Management, compliance & auditing

Information security manager roles and responsibilities

After several years of job progression through an organization’s IT and information security chain of command, many will land many at the doorstep of what

Best practices for conducting a risk-based internal audit

Over the last few years, cyber-crimes have grown in number and in the ways cybercriminals exploit them. Due to this, the need to manage risks has been recogn

Top 5 Best Practices for Third-Party Security

Introduction With the digital transformation of our communication systems and the development of cloud and edge computing, the enterprise perimeter is fuzzie

What Are the Benefits of C-TPAT in 2018?

Introduction The need to maintain safe and secure logistics and supply chain channels is receiving a lot of importance and attention worldwide. Once such leg

What Does It Mean to Be DFARS-Compliant in 2018?

Introduction In the cyber-threat landscape of today, the hacker is out to get all sorts of information and data and to exploit it for malicious purposes. For

What a security auditor needs to know about privacy compliance

Constant changes in the regulatory environment are putting more pressure on organizations to get data security and privacy right. Some regulations require au

What Your Compliance Officer Should Know About Privacy

As the prevalence of digital technologies grows, compliance becomes a more vital part of how organizations do business. Compliance has become a relevant conc

Missed GDPR Deadline? 6 Steps You Need to Take Right Now

Despite the recent mad dash to comply with European Union’s General Data Protection Regulation (GDPR), many organizations missed the May 25 deadline. We all

What Your Data Protection Officer Should Know About Privacy Requirements

Data privacy suddenly got hot a few years ago when Edward Snowden made his revelations about the NSA snooping on U.S. citizens’ data. Since then, data privac

What Should a Security Manager Know About US and UK Privacy Laws?

George Bernard Shaw once said that the U.K. and U.S. were “two nations divided by a common language.” You can say a similar thing about security managers.  S