Take The GDPR Benchmark Survey

The Forrester GDPR Benchmark Survey, a companion piece to the Forrester leadership paper reporting on the survey results of U.S. and EU organizations GDPR readiness, is now available. The Forrester GDPR Benchmark Survey tool lets you know where you sta… Continue reading Take The GDPR Benchmark Survey

EU GDPR Readiness Study

Forrester Consulting conducted a recent study of the readiness of organizations in Europe and the United States to comply with the EU General Data Protection Regulation (GDPR). Based on the results of a large survey in both regions, Forrester provides… Continue reading EU GDPR Readiness Study

7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—4: EVALUATE RISK TREATMENTS

This week, we continue our journey through the seven steps you can follow to build a risk management framework for information. We’ve already looked at how to identify important information that may be at risk in your organization, where to find the information and how to assess the risk it presents within its business context.…

The post 7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—4: EVALUATE RISK TREATMENTS appeared first on Speaking of Security – The RSA Blog.

Continue reading 7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—4: EVALUATE RISK TREATMENTS

7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—3: ASSESS RISK

In the last couple of weeks, we’ve been talking in this space about the seven steps to building a risk management framework for information, starting with the first step of identifying information that needs to be protected and then going on to the second step, which is determining where that information exists inside your organization…

The post 7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—3: ASSESS RISK appeared first on Speaking of Security – The RSA Blog.

Continue reading 7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—3: ASSESS RISK

7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—2: LOCATE DATA

In our first post on the seven steps to building a GRC-based risk management framework for information, we talked about step 1: identifying information that is important enough to warrant protection. Once you’ve identified information important enough to be protected, within its business context, you can move on to determining whether you actually have any…

The post 7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—2: LOCATE DATA appeared first on Speaking of Security – The RSA Blog.

Continue reading 7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—2: LOCATE DATA

7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—1: IDENTIFY INFORMATION

Managing information risk can be a paralyzing challenge, given the amount of data and information that comes pouring in daily. It’s hard to know what information needs to be protected, let alone the most effective way to do it. RSA has developed a practical seven-step methodology for building a risk management framework for information. Derived…

The post 7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—1: IDENTIFY INFORMATION appeared first on Speaking of Security – The RSA Blog.

Continue reading 7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—1: IDENTIFY INFORMATION

Completing the Puzzle

In a previous blog I reviewed the real world pay back for being a risk leader.  Let’s say your company gets it, they know that good risk management increases the likelihood objectives will be fulfilled and profits improved, and now you’ve been given the assignment to start the risk management program to make your organization a…

The post Completing the Puzzle appeared first on Speaking of Security – The RSA Blog.

Continue reading Completing the Puzzle

Capture the Prize

Risk is the effect of uncertainty on objectives.  Managing risk well increases the certainty that objectives will be achieved.  Not surprisingly, organizations leading in risk management “capture the prize”.  According to a PWC Risk Review, organizations more frequently achieve their objectives, are more profitable and less likely to experience a negative profit margin than those…

The post Capture the Prize appeared first on Speaking of Security – The RSA Blog.

Continue reading Capture the Prize

The Business Value of RSA Archer

Implementing an effective governance, risk, and compliance program can be a costly and time-consuming effort: Hardware, software, and the active engagement of a lot of people in the first, second and third lines of defense.  Before implementing a program, and periodically throughout the life of the program, the question always arises from senior management: Is…

The post The Business Value of RSA Archer appeared first on Speaking of Security – The RSA Blog.

Continue reading The Business Value of RSA Archer