GRC is a vital but complex component of business operations for many organizations. IDC’s study shows that organizations can reduce their organizational risk while achieving significant value in terms of GRC operational efficiencies with RSA Archer.
This whitepaper gives deeper insight into how RSA’s vision of a Business Risk Management platform takes GRC capabilities into the next generation with the ability to translate any risk into actionable intelligence to improve business decisions.
The countdown has started. The European Union’s General Data Protection Regulation goes into effect in less than a year. Even if your company does not do business internationally, you might well have to adjust your GRC policies and procedures to comply with GDPR, since your business partners probably will be GDPR-compliant.
For the third consecutive year, Gartner® placed Dell Technologies (RSA) in the LEADERS quadrant of the 2016 Magic Quadrant for Operational Risk Management Solutions.
This Forrester Research report explains how to use performance management to help improve your risk and compliance functions, while aligning them to business strategy and overall goals.
Organizations need to understand their cyber risk in business terms so they can make informed decisions regarding the type and amount of cyber risk they should take on. View the ebook to calculate your risk appetite.
This Forrester Research report describes how to use your information security management system (ISMS) to drive risk ownership, continual improvement, and deep business engagement.
Recent changes in the PCI DSS regulation (v3.0, v3.1, and v3.2) provide a set of suggested best practices and methodologies that make it possible to comply with PCI on an ongoing basis.
WhiteHat Sentinel™ is a software-as-a-service platform that enables your business to quickly deploy a scalable application security program across the entire software development lifecycle (SDLC). By combining our scalable application scanning platform with the world’s largest threat research team, we identify where you are vulnerable with near zero false positives.
To fully appreciate the current state of strategic risk management and where it is headed, one must have an understanding of its journey. We outline that for you below from the viewpoint of managing supply chain risk.
As third party and vendor ecosystems continue to grow and expand, managing risk effectively becomes both a complex challenge and a critical necessity in today’s highly connected business environment. Below are are three ways that companies can begin to better manage and reduce third-party risks.
A Risk Management Information System (RMIS) is an essential component of the overall work platform for risk management functions within both mid-size and large organizations. Risk managers who are most adept at using the RMIS, along with a comprehensive work platform, not only achieve process efficiencies, but also are able to lower their Total Cost of Risk (TCOR) and provide better reporting to senior management.
This document introduces a unique approach from HPE SecureData that combines data encryption and masking technology in one, which can vastly simplify data privacy, while mitigating data leakage at a fraction of the cost of prior approaches. One fundamental technology is HPE Format-Preserving Encryption (FPE), which for the first time, allows encryption ‘in place’ in databases and applications, without significant IT impact. Another technology is tokenization, which replaces data with random tokens, and which can also preserve data formats. These technologies are integrated with masking techniques on the HPE SecureData Platform, allowing projects that once lasted months or years to complete in days to weeks.