Vendor Management process

How to Design a Vendor Management Process

Whether you’re a small business or a global enterprise, over the last decade or so outsourcing business functions to third-party vendors has become essential to your business operations. Vendors are used in ...
Security Boulevard
Larry Bianculli

Pen Test vs. Vulnerability Assessment: Which is Right for my Organization?

The post Pen Test vs. Vulnerability Assessment: Which is Right for my Organization? appeared first on CCSI ...

Banking – Building trust in an age of disruption

Digital disruption has long made its presence felt in the retail banking sector. A series of challenger brands have launched in recent years, building innovative and intuitive digital interfaces from the ground ...

So your third party has been breached…

Another day, another third party security compromise story… this time it is Indian outsourcing giant Wipro. The firm has confirmed ...
Cyber risk management: safeguarding your organisation

Cyber risk management: safeguarding your organisation

What is cyber risk management? Cyber risk is the identification, analysis and evaluation of cyber risks. It understands and analyses the IT infrastructure, identifies the potential vulnerabilities within different systems, then prioritises ...
ERM State of Cybersecurity and Risk

ERM: Understanding the State of Cybersecurity and Risk

“What’s the role of cybersecurity?” That might seem like an obvious question. But, in the context of where cybersecurity fits in the enterprise risk equation, the answer is anything but obvious. In ...
Security Boulevard

Every organisation is affected by cyber risk!

Organisations that believe they can ignore cyber risk management and the benefits it offers will probably lose out as others adopt more efficient, more economical, less human-resource-intensive solutions. For effective cyber risk ...
M&A cyber diligence, talent shortages, and the challenges facing CISOs [Podcast]

M&A cyber diligence, talent shortages, and the challenges facing CISOs [Podcast]

| | CISO, risk
Enterprises are often forced to implement multiple moving parts as the traditional network perimeter is no longer sufficient to protect against modern threats. These disjointed security solutions rarely talk to each other, ...

The importance of information security

For many organisations, information is their most important asset, so protecting it is crucial. Information security is “the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of ...
Loading...