Taking a Regulation-Agnostic Approach to Privacy

Don’t look now, but the next generation of privacy rules is arriving in the United States. As if …
Read More
The post Taking a Regulation-Agnostic Approach to Privacy appeared first on Hyperproof.
The post Taking a Regulation-Agnostic Approach to Pr… Continue reading Taking a Regulation-Agnostic Approach to Privacy

How SaaS Providers Should Parse the Biden Cybersecurity Executive Order

Government contractors, and specifically providers of software-as-a-service (SaaS), received quite the message in May when the Biden Administration …
Read More
The post How SaaS Providers Should Parse the Biden Cybersecurity Executive Order appeared… Continue reading How SaaS Providers Should Parse the Biden Cybersecurity Executive Order

Developing a Risk Management Approach to Cybersecurity

By now most CISOs understand that focusing your cybersecurity program on regulatory compliance is no longer sufficient. Meeting …
Read More
The post Developing a Risk Management Approach to Cybersecurity appeared first on Hyperproof.
The post Develo… Continue reading Developing a Risk Management Approach to Cybersecurity

Risks You Need to Consider When Using SaaS Providers

Businesses now use cloud-based technology vendors for all manner of services, and for good reason. Software-as-a-Service (SaaS) providers …
Read More
The post Risks You Need to Consider When Using SaaS Providers appeared first on Hyperproof.
The pos… Continue reading Risks You Need to Consider When Using SaaS Providers

Why IT General Controls Are Important for Compliance and Cybersecurity

IT general controls are among the most important elements of effective compliance and IT security. So it’s a …
Read More
The post Why IT General Controls Are Important for Compliance and Cybersecurity appeared first on Hyperproof.
The post Why IT Ge… Continue reading Why IT General Controls Are Important for Compliance and Cybersecurity

Data Access Requests Under GDPR and CCPA

If your business is subject to data privacy laws such as the EU General Data Protection Regulation and …
Read More
The post Data Access Requests Under GDPR and CCPA appeared first on Hyperproof.
The post Data Access Requests Under GDPR and CCPA appe… Continue reading Data Access Requests Under GDPR and CCPA

Defining and Building Your In-House Compliance Committee

People say that effective corporate compliance is a team effort—and every overworked, overwhelmed CISO knows that statement is …
Read More
The post Defining and Building Your In-House Compliance Committee appeared first on Hyperproof.
The post Defin… Continue reading Defining and Building Your In-House Compliance Committee

The IIA’s New Three Lines Model for Risk Assurance

For many years, businesses have based their risk management programs upon the Three Lines of Defense model developed …
Read More
The post The IIA’s New Three Lines Model for Risk Assurance appeared first on Hyperproof.
The post The IIA’s New Three L… Continue reading The IIA’s New Three Lines Model for Risk Assurance