Remove Audit Remove Banking Remove Insurance Remove Vulnerability
article thumbnail

Silicon Valley Bank (SVB) Failures in Risk Management: Why ERM vs GRC

LogisManager

Silicon Valley Bank (SVB) Failures in Risk Management: Why ERM vs GRC By Steven Minsky | May 5, 2023 Silicon Valley Bank (SVB) was closed by regulators and reminded us of the recession associated with Lehman Brothers and Washington Mutual Bank in 2008.

Banking 98
article thumbnail

How CISOs Can Reduce Third-party Attack Vectors

Pure Storage

The last year has seen such attacks hit Bank of America , Home Depot, T-Mobile , Okta , and Citrix. In-depth questionnaires and even independent audits might be appropriate, but the process should be thorough. Shift left encourages teams to find vulnerabilities earlier and fix defects.

Audit 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Operational Resilience for Financial Services: A Perspective from the U.S.

Pure Storage

CISA is a part of the Department of Homeland Security and has responsibilities that include risk assessment, vulnerability reduction, threat detection, incident response, and the coordination of recovery efforts with other federal agencies, state and local government, and the private sector. While the U.S. link] ²“ U.S.

article thumbnail

The Best Risk Management Software to Consider for 2021 and Beyond

Solutions Review

Description: Archer IT & Security Risk Management enables users to document and report on IT risks and controls, security vulnerabilities, audit findings, regulatory obligations, and issues across their technology infrastructure. Platform: Archer IT & Security Risk Management. Fusion Risk Management. Platform: HighBond.

article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

For example, a forensic finding made during an evaluation of Colonial Pipeline noted numerous known and preventable vulnerabilities, such as unpatched and outdated systems, that likely led to the security breach. The less prepared you are when responding to an incident, the more likely you’ll be forced into paying ransom.

article thumbnail

What Goes Into a Cyber Data Risk Assessment?

Plan B Consulting

Bank account numbers Sort codes Credit card information Invoicing details 6. For example, do we hold National Insurance Numbers, do we hold credit card numbers or not? For all data you need to understand how it is protected and how vulnerable you are to a cyber breach. What is the most embarrassing bit of information you hold?

Banking 52
article thumbnail

What Goes Into a Cyber Data Risk Assessment?

Plan B Consulting

Bank account numbers Sort codes Credit card information Invoicing details. For example, do we hold National Insurance Numbers, do we hold credit card numbers or not? For all data you need to understand how it is protected and how vulnerable you are to a cyber breach. What is the most embarrassing bit of information you hold?

Banking 52