AI Opportunity and Risk – Are you and your vendors aware?
While AI has been enhancing cyber security tools for years, it is a double-edged sword for both defence and offence within cybercrime. We outline some of the key risks you and your vendors need to know about. …
Navigating Vendor Risk Management: Your Top Questions Answered
Check out the most frequently asked questions on Vendor Risk Management to help you understand its significance and how to implement a solution that's effective and flexible for your business. …
3 Critical Outcomes of a Supplier Breach on your Organisation and the C-Suite
Three critical outcomes an organisations could face as a result of a supplier breach and how this can impact the business and the C-Suite. …
Security Awareness Training: Why is it important?
90% of data breaches are attributed to human error, with phishing techniques being responsible for nearly half of these breaches. Which highlights just how crucial it is to implement security awareness training within your organisation. …
Securing Your Supply Chain: A Deep Dive into Vendor Risk Management
In a world where vendor risks are escalating at an alarming rate, it has become imperative for businesses to prioritise vendor risk management. Join us as we present our highly informative webinar on vendor risk management, which took place on June 6th, 2023. …
Do you have a supplier breach checklist? Because YOU should!
The business landscape is becoming increasingly interconnected with organisations often employing third-party suppliers and vendors to fulfil various roles. However, the growing complexity of these relationships also increases the risk. This is where a supplier breach checklist can be a fundamental tool for businesses that are …
5 steps to implementing best practice data privacy across your supply chain
A step-by-step guide to bring your entire data strategy in alignment with GDPR & ePrivacy Directive. Collecting and using personal data online is not only a legal requirement that could have serious ramifications on your business if breached but is critical to building user relationships across …
Understanding developing regulation around Critical Third Parties
All companies in Financial Services are subject to Financial Conduct Authority (FCA) regulations and Prudential Regulation Authority (PRA) regulations, on assessment of third-party risk. …
Comparing CIS 20 & ISO 27001
The CIS20 (Critical Security Controls) framework and ISO 27001 2(013 and now 2022)are both standards that provide guidelines and best practices for information security management. However, there are some key differences between the two. …
What is ESG and Why is it Important?
ESG measures how a company integrates Environmental, Social, and Governance practices into their business and it is changing the approach investors use when viewing their portfolios. Investors are not only focusing on financial return but also considering the societal impact of a company. Companies that …