article thumbnail

Security Industry Association Announces Winners of the 2024 SIA New Products & Solutions Awards

Security Industry Association

Swear ensures an unbreakable chain of custody for digital media, offering real-time, permanent protection of content authenticity through patented technology and immutable blockchain security,” said Swear. The prestigious Judges’ Choice Award was presented to Swear for the Swear Authenticity Engine product, submitted in the Software category.

Security 119
article thumbnail

Security Industry Association Announces Winners of the 2023 SIA Women in Biometrics Awards

Security Industry Association

The 2023 awardees, who will be honored at SIA GovSummit , SIA’s annual government security conference, are: Larisa Boyko, Director, Quality Assurance, Advanced Recognition Systems, NEC Corporation of America Larisa Boyko is a seasoned information technology professional with over 20 years of experience in the software development life cycle.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How To Develop An ESG Strategy

LogisManager

2021 Gartner® Magic Quadrant for IT Vendor Risk Management Tools in 2021 & Beyond? Environmental, Social and Corporate Governance (ESG) criteria are a set of standards for business operations. PR will eventually become ineffective as reputations will need to be earned through genuinely good governance. Download Now.

article thumbnail

How To Develop An ESG Strategy

LogisManager

Environmental, Social and Corporate Governance (ESG) criteria are a set of standards for business operations. At LogicManager, we use the term “See-Through Economy” to describe the shift occurring in the business world towards transparency and accountability brought on by new technology and the prevalence of social media.

article thumbnail

ISO 27001 Requirements Checklist: Steps and Tips for Implementation

Reciprocity

An ISMS is a standards-based approach to managing sensitive information to assure that the information stays secure. The core of an ISMS is rooted in the people, processes, and technology through a governed risk management program. 8 – Asset Management. Asset Management, Annex A.8 In Annex A.8.3,