Vendor Risk Management Insights

      iconemail-box

      Subscribe to our blog

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

      healthcare1

      HIPPA & HITECH | Today's Health Data Privacy Laws in the USA - Part 1

      HIPAA & HITECH are major regulations in the healthcare industry in the United States of America. HIPAA was enacted in 1996 and aimed to provide privacy ...
      HITECH2

      HITECH Foundations: Part 2

      In part two of our blog series on HITECH Foundations - we explore a number of key areas including breach notification requirements, restrictions on disclosures and ...
      HITECH1

      HITECH Foundations: Part 1

      This blog continues our series on health data information security & data privacy laws in the United States. This two part blog series will go through the key ...
      Cyber-Incident

      What's a Cyber Ripple Event?

      For some years now security experts have rung the alarm bells over the risk of third-party breaches. Enterprises are starting to understand that the security ...
      healthcare_data_breach

      Healthcare CyberSecurity: HIPAA Foundations - Part 2

      In this part one of our HIPAA foundations blog, ...
      HIPAA-cloud

      Healthcare CyberSecurity: HIPAA Foundations - Part 1

      Health information is regarded as highly private data by many individuals. The unauthorized disclosure of health data can, and has, ...
      Data Regulations

      Comparing and Contrasting GDPR & CCPA

      This past decade has seen privacy concerns come to the forefront of the public’s attention all across the world. In response to ...
      Distribution of Breach Frequency

      Measuring Risk Surface: Part 3

      The Methods of Measurement
      board-members-table

      What's the Board's Role in Managing Cyber Risk?

      Recent regulatory and market actions against the likes of Equifax and Facebook should stand as a huge wake-up call for governing boards of directors at large ...
      Vendor Risk Management

      GDPR Foundations: Part III

      Manage Third-parties under GDPR We’ve discussed this section in detail in a ...