Vendor Risk Management Insights

      iconemail-box

      Subscribe to our blog

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

      healthcare_data_breach

      Healthcare CyberSecurity: HIPAA Foundations - Part 2

      In this part one of our HIPAA foundations blog, ...
      HIPAA-cloud

      Healthcare CyberSecurity: HIPAA Foundations - Part 1

      Health information is regarded as highly private data by many individuals. The unauthorized disclosure of health data can, and has, ...
      Data Regulations

      Comparing and Contrasting GDPR & CCPA

      This past decade has seen privacy concerns come to the forefront of the public’s attention all across the world. In response to ...
      Distribution of Breach Frequency

      Measuring Risk Surface: Part 3

      The Methods of Measurement
      board-members-table

      What's the Board's Role in Managing Cyber Risk?

      Recent regulatory and market actions against the likes of Equifax and Facebook should stand as a huge wake-up call for governing boards of directors at large ...
      Vendor Risk Management

      GDPR Foundations: Part III

      Manage Third-parties under GDPR We’ve discussed this section in detail in a ...
      EMEA locked

      GDPR Foundations: Part II

      As we continue with this blog series on GDPR Foundations, we will explore the requirements organizations need ...
      ITSPmagazine+LOGO+-+Square+v2

      A Conversation on Digital Transformation and Third-Party Risk

      Only a small segment of the industry has gotten on board with the idea that they own the risk associated with the end-to-end supply chain that makes their ...
      simplifying-data-compliance-regulations

      GDPR Foundations: Part I

      GDPR is an incredibly far-reaching regulation that has impacted organizations globally. The risk of financially material fines has led to companies making greater ...
      Cloud Security-1

      5 Risk Factors for Deciding Where to Host Cloud-Eligible Assets

      When security and risk considerations play a role in determining where Internet-facing assets should reside, the inevitable questions that rear their heads are 'Are ...