article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

This is especially important when considering the additional scrutiny and cost of SOC II and regulatory audits that are based largely on the strength of an organization’s ERM program. Asset Management. Risk Assessments & User Access Reviews. Having multi-factor authentication also limits unauthorized users to access data.