Articles Related to risk strategy

Data Privacy Week: Organizations see strong ROI on privacy spending, says Cisco

A roundup of commentary from experts on how organizations should treat data privacy

7 steps to undertaking a Privacy Impact Assessment

PIA regulatory requirements and recommended frameworks may vary by jurisdiction, industry, and the type and sensitivity of data processed. Despite these differences, the following seven steps should be incorporated into any PIA program.

5 Ways Your Vendor Risk Management Program Leaves You In The Dark

It’s time to start exploring new tools for accomplishing old tasks. Tools like vendor risk questionnaires are insufficient, and they won’t shed light on...

Stay on op - Ge the daily news in your inbox