article thumbnail

The Best Risk Management Courses on Pluralsight to Consider Taking

Solutions Review

The editors at Solutions Review have compiled this list of the best risk management courses on Pluralsight to consider taking. . Risk management is an essential skill in the data protection space. This list of the best risk management courses on Pluralsight below includes links to the modules and our take on each.

article thumbnail

Storage and Data Protection News for the Week of February 23: Updates from Clumio, Constellation Research, Hitachi Vantura, and More

Solutions Review

Constellation evaluated over forty solutions in the Backup and Recovery marketplace and selected these companies based on market share, internal research, client inquiries, customer references, partner conversations, and more. Under the alliance, Kyndryl will now be a Veeam Accredited Service Partner (VASP). Read on for more.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISO 27001 Certification Requirements & Standards

Reciprocity

Deciphering the various numbers can be confusing at first, but each standard is numbered and deals with a specific facet of managing your company’s information security risk management efforts. Conduct a Risk Assessment. Analyzing risks. Evaluating risks. Choosing risk-reduction treatments.

Audit 52
article thumbnail

SIA New Member Profile: Petrone Risk

Security Industry Association

New Security Industry Association (SIA) member Petrone Risk offers legal risk management and SAFETY Act consulting and specializes in emergency preparedness and the SAFETY Act. SIA spoke with John Petrone, senior managing director and founder of Petrone Risk, about the company, the security industry and working with SIA.

article thumbnail

What Does It Take to Be FIPS Compliant?

Pure Storage

This laboratory develops an array of standards for computer security, information technology (IT), cybersecurity, risk management, cryptography, and other data management best practices—including FIPS standards. FIPS compliance evaluates a number of cryptographic components. What Are the FIPS Compliance Requirements?

article thumbnail

IRM, ERM, and GRC: Is There a Difference?

Reciprocity

The various niches of risk management have become a veritable alphabet soup of acronyms. As a result, we now have: Enterprise risk management (ERM). Governance, risk management, and compliance (GRC). Integrated risk management (IRM). The advent of the digital age is partly to blame.