Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

Network Security Audit Checklist

Every company that uses computers and the Internet should be concerned about information security and particularly, network security. The number of threats each company faces is growing every day. Whether it’s SPAM, malware, spyware, phishing or virus threats or users who walk out the door with proprietary information or sensitive data, the threat and risks are potentially damaging and costly for that company.

Featured Post

The ISO 9000 Family As It Relates To Operations

In a world where customers gravitate towards the best products and services, upholding high levels of quality as a business is a no-brainer. Being quality-centric in all your business processes ensures you can steer away from common errors. It can also improve your overall productivity as well as improve your customer retention rates. While there are various standards you can follow to improve the quality of your daily operations, the ISO 9000 standard remains to be one of the best. Even better, it is recognized globally, which could make it easier to do business the world over. The ISO 9000 family consists of five standards.

How to Comply with the Sarbanes-Oxley (SOX) Act

Compliance with the Sarbanes-Oxley Act of 2002 is a legally mandated must for all U.S. public companies and some other entities, as well. But meeting the requirements of this important law can be incredibly difficult. Preparing for a SOX compliance audit requires so much work that companies often designate entire teams full-time to the task. The law is that complex.

Quantitative Risk Analysis: Annual Loss Expectancy

Risk assessment is an essential component of risk management. It enables you to determine potential hazards that may negatively affect specific projects or result from certain decisions. This article explains how to calculate your cybersecurity risk using the concept of annual loss expectancy: There are two types of risk analysis — quantitative and qualitative: Both forms of risk analysis are valuable tools in risk management.

What are the COSO Control Objectives?

The Committee of Sponsoring Organizations of the Treadway Commission (COSO) framework goes back to the year 1992. The industry was looking for an internal control framework, and the COSO Internal Control Framework was the answer. There are three COSO compliance disciplines, five internal control components, and 17 principles focused on internal controls.

A Cyber Insurer's Perspective on Today's Security Risk Landscape

We interviewed Liz Limjuco, SVP of U.S. Cyber Brokerage at Marsh, to talk about what risk trends she is seeing in cybersecurity, what organizations are doing to adapt to those trends, how organizations can better understand their risks, and what they can do to help mitigate those risks.

6 Benefits of Internal Auditing

If you want confidence that your organization is meeting its core business goals, you need internal audits. If you want to save your organization time and money and keep everything running like a well-oiled machine, internal audits will help you get there. If you want to protect your enterprise against fraud and prevent fraudulent practices, internal audits are key.

PCI Audit Interview Questions

The Payment Card Industry Data Security Standards (PCI DSS) defines the framework for protecting cardholder data. The framework was developed by the Payment Card Industry Security Standards Council (PCI SSC) and enables organizations to assess how well they are protecting cardholder data, training staff, and conducting PCI DSS audits. PCI compliance and accepting credit cards go hand in hand.

ISO 27001 Requirements Checklist: Steps and Tips for Implementation

ISO 27001 enables organizations of any size to manage the security of assets such as employee information, financial information, intellectual property, employee details, and third-party information. ISO 27001 is primarily known for providing requirements for an information security management system (ISMS) and is part of a much larger set of information security standards. An ISMS is a standards-based approach to managing sensitive information to make sure it stays secure.