Category: Information Security Compliance

Top 5 Predictions for InfoSec GRC in 2020

Written by
Published 01/08/2020

January 1 ushers in a new year, a new decade, and new challenges—as well as new dimensions and re-ordering of existing challenges.  Reciprocity’s Team of GRC Experts share likely developments, trends to watch out for, and how your organization can navigate Information Security Risk, & Compliance in 2020.  With foresight, an organization can proactively take steps to address the challenges of the future. Our expert panel explores what’s coming: 1. Risk-based, Layered Approaches Eclipse One-dimensional Efforts “Risk Management and Risk Assurance will overshadow other approaches to GRC as organizations satisfy operational needs”  – Gerard Scheitlin, Founder of RISQ Management “While the requirements on information security, privacy, and compliance will only continue to expand and tighten, organizations are realizing that it…

Cybersecurity Audit Checklist

Written by
Published 12/19/2019

Today’s network and data security environments are complex and diverse. There are hundreds of pieces to a security system and all of those pieces need to be looked at individually and as a whole to make sure they are not only working properly for your organization, but also safe and not posing a security threat to your company and your data or the data of your customers. Risk management and risk assessments are important parts of this process. Data loss and data breaches are detrimental to your organization and can make or break a company, especially if a breach causes other organizations to lose confidence in your ability to keep yours and their data secure. For this reason, it is absolutely critical for you to…

ZenGage #AMA Series with Dr. Maxine Henry on the CCPA

Written by
Published 08/16/2019

ZenGage, the new Slack community for information security and GRC professionals, recently hosted CCPA expert Dr. Maxine Henry, in its first #AMA (Ask Me Anything) live Slack chat series. The nation’s most stringent data protection law (so far), the California Consumer Privacy Act of 2018 takes effect Jan. 1, 2020— and it’s generating a lot of buzz. Businesses from coast to coast are girding themselves for sweeping changes in how they collect, share, and protect California residents’ personal information. With the deadline for compliance right around the corner, GRC professionals have a lot of work to do.   In this candid discussion, Dr. Henry answers a broad range of questions, starting with the rights that the CCPA grants to California residents,…

How to Manage Technological Risks?

Written by
Published 06/10/2019

In all sectors, technology has become a vital aspect of operations and has transformed the workplace, but that dependence on technologies also poses a threat to organizational wellbeing. Data breaches, system failures, malicious attacks–as well as natural disasters that impact technologies–can wreak havoc on company reputations, regulatory compliance and fiscal health. In some cases, the damage from these events is irreversible or long-term. A proactive strategy to mitigate tech risks are foundational aspects of operations. Your company needs such a plan that prevents, responds and continuously monitors for these risks. Monitoring and Managing Risks in Technology The adage, “An ounce of prevention is worth a pound of cure,” is entirely applicable to monitoring and managing tech risks. A whole-organization system…