Security Awareness Training: Why is it important?
90% of data breaches are attributed to human error, with phishing techniques being responsible for nearly half of these breaches. Which highlights just how crucial it is to implement security awareness training within your organisation. …
Securing Your Supply Chain: Vendor Risk Management
In a world where vendor risks are escalating at an alarming rate, it has become imperative for businesses to prioritise vendor risk management. Join us as we present our highly informative webinar on vendor risk management, which took place on June 6th, 2023. …
Do You Have a Supplier Breach Checklist?
The business landscape is becoming increasingly interconnected with organisations often employing third-party suppliers and vendors to fulfil various roles. However, the growing complexity of these relationships also increases the risk. This is where a supplier breach checklist can be a fundamental tool for businesses that are …
5 Steps to Data Privacy in Your Supply Chain
A step-by-step guide to bring your entire data strategy in alignment with GDPR & ePrivacy Directive. Collecting and using personal data online is not only a legal requirement that could have serious ramifications on your business if breached but is critical to building user relationships across …
What is ESG and Why Does it Matter?
ESG measures how a company integrates Environmental, Social, and Governance practices into their business and it is changing the approach investors use when viewing their portfolios. Investors are not only focusing on financial return but also considering the societal impact of a company. Companies that …
Automate & Educate at Scale
The increasing exposure of software supply chain vulnerabilities through cyberattacks has brought renewed focus on third-party risk management programs, as well as the tools used to oversee them. …
5 Steps to Effective Vendor Risk Management
The term ‘Vendor risk” covers all aspects of threats to your organisation and your customers posed by an outsourced relationship with a vendor and the products or services they provide. …
Why being compliant isn’t the same as being secure
In the world of cybersecurity, two terms that are often used interchangeably are “security” and “compliance.” However, they are not the same thing. As cyber threats increasingly become a business-critical issue for all organisations, it is time for organisations to step up from simply being …
Why Diversity and Inclusion Matter at C2
Diversity, Equity, and Inclusion Q&A with Jonathan Wood, CEO C2 Risk. According to People Management, diverse teams are 87% better at making decisions and further statistics found that those diverse teams deliver 60% better results. This highlights that inclusive decision making can bring about faster …
How much do you really know about your extended enterprise?
Information risk is something that businesses everywhere are having to face, and with risk comes responsibility. All organisations now generate, process and store vast amounts of information to maximise the returns from their investments. But, who is responsible for defining an acceptable level of risk …