Risk Management

upguard

What is Vendor Risk Management: The Definitive Guide to VRM

Vendor risk management (VRM) deals with the management and monitoring of risks resulting from third-party vendors and suppliers of information technology (IT) products and services. VRM programs are concerned with ensuring third-party products, IT vendors and service providers do not result in business disruption or financial and reputational damage.

reciprocity

Introducing ZenGRC + ZenConnect

At Reciprocity, our mission has always been to simplify the way your organization manages risk and compliance, and to encourage transparency and trusted relationships with your key stakeholders. With ZenGRC, we delivered the industry’s best GRC solution and simplified a traditionally complicated tool to make it easy for CISOs, CROs and CCOs to manage their organization’s information security. Today, we are excited to announce our next massive milestone: ZenConnect.

splunk

Which of Gartner's 2019 Top 7 Security and Risk Management Trends Are Impacting Your Business? - Part III

If you followed my recent blogs about the Gartner Top 7 Security and Risk Trends for 2019, you probably read my take on trend no. 1, as well as no. 2 and 3. In this part of the series I am going to review trend no. 5, 6 and 7. You may notice that I skipped trend no. 4 - it’s an important one but not something we at Splunk are addressing at the moment. Enjoy!

splunk

Which of Gartner's 2019 Top 7 Security and Risk Management Trends Are Impacting Your Business? - Part II

In my most recent article, I blogged about the Gartner Top 7 Security and Risk Trends for 2019 and explained how Splunk, Splunk Customers and Splunk Partners address trend No. 1. I also talked about how leaders in security and risk management create pragmatic risk appetite and link their statements to business outcomes.

splunk

Which of Gartner's 2019 Top 7 Security and Risk Management Trends Are Impacting Your Business?

Part of my role as a security ninja is to stay up-to-date with industry trends, so I regularly follow the observations Gartner receives from security managers and vendors around the world and review strategies on how security teams can address them. It’s impressive how accurate Gartner is with its predictions. Similarly remarkable is how advanced Splunk customers and users have been by addressing these trends with Splunk technology today.

upguard

How to Perform an IT Cyber Security Risk Assessment: Step-by-Step Guide

A cyber security risk assessment is about understanding, managing, controlling and mitigating cyber risk across your organization. It is a crucial part of any organization's risk management strategy and data protection efforts. Risk assessments are nothing new and whether you like it or not, if you work in information security, you are in the risk management business.

upguard

What Is Cybersecurity Risk? A Thorough Definition

Cybersecurity risk is the probability of a cyber attack or data breach on your organization. Organizations are becoming more vulnerable to cyber threats due to the increasing reliance on computers, networks, programs, social media and data globally. Data breaches, a common cyber attack, have massive negative business impact and often arise from insufficiently protected data.

upguard

What is Information Risk Management?

Information Risk Management (IRM) is a form of risk mitigation through policies, procedures, and technology that reduces the threat of cyber attacks from vulnerabilities and poor data security and from third-party vendors. Data breaches have massive, negative business impact and often arise from insufficiently protected data. In this article, we outline how you can think about and manage your cyber risk from an internal and external perspective.

alienvault

Post-incident review and the big data problem

Across the board, security teams of every industry, organization size, and maturity level share at least one goal: they need to manage risk. Managing risk is not the same as solving the problem of cybersecurity once and for all, because there is simply no way to solve the problem once and for all. Attackers are constantly adapting, developing new and advanced attacks, and discovering new vulnerabilities.

servicenow

How Denver replaced spreadsheets with Vendor Risk Management

In 2018, if you were a third-party vendor looking to provide products or services to the city and county of Denver, officials there had a few questions—more than 300, in fact. To assess vendor risk exposure, the city had long required applicants to fill out a 60-page questionnaire, which was then reviewed by the agency soliciting services, the information security team, and the purchasing department. The process could take six to eight weeks to complete.