training opportunities. From the fundamentals to advanced workflow and navigation, the courses will increase your abilities using the RSA Archer® platform?and ...
Loading...