Remove Accreditation Remove Evaluation Remove Meeting Remove Risk Management
article thumbnail

ISO 27001 Certification Requirements & Standards

Reciprocity

Deciphering the various numbers can be confusing at first, but each standard is numbered and deals with a specific facet of managing your company’s information security risk management efforts. Conduct a Risk Assessment. Analyzing risks. Evaluating risks. Choosing risk-reduction treatments.

Audit 52
article thumbnail

SIA New Member Profile: Petrone Risk

Security Industry Association

New Security Industry Association (SIA) member Petrone Risk offers legal risk management and SAFETY Act consulting and specializes in emergency preparedness and the SAFETY Act. SIA spoke with John Petrone, senior managing director and founder of Petrone Risk, about the company, the security industry and working with SIA.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IRM, ERM, and GRC: Is There a Difference?

Reciprocity

The various niches of risk management have become a veritable alphabet soup of acronyms. As a result, we now have: Enterprise risk management (ERM). Governance, risk management, and compliance (GRC). Integrated risk management (IRM). The advent of the digital age is partly to blame.

article thumbnail

What Does It Take to Be FIPS Compliant?

Pure Storage

This laboratory develops an array of standards for computer security, information technology (IT), cybersecurity, risk management, cryptography, and other data management best practices—including FIPS standards. FIPS compliance evaluates a number of cryptographic components. What Are the FIPS Compliance Requirements?