Information security, cyber security and the latest iteration, external data security are critical to the health and viability of any organization. Companies of all sizes and types routinely invest significant… Continue reading External Data Privacy Metrics and KPIs – A How to Guide for Strong Compliance
role: Procurement
Cyber Security Isn’t Enough – The Information Security Ecosystem Dies Without External Data Privacy
There’s an old joke among economists that goes, “Ask three economists about the state of the economy and you’ll get five answers.” Though it’s not a laughing matter, the same… Continue reading Cyber Security Isn’t Enough – The Information Security Ecosystem Dies Without External Data Privacy
The Shortcomings of Third-Party Risk Management and How to Get it Right for Your Organization
Data breaches targeting third-party vendor relationships are on the rise. Especially those leveraging phishing and other social engineering methods. This fact reveals a weakness in most organizations’ cyber security regimens. … Continue reading The Shortcomings of Third-Party Risk Management and How to Get it Right for Your Organization
Supply Chain Attacks are On the Rise – A Primer on Supply Chain Privacy Risk
Supply chain privacy risk presents a new attack surface for organizations with complex supply chains. Cyber criminals, hackers and other threat actors play an ongoing game of cat and mouse… Continue reading Supply Chain Attacks are On the Rise – A Primer on Supply Chain Privacy Risk
Industrial & Corporate Espionage – New Variants of an Old Problem and How to Protect Your IP
Industrial and corporate espionage is not a new problem. Theft of intellectual property by corporate competitors and hostile foreign governments has gone on for centuries. However, the methodologies have advanced… Continue reading Industrial & Corporate Espionage – New Variants of an Old Problem and How to Protect Your IP
Guide to Complying with Looming Procurement Requirements for Privacy Risk
Getting Ahead of the Next Critical Privacy Risk Requirement for Winning Lucrative Business Contracts Competition has always been stiff to win lucrative contracts. Especially with large corporate entities, businesses, private… Continue reading Guide to Complying with Looming Procurement Requirements for Privacy Risk
Optimizing Vendor Risk Management with External Data Privacy
Executive Takeaways Organizations are increasingly reliant on third-party vendors to supplement or complement operations. This increasing reliance expands organizational threat surfaces, as vendors require access to sensitive employee and customer… Continue reading Optimizing Vendor Risk Management with External Data Privacy