Reciprocity

Jan 29, 2019
2009
San Francisco, CA, USA
Feb 14, 2019   |  By Reciprocity Labs
Agile first began in the world of software development. It was used to break down larger complex projects into more manageable chunks. As a result, Agile focused on prioritizing tasks, identifying value, and achieving continuous improvement. Companies that can harness an Agile framework can significantly reduce production times and risk while improving the quality of their products.
Feb 14, 2019   |  By Karen Walsh
Insurance companies know how to insure their clients’ homes, cars, and businesses, but they may find it difficult to ensure that the information they collect remains secure. While the insurance industry focuses on risk-based analyses for premiums, it needs to focus internally and use those same risk management processes for securing customer information.
Feb 12, 2019   |  By Karen Walsh
Supervisory Control Data Acquisition Systems (SCADA) communicate with industrial control systems (ICS) to provide manufacturers monitoring and analysis in real-time. However, the SCADA systems, established initially in the 1960s, cannot keep pace with the speed at which cybercriminals evolve their threat methodologies. Understanding risk assessment in the manufacturing industry means recognizing the concerns specific to these technologies.
Feb 7, 2019   |  By Karen Walsh
Developing software while maintaining its embedded security can feel like the “Impossible Dream.” As you update your product, you’re potentially adding new vulnerabilities. As part of the risk management process in software engineering, you need to work with cybersecurity professionals throughout the software development life cycle (SDLC) to create a mature security profile.
Feb 5, 2019   |  By Karen Walsh
If you ever purchased a “one-size-fits-all” item of clothing, you know that it’s never really going to fit everyone. Some people are too shirt and others too tall. Most cybersecurity standards and regulatory requirements recognize the same limitations apply to cybersecurity. Multinational corporations have different needs when compared to small and mid-sized organizations. Often, starting the risk assessment process is more difficult than engaging in the overarching risk management process.
Jan 29, 2019   |  By Reciprocity Labs
Get best practices for purchasing and implementing a GRC software tool and get tips on how to leverage your tool for ongoing success.
Jan 29, 2019   |  By Reciprocity Labs
In an increasingly litigious society, you need technology that allows you to create business strategies based on these risks so that you protect your organization from the mistakes others make.
Jan 1, 2019   |  By Reciprocity Labs
This paper explores several dimensions of Vendor Risk Management. First, why are vendor risks proliferating—why now, and where do they come from? Second, what steps are necessary to manage vendor risks? And third, how can CISOs and compliance officers implement those steps in a practical way, so you don’t spend all your time chasing vendors with risk management protocols?
Jan 1, 2019   |  By Reciprocity Labs
Learn how to scope PCI-DSS requirements for your business.
Dec 1, 2018   |  By Reciprocity Labs
When companies first determine they need a formal compliance program, many are unclear if they need a compliance tool to manage it. Many companies turn to Microsoft Excel as the compliance tool of choice when first undertaking a GRC program. This eBook covers where Excel makes sense and how to know when your program has outgrown Excel.
Aug 24, 2016   |  By Reciprocity
Watch how ZenGRC makes compliance easier for your compliance manager.
Aug 9, 2016   |  By Reciprocity
Watch how ZenGRC makes compliance easier for your compliance manager.
Jul 28, 2016   |  By Reciprocity
While Microsoft Excel is flexible and powerful, it’s not designed to track compliance initiatives. Some companies can get away with using an Excel spreadsheet for simple compliance requirements. However as your organization matures the need for compliance software will quickly grow.