article thumbnail

How Does NAID AAA Certification Intersect With NIST 800-88? (Part 2)

Prism International

Of course, it is very easy for i-SIGMA to put a stop to such false claims since being subject to our scheduled and unannounced audits is one of the requirements. Unfortunately, NIST 800-88 does not include or control a third-party audit requirement. It was never meant to be an audit regime in the first place.

Audit 40
article thumbnail

Silicon Valley Bank (SVB) Failures in Risk Management: Why ERM vs GRC

LogisManager

Silicon Valley Bank (SVB) Failures in Risk Management: Why ERM vs GRC By Steven Minsky | May 5, 2023 Silicon Valley Bank (SVB) was closed by regulators and reminded us of the recession associated with Lehman Brothers and Washington Mutual Bank in 2008. A SOC2 audit only covers a limited subset of the product part of a company.

Banking 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Multiple Factors Leading to the Collapse of Silicon Valley Bank

Erwood Group

Furthermore, the internal audit department was understaffed and unable to identify potential risks. The bank was heavily impacted by the 2008 financial crisis, which led to a decrease in lending opportunities and an increase in non-performing loans. billion when they sold off US Treasuries and mortgage-backed securities.

Banking 59
article thumbnail

Data Privacy Awareness Month 2024: Roundup of Expert Quotes

Solutions Review

They explore the challenges we face in safeguarding digital identities, the emerging threats to our online spaces, and the innovative strategies being developed to secure personal information against unauthorized access. As a new approach gaining attention across enterprises, concerns about data security and privacy have run rampant.

article thumbnail

Data Privacy Day 2024: The Definitive Roundup of Expert Quotes

Solutions Review

They explore the challenges we face in safeguarding digital identities, the emerging threats to our online spaces, and the innovative strategies being developed to secure personal information against unauthorized access. As a new approach gaining attention across enterprises, concerns about data security and privacy have run rampant.