Our Thoughts On

Sort by

Categories
Authors

Risk Advisory/Internal Audit

Articles 121 - 130 of 161

The Second Line of Defense: An Overview

Risk management in any organization can be complex and difficult. Many companies address the complexity by adding layers of audit and governance, and when

Cybersecurity for Car Dealers: Indifference Is Not a Strategy

With cyber-attacks on the rise, it is hard to go a day without hearing or reading about a massive breach or incident. What the news outlets don’t

Do You Have a DPO? You May Need One Soon

May 25, 2018, is a date with significant meaning if you’re a company that operates within the European Union or processes data that identifies EU

My Client/Prospective Client Just Asked for a SOC Report. Now What Do I Do?

Does anxiety and panic set in when a client or prospect asks if you have a Systems and Organization Controls (SOC) report? Could you be in jeopardy of
Register to receive our weekly newsletter with our most recent columns and insights.

NIST Releases Final Draft Publication to Assist in Assessing Compliance with NIST SP 800-171

Background As of December 31, 2017, all Department of Defense (DoD) contractors that process, store or transmit Controlled Unclassified Information (CUI)

GDPR: Common Myths and Truths Revealed

The General Data Protection Regulation (GDPR) has been a hot topic of conversation since being adopted in April 2016. The new regulation changes how companies

Passphrases and Other Password Protection Strategies

Building a reputation for sound data privacy and robust security is challenging for many organizations in this digital age, especially those in the financial

Late To Comply with GDPR? Here Are Three Steps to Take Right Now.

Background The European Union’s (EU) General Data Protection Regulation (GDPR) goes into effect on May 25, 2018. The regulation is specific to the
Register to receive our weekly newsletter with our most recent columns and insights.

Proposed Revision of Criteria for a Description of a Service Organization's System in a SOC 2 Report

The system description of an SOC 2 report is the area in which the service organization details the system that is being assessed and the risks that are

Equifax Data Breach - How to Protect Your Organization and its Sensitive Data

Last week, credit reporting bureau Equifax reported that personal data belonging to approximately 143 million U.S. consumers was compromised in a massive
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×