Resource
Building Better Vendor Risk Assessments
Download this informative white paper, Building Better Assessments, and you will learn how organizations like yours can improve third-party risk assessments while balancing regulatory pressures, business requirements and budget constraints.
The OCEG GRC Illustrated Series: The Transformative Power of Cognitive GRC
OCEG, with contributions from IBM, has developed an illustration that shows you how to gain insights, develop meaningful reports and move faster from data to decisions with cognitive GRC capabilities.
The Great Accounting Challenge: KPMG’s 2016 Accounting Change Survey
Title: 2016 Accounting Change SurveyKPMG recently surveyed over 140 companies across a wide range of industries to understand how accounting executives are responding to the challenge of implementing the new revenue recognition and leases accounting rules from the Financial Accounting Standards Board (FASB).>
Third-Party Assurance Optimization: Value Creation Strategies for Service Providers
Download this white paper to get a better understanding of how optimizing TPA reporting can move an OSP from merely protecting value to actually creating it.
The OCEG GRC Illustrated Series: The Journey to Advantaged GRC
As an organization matures its approach to GRC, it transitions from a structure of siloed departments and units to a fully engaged business operation. In a mature state, everyone has a part in managing risk, ensuring compliance, and contributing to performance outcomes. This leads to greater confidence, agility, and resilience–advantages that ensure success.
FCPA Due Diligence and Data Privacy Laws in BRIC Countries
Download the e-Book, “ LEGALLY OBTAINABLE DATA IN BRIC COUNTRIES” now to learn how companies can avoid misuse of personal data and conduct due diligence within the legal scope of data privacy laws.
How technology transforms third-party risk management
Read this practical guide that outlines the four key TPRM processes to adopt, and how a Lean Digital approach successfully embeds digital technologies through design thinking methods and Lean principles.
Managing the Insider Threat with Active Directory Security
Explore how the typical insider threat unfolds, and how implementing security best practices can minimize these threats. Read the white paper.
