- Chief Compliance Officer and VP of Legal Affairs, Arrow Electronics
Provided by OCEG2017-02-08T10:30:00
Managing the process of verifying, remediating where necessary and monitoring the effectiveness of third party controls demands the use of sophisticated and mission-designed technology. In this Illustration, we define the key steps of the process and identify what the future holds for third party information security management.
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2018-12-13T11:45:00Z By Michael Rasmussen
This latest installment of the CW/OCEG GRC Illustrated Series provides readers with details on how to implement a strategic approach to operational risk strategy coupled with an integrated information and technology architecture.
2018-09-25T11:15:00Z By Carole Switzer
Title: OCEG: Hidden ownershipThis latest installment of the Compliance Week/OCEG GRC Illustrated series explores how fraudsters are using high-end real estate to launder money.
2018-06-04T16:00:00Z By Joe Mont
There are plenty of technological solutions to consider as part of a modern compliance program. The data you collect, however, and implementation strategies, are just as important as the tools you choose.
Site powered by Webvision Cloud