article thumbnail

The Best Risk Management Software to Consider for 2021 and Beyond

Solutions Review

Description: Archer IT & Security Risk Management enables users to document and report on IT risks and controls, security vulnerabilities, audit findings, regulatory obligations, and issues across their technology infrastructure. Platform: Archer IT & Security Risk Management. Fusion Risk Management. Platform: HighBond.

article thumbnail

The Best Governance, Risk, and Compliance Software to Consider

Solutions Review

Description: AuditBoard is a cloud-based GRC offering that includes a suite of risk, audit, and compliance tools. With the platform, users can conduct internal audits, manage risks, optimize workflow efficiency, maintain SOX compliance, and manage controls. Fusion Risk Management. Platform: Fusion Framework System.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Vendor Risk Management (VRM)? The Definitive Guide

Reciprocity

Evidence may include compliance certifications, penetration test reports, financial information, and on-site audits. For example, the Health Insurance Portability and Accountability Act (HIPAA) and the Payment Card Industry Data Security Standard (PCI DSS) , among others, require vendor compliance. Conduct vendor audits.

article thumbnail

5 Steps To Developing A Corporate Compliance Program

Reciprocity

Monitoring often incorporates audit requirements (either external or internal) as part of the regulatory or industry standard. Set up a mechanism for monitoring and auditing. To accomplish this, create a system of internal and external monitoring, including formal audits. Elements of a Strong Compliance Program.

Audit 52
article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

In recent years, these attacks have affected everyone from banks and hospitals to universities and municipalities; almost 2,400 organizations in the United States were victimized last year alone. The less prepared you are when responding to an incident, the more likely you’ll be forced into paying ransom.

article thumbnail

5 Steps to Implement Enterprise Risk Management (ERM)

Reciprocity

Your ERM program should encompass all aspects of risk management and response in all business processes, including cybersecurity, finance, human resources, risk management audit , privacy, compliance, and natural disasters. Passing or sharing the risk via insurance, joint venture, or another arrangement.

article thumbnail

5 Steps to Implement Enterprise Risk Management (ERM)

Reciprocity

Your enterprise risk management (ERM) program – one that encompasses all aspects of risk management and risk response in all business processes, including cybersecurity, finance, human resources, risk management audit , privacy, compliance, and natural disasters – should involve strategic, high-level risk management decision-making.