Request A Demo!

Author - Rajesh Unadkat

Fighting the 5 I's of Information Insecurity

Fighting the 5 I’s of Information Insecurity

Every time I see one of these reports, I fight the urge to “live off the grid.” Then I remember that I make my living in the technology business. But the point remains, the IT security paradigm is broken. Not just because the threats are increasing, but because the velocity of deconstruction is outpacing our ability to prevent catastrophic failure. The idea that we can lock everything down from the bottom up approach is not working. We need to [...]

Return on Investment Versus Failer - ROI vs ROF

ROI vs. ROF – Return on Investment versus Failure

We have seen a trend in companies struggle to justify their investment in a GRC solution. It is hard for them to get senior executive buy-in to investing in automating their compliance, security, quality, safety, etc. They “know” they need to do it, but it never seems to reach the priority queue. The directly impacted managers who own the programs are frustrated, the stakeholders who have to assist in manually updating information for the program are not particularly happy [...]

Vendor and Third-Party Risk Management is Difficult

Think Vendors Are Risky Now? Just Wait…

Ask vendor & third-party relationship managers whether their job is harder today than 5-10 years ago and you will get “both”. The technology has made the job easier in that communications and tracking are easier, but the fact that the technology made things easier just meant that they were being asked to do more with less. Technology has helped to manage more vendors efficiently, but that means more vendors for each vendor manager along with more detailed reporting, but [...]

FCPA Violations and FCPA Enforcement Has Increased

FCPA violations FCPA Enforcement Has Dramatically Increased

Building compliance programs to prevent, detect and eliminate FCPA violations Although the FCPA (Foreign Corrupt Practices Act) was enacted nearly thirty years ago, the legislation is now facing more rigorous enforcement than ever by the SEC and DOJ. The Obama Administration has made it clear to the business community that FCPA enforcement will be a high priority and also focused on new industries – pharmaceutical and financial institutions – while additional resources are assigned to support the crackdown. In response, [...]

Information Security Has Holes In Their Design Just Like Swiss Cheese

What Do Information Security and Swiss cheese have in common? Both have holes in their design.

The Central Problem for Information Security Professionals With the proliferation of BYOD devices, SaaS, social media, and mass proliferation of data & file sharing; IT organizations have lost control over the ability to lock down their networks and user devices. The result is that security has morphed from keeping “bad stuff out” to figuring out how to keep “our stuff in.” As a result, information security is highly dependent upon information governance and users following IT’s lead in protecting corporate [...]

IT Security Paranoia

IT Security: Are You Still Paranoid If You Are Right?

If you have been in your IT Security role for a while, I can probably guess a few things about your environment: You are up on the latest “everything” that lock the physical network down; data, network app. You have all of the data protection tools that you can afford. You probably have a wish list longer than your current budget for this year and next. You know that you can’t stop D.U.M.B. actions if you don’t know what [...]

The GRC Investment Chasm

We see a good deal of companies trying to figure out how much to invest in compliance. Tough question, right? How do you know when enough is enough until you are faced with the situation that you are trying to prevent? But, there is a reasonableness factor in investing in GRC. You need to make sure that you are compliant with external regulations, industry standards, or internal organizational policies. That is a given. We have outlined 4 decision gates to help [...]

A View from Inside the Tornado

As a vendor, we get asked all the time about what everyone else is doing, what are we seeing as trends, and how does their requirements compare to others in the market. It is natural for all of us to want to make sure that our assumptions and requirements are comprehensive. Who wants to miss anything? So to that end, we put together a sampling of some of the trends that we are seeing in the market for your [...]

Build it (Wrong) and They Will (Not) Come

A good program doesn’t just end when the system goes live, so we provide additional program and support services to answer the following issues that we inevitably apply: Success What KPIs do we measure iterative, progressive, and overall success? What is the performance roadmap? How do we measure? How do we transition? Who will be responsible for conducting internal business quarterly and annual performance & requirements assessments? Onboarding How do we get initial buy-in, acceptance, and usage? How do we set [...]

Let Us Help Your Business

Request A Demo!