All articles by GRC World Forums – Page 10
-
VideoThird-Party Risk Management: Best Practices for Vetting and Monitoring Vendors
Video: Third-Party Risk Management- Best Practices for Vetting and Monitoring Vendors
-
VideoWhat is a B Corp, and Why Do B Corps Matter?
B Corp Certification is an increasingly important way to demonstrate your organisation’s commitment to environmental, social and ethical goals.
-
WebinarVendor Due Diligence: Best Practices for Scoping Assessments
With more and more vendors to onboard and monitor post-contract, third-party risk teams can struggleto keep up with the assessment workload. Ultimately, many organizations are asking too manyunnecessary questions or not enough necessary questions.
-
WebinarCybersecurity Threats: Know The Risks Your Third Parties Pose to Your Business and How to Defend Against Them
In 2021 alone there was a 62% global attack spike in ransomware, and it was made clear that the cyber threats are becoming not just more common, but also more sophisticated.
-
WebinarAfter the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
After the attack: Mitigating Organisational Impact of a Data Breach?
-
VideoThe GRC Red Flag Series: G(P)RC - How GRC Drives Performance in Banking & Finance
Access the on-demand video for The GRC Red Flag Series with Michael Rasmussen: G(P)RC - How GRC Drives Performance in Banking & Finance
-
WebinarUK Data Protection Index Panel
The UK Data Protection Index is produced by Data Protection World Forum and The DPO Centre.
-
WebinarInvestigative screening: How adverse media and other external data sources can be combined to make fast and effective risk decisions
Recent events have encouraged financial institutions and their regulators to pay closer attention to the role of adverse media (also known as negative news) screening in AFC risk management. But adverse media screening alone is not a panacea, and there are a range of other external data sources that can be leveraged to improve the process of alert resolution.
-
WebinarConducting Investigations in a Zero-Trust Environment
Every day, organisations are faced with insider and outsider threats. Because of that, the Zero-Trust security approach is quickly becoming the standard for both corporations and Government agencies.
-
WebinarData: New Asset or New Liability?
While corporate data has the potential to improve revenue, reduce expenses and mitigate risk, citizens around the world are demanding more protection for their personal information.
-
WebinarFreedom to Focus: Securely empowered employees, protected businesses
Did you know that 83% of IT leaders believe that smart technology plays a key role in empowering employees to act securely?
-
-
ebookAnjuna: Protect Your Data Even If You Are Breached
Anjuna confidential computing software enables secure enclaves to secure data hardware-level encryption for end-to-end data protection.
-
WebinarSolving Data Mapping with a no-code and automated approach to keep up with ever-increasing data sources and SAAS
Data volumes are increasing exponentially, and companies need seamless and trustworthy technology that will enable them to keep track of their data sources and know what PII is there.
-
WebinarData: New Gold or New Liability?
While corporate data has the potential to improve revenue, reduce expenses and mitigate risk, citizens around the world are demanding more protection for their personal information.
-
-
NewsFinCrime World Forum @ #RISK
#RISK – Europe’s Leading Risk-Focused Expo: November 16 & 17, ExCeL, London
-
NewsESG World Forum @ #RISK
#RISK – Europe’s Leading Risk-Focused Expo: November 16 & 17, ExCeL, London
-
-
NewsCyber Security Hub @ #RISK
#RISK – Europe’s Leading Risk-Focused Expo: November 16 & 17, ExCeL, London


