Remove 2020 Remove Evaluation Remove Outsourcing
article thumbnail

Not another BCM Program audit?

Stratogrid Advisory

Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 4 minutes Another Business Continuity Management (BCM) Program audit. These types of assessments can be used to evaluate an entire organization (management consulting), or any specific system (IT audit), process or project. Not another BCM Program audit?

Audit 52
article thumbnail

Not another BCM Program audit?

Stratogrid Advisory

Last Updated on May 31, 2020 by Alex Jankovic. These types of assessments can be used to evaluate an entire organization (management consulting), or any specific system (IT audit), process or project. Not another BCM Program audit? Reading Time: 4 minutes. Another Business Continuity Management (BCM) Program audit. BCM Program Audits.

Audit 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tips for Managing Third-Party Risk in Health Care

Reciprocity

Data breaches against healthcare organizations affected more than 1 million people in 2020. To make matters worse, a 2020 survey found that 54% of healthcare vendors experienced a data breach of PHI, but only 36% notified providers because they were afraid to lose their business. million ) than any other sector.

article thumbnail

IT Disaster Recovery Planning – No worries, we have a backup!

Stratogrid Advisory

Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 3 minutes When asked about their organization’s IT Disaster Recovery (ITDR) plans, some will smile and say, “Yes, we have a backup and it is fully outsourced.” Copyright 2020 StratoGrid Inc. IT Disaster Recovery Planning – “No worries, we have a backup?!”

article thumbnail

IT Disaster Recovery Planning – No worries, we have a backup!

Stratogrid Advisory

Last Updated on May 31, 2020 by Alex Jankovic. When asked about their organization’s IT Disaster Recovery (ITDR) plans, some will smile and say, “Yes, we have a backup and it is fully outsourced.” Copyright 2020 StratoGrid Inc. IT Disaster Recovery Planning – “No worries, we have a backup?!”. Reading Time: 3 minutes.

article thumbnail

TSPs: Making the Case to Invest in Risk and Resiliency

Fusion Risk Management

Your customer may be subject to third-party outsourcing requirements by their own regulators , like the European Banking Authority’s Outsourcing Requirements , and they may ask to sign an addendum . Ability to Procure Cyber Insurance.

article thumbnail

Successfully Navigating Identity Management Strategies

Risk Management Monitor

When evaluating an identity management strategy, it is imperative to start at a high level, which includes data access governance to limit access and meaningfully reduce the risk of loss or theft. When navigating the vital issue of identity, the top considerations include: Data Access Governance.