article thumbnail

Not another BCM Program audit?

Stratogrid Advisory

Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 4 minutes Another Business Continuity Management (BCM) Program audit. These types of assessments can be used to evaluate an entire organization (management consulting), or any specific system (IT audit), process or project. Not another BCM Program audit?

Audit 52
article thumbnail

Not another BCM Program audit?

Stratogrid Advisory

Last Updated on May 31, 2020 by Alex Jankovic. These types of assessments can be used to evaluate an entire organization (management consulting), or any specific system (IT audit), process or project. Not another BCM Program audit? Reading Time: 4 minutes. Another Business Continuity Management (BCM) Program audit. BCM Program Audits.

Audit 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT Disaster Recovery Planning – No worries, we have a backup!

Stratogrid Advisory

Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 3 minutes When asked about their organization’s IT Disaster Recovery (ITDR) plans, some will smile and say, “Yes, we have a backup and it is fully outsourced.” Copyright 2020 StratoGrid Inc. IT Disaster Recovery Planning – “No worries, we have a backup?!”

article thumbnail

IT Disaster Recovery Planning – No worries, we have a backup!

Stratogrid Advisory

Last Updated on May 31, 2020 by Alex Jankovic. When asked about their organization’s IT Disaster Recovery (ITDR) plans, some will smile and say, “Yes, we have a backup and it is fully outsourced.” Copyright 2020 StratoGrid Inc. IT Disaster Recovery Planning – “No worries, we have a backup?!”. Reading Time: 3 minutes.

article thumbnail

TSPs: Making the Case to Invest in Risk and Resiliency

Fusion Risk Management

Your customer may be subject to third-party outsourcing requirements by their own regulators , like the European Banking Authority’s Outsourcing Requirements , and they may ask to sign an addendum . Ability to Procure Cyber Insurance.

article thumbnail

Successfully Navigating Identity Management Strategies

Risk Management Monitor

When evaluating an identity management strategy, it is imperative to start at a high level, which includes data access governance to limit access and meaningfully reduce the risk of loss or theft. When navigating the vital issue of identity, the top considerations include: Data Access Governance.

article thumbnail

Silicon Valley Bank (SVB) Failures in Risk Management: Why ERM vs GRC

LogisManager

Instead, they continued investing as they had from 2020-2021, driving through their rearview mirror of asking “Is today like yesterday?” They evaluate their vendor and partner communities to identify the third parties they depend on the most and map them to the business risks, controls, and testing that rely on them.

Banking 98