No items have been added to your cart yet
IT risk can have enterprisewide impact, making it crucial to integrate risk management across business units.
There is no question that data risk equates to enterprise risk.
Effective IT security management system design must start with top management and include the entire perimeter of the supply chain, with special attention paid to ensuring compliance with all relevant laws.
The inclusion of the governance domain was arguably the most notable addition to the NIST CSF 2.0.
An agency theory approach allows enterprises to have open dialogues and make informed cyberrisk management decisions.
Credit line management presents unique complexities for auditors.
Third-party risk is an evolving problem characterized by steadily increasing complexities.
When it came time to upgrade their FMS, ISACA teams had to be carefully coordinated.
Whether it is a theft of data or an attack that renders systems inaccessible, cyberattacks are downright bad.
Once trust is lost, business is often lost as well. Therefore, organizations must look closely at digital trust.
All risk is not the same. Industry dynamics, enterprise culture, and department risk tolerance all have enterprise impact.
Enterprises are growing more concerned that they might be attacked via their supply chain.
Managing cyberrisk using GRC technologies can help align IT activities with business goals.
Given the sensitive nature of information stored on mobile devices, the consequences of a breach can be severe.
Cybersecurity strategies must be based on the assumption that humans will continue to make mistakes.