REGISTER

White Papers

RiskVision

The Essential Building Blocks for Cyber Security

Best Practices in Building an Effective Cyber Defense Strategy.

RiskVision

Blue Hill Research Benchmark Report: Agiliance RiskVision Implementation Experiences

Blue Hill analyzed 25 GRC deployments in order to identify decisions and practices that helped organizations to minimize the time and cost required in implementation. This analysis includes a profile of Agiliance RiskVision implementation experiences from four organizations to provide a model to benchmark and compare RiskVision implementation experiences with larger GRC market trends.

BAH_Cyber_Solutions

At Booz Allen Hamilton, we understand the challenge and know how to solve it. We are proven experts who partner with clients to turn security into a competitive advantage.

Rsam

It's no news to CISOs, Chief Compliance Officers, Procurement Officers, GCs, and other key stakeholders in vendor management programs that third parties today represent one of the greatest risks to organizations, nor is it news that that the focus on vendor risk management is only increasing as regulators across a broad spectrum of industries and geographies continue to tout the importance of 1) managing risk throughout the vendor lifecycle, and 2) taking a risk-based approach to focusing due diligence efforts on those business partners who represent the most risk.

MetricStream

Authored by Vibhav Agarwal, Senior Manager of Product Marketing, MetricStream and Dr. Michael Redmond, FBCI, MBCP, CEM, PMP, MBA, PHD, CEO and Lead Consultant Redmond Worldwide.

BAH_CyberM3

In today's world of connected threats, cybersecurity is a market differentiator and key business enabler. Leaders must now address increased responsibility amid quickly evolving, enterprise-wide challenges.

Rsam

A leading Fortune 50 Health Care organization manages their comprehensive large-scale supplier assessment program with Rsam; harmonizing data points from 18 risk & stakeholder organizations to optimize the full supplier lifecycle.

RSA_Op_Risk_Handbook

A Guide to Harness Risk with Enterprise GRC.

BAH_Cyber_Fusion

Organizations attempting to respond to this complex environment often face or create additional challenges due to poor people, process, and technology decisions. Separations in both organizational boundaries, SOC shift structures, and integration and automation of processes inhibit collaboration and prevent rapid containment and resolution of cyber events.

Booz Allen Hamilton

Companies often find themselves struggling to comply with increased third party risk management program regulations because of the difficulties in obtaining timely and insightful information and the complexity of consistently translating that information into risk decisions aligned with corporate risk appetite. But with a simplified approach to compliance—one that includes narrowing focus, enabling lifecycle management, and leveraging technology and analytics—third party risk management can be an integrated function of your business, and not just a cost of compliance. In this Business Insight, Drew Wilkinson discusses the important issues about third party risk management.

RSA_Cyber_Sec_Index

Welcome to RSA's inaugural Cybersecurity Poverty Index™. Click below to download.

Rsam

Success in today's dynamic business environment requires organizations to manage and comply with policies, standards, and controls. This is true across the business, but is particularly true in the context of IT governance, risk management, and compliance (IT GRC).

Booz Allen Hamilton

The correlation between data breaches and third party service providers has demonstrated the importance of securing your entire enterprise. Unforeseen risk vectors from third parties can have damaging results, and they become exponentially more threatening as networks continue to integrate and entities have access to networks, terminals, and servers. Third parties are the number one security risk to financial services firms in 2015.

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top