10/9/2024 5:37:35 PM Beyond Reactive Methods: Leveraging AI for Comprehensive Email Risk Monitoring By Amit Jaju Introduction In today’s fast-paced digital landscape, organizations face a wide array of risks, including Financial Risk, Operational...
11/15/2021 2:00:00 PM Lessons Learned from Implementing Privacy Rights Request Processes – Part 2 By Mir Ali This article is the second in a multi-part series covering concepts that can be applied to your company’s process for managing privacy...
10/29/2021 3:29:41 PM Developing a Defensible Disposition Process By Colleen Yushchak Starting in January of 2023, businesses subject to California Privacy Rights Act (CPRA) may be required to publish the retention periods...
7/28/2021 12:44:48 PM SPAC-ON: Safety First.... By Elliot Fuhr SPAC doesn't really have to be a four-lettered word..it just happens to be that way. There are a number of preventative measures and...
4/27/2021 7:50:28 PM Automate Finance: Reduce Risk, Improve Controls By Elliot Fuhr If it's not broken, don't fix it. Sounds like a wise adage from the past. What if you don't know something is broken? That is why we do...
4/8/2021 8:55:43 PM Why organizations need an effective Identity and Access Management strategy now more then ever By Robert Olsen Developing, implementing and effectively administering an Identity and Access Management (IAM) architecture is a dauting task for most...
4/5/2021 3:30:06 PM What's Wrong with Today's Security Awareness Training? By Robert Olsen Employees continue to be the weak link in building and operating effective cybersecurity programs. Organizations need to take unique...