ISO 27001 Requirements Checklist: Steps and Tips for Implementation


The ISO 27001 standard for management of information systems helps organizations of any size to manage the security of data assets such as employee information, financial information, intellectual property, and third-party information. Annex A.8 – Asset Management.

The Added Value of Security Data for Proptech

Security Industry Association

How are we currently tracking all our network-connected assets, managing product life cycle and assigning accountability for management and maintenance of these devices? According to Snowflake Inc. ,


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

Managing Cyberthreats to Combat Ransomware Part 3: Cybersecurity Frameworks


As we continue with our third and final blog in this series on managing cyberthreats, we’ll explore frameworks from the National Institute of Standards & Technology and Center for Internet Security, which together provide time-tested knowledge and best practices used to combat ransomware.

Adversarial Risk Management


You can hire a professional audit firm to benchmark the bucket against peer buckets. We chase concepts that seem simple, such as "basic" network hygiene, asset management, and patching. To avoid becoming a headline tomorrow, we must practice adversarial risk management.

The Colonial Pipeline Hack: Failure in Risk Management


Colonial Pipeline Hack: Failure in Risk Management. With strong Enterprise Risk Management (ERM), nearly 100% of all liabilities can be avoided. This will also uncover poor management of privileged user accounts. Asset Management.

How To Develop An ESG Strategy


2021 Gartner® Magic Quadrant for IT Vendor Risk Management Tools in 2021 & Beyond? A recent study conducted by the University of Oxford and Arabesque Asset Management examined 200 organizations to determine how sustainable corporate practices have impacted their return on investment.

Audit 52