Oct 09, 2024 Beyond Reactive Methods: Leveraging AI for Comprehensive Email Risk Monitoring By Amit Jaju Introduction In today’s fast-paced digital landscape, organizations face a wide array of risks, including Financial Risk, Operational...
Nov 15, 2021 Lessons Learned from Implementing Privacy Rights Request Processes – Part 2 By Mir Ali This article is the second in a multi-part series covering concepts that can be applied to your company’s process for managing privacy...
Oct 29, 2021 Developing a Defensible Disposition Process By Colleen Yushchak Starting in January of 2023, businesses subject to California Privacy Rights Act (CPRA) may be required to publish the retention periods...
Jul 28, 2021 SPAC-ON: Safety First.... By Elliot Fuhr SPAC doesn't really have to be a four-lettered word..it just happens to be that way. There are a number of preventative measures and...
Apr 27, 2021 Automate Finance: Reduce Risk, Improve Controls By Elliot Fuhr If it's not broken, don't fix it. Sounds like a wise adage from the past. What if you don't know something is broken? That is why we do...
Apr 08, 2021 Why organizations need an effective Identity and Access Management strategy now more then ever By Robert Olsen Developing, implementing and effectively administering an Identity and Access Management (IAM) architecture is a dauting task for most...
Apr 05, 2021 What's Wrong with Today's Security Awareness Training? By Robert Olsen Employees continue to be the weak link in building and operating effective cybersecurity programs. Organizations need to take unique...