Top Stories

Reflection of hacker coding working hackathon at laptop

In God We Trust, All The Others We Monitor!

18-May-2020 | Thomas Frénéhard | GRC

Monitoring data, not just the perimeter, helps companies better protect the information held in their systems against insider threats.

Finance leaders audits factory performance

Transform Internal Control In The Digital World

11-May-2020 | Thomas Frénéhard | GRC

Automating internal controls prevents meeting compliance standards from falling through the cracks.

Golden statue of a dragon in a Chinese temple

Emerging Risk: Hic Sunt Dracones

6-Apr-2020 | Thomas Frénéhard | GRC

Threats never appear without warning; the trick is to be ready for them before they turn into risks.

Latest Stories

Efficient Cybersecurity Response Requires Profiling Of Data Breaches
Learn More

How A Former FBI Agent Approaches Pre-Transaction Due Diligence
Learn More

Top Risks For 2020, And How To Involve All Stakeholders
Learn More

Risk-Based…Well, Everything, Really!
Learn More

Can A Supply Chain Be Really Transparent In A Digital World?
Learn More

Preparing For Risk In All Its Forms
Learn More

Reducing Risk, Increasing Retention, And Recruiting Top Talent
Learn More

Six Very Real Business Impacts Of Cyber Attacks
Learn More

Load more stories
← Older posts