Provided by
CyberGRX2021-02-10T10:25:00
The problems of third-party cyber risk are growing and evolving as we speak. This guide will help you understand your choices and needs even before your organization cracked the seal on third-party cyber risk management.
Our white papers are prepared by our sponsors and are free to view.
You need to register for this site and agree to the sponsor’s conditions to be granted access.
2025-12-24T18:55:00Z By Michael K. Atkinson and Caroline E. Brown, CW guest columnists
Since Inauguration Day on Jan. 20, 2025, the Trump Administration has made it a priority to expand the list of designated Foreign Terrorist Organizations.
2025-12-16T14:00:00Z Provided by Workiva
Join experts from KPMG, Cisco, and Workiva as they explore how audit, accounting, and finance professionals can leverage a technology mix of data analytics, gen AI, and other tools to ramp up efficiency and strengthen control effectiveness.
2025-12-15T18:04:00Z By Ruth Prickett
European banks and financial institutions must prepare now for stringent new rules on third-party suppliers.
2025-11-11T19:24:00Z Provided by Sayari
This report quantifies, analyzes, and visualizes the impact of typological regulations on compliance so that teams can more efficiently and effectively protect against non-obvious sources of regulatory risk.
2024-11-06T17:05:00Z Provided by ServiceNow
The individual requirements for your security and risk operations are increasingly complex—and interconnected. Yet despite this increased interconnectivity, many organizations still manage their security operations (SecOps) and integrated risk management (IRM) functions in silos.
2024-08-07T05:54:00Z Provided by Theta Lake
The message from the regulators is clear - having an off-channel policy for mobile communications is not good enough.
Site powered by Webvision Cloud