Remove Audit Remove Banking Remove Evaluation Remove Insurance
article thumbnail

Silicon Valley Bank (SVB) Failures in Risk Management: Why ERM vs GRC

LogisManager

Silicon Valley Bank (SVB) Failures in Risk Management: Why ERM vs GRC By Steven Minsky | May 5, 2023 Silicon Valley Bank (SVB) was closed by regulators and reminded us of the recession associated with Lehman Brothers and Washington Mutual Bank in 2008.

Banking 98
article thumbnail

TSPs: Making the Case to Invest in Risk and Resiliency

Fusion Risk Management

A bottom-up approach occurs when teams are issue spotting via speaking up about issues that they are encountering, control testing, or remediating audit findings. Ability to Procure Cyber Insurance. Contractual Obligations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Best Risk Management Software to Consider for 2021 and Beyond

Solutions Review

Description: Archer IT & Security Risk Management enables users to document and report on IT risks and controls, security vulnerabilities, audit findings, regulatory obligations, and issues across their technology infrastructure. Platform: Archer IT & Security Risk Management. Fusion Risk Management. Platform: HighBond.

article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

For example, a forensic finding made during an evaluation of Colonial Pipeline noted numerous known and preventable vulnerabilities, such as unpatched and outdated systems, that likely led to the security breach. The less prepared you are when responding to an incident, the more likely you’ll be forced into paying ransom.

article thumbnail

What Goes Into a Cyber Data Risk Assessment?

Plan B Consulting

Bank account numbers Sort codes Credit card information Invoicing details 6. For example, do we hold National Insurance Numbers, do we hold credit card numbers or not? What is the most embarrassing bit of information you hold? Consider information and personal comments in emails or company communication system?

Banking 52
article thumbnail

What Goes Into a Cyber Data Risk Assessment?

Plan B Consulting

Bank account numbers Sort codes Credit card information Invoicing details. Once you have done the basic inventory, I think there should be a more in-depth evaluation looking at the following: 1. For example, do we hold National Insurance Numbers, do we hold credit card numbers or not? How many of each data set do we hold?

Banking 52
article thumbnail

What Does a Compliance Management System Look Like?

Reciprocity

The Federal Deposit Insurance Corp. Regular audits of the compliance program. In banking, for example, the FDIC, the Office of the Comptroller of the Currency (OCC), or the Consumer Financial Protection Bureau (CFPB) are stringent regulators that can impose high fines for compliance issues. Compliance Audit. ” CFPB.