article thumbnail

Security Industry Association Announces Winners of the 2023 SIA Women in Biometrics Awards

Security Industry Association

Maxine Most, Principal, Acuity Market Intelligence Strategic innovator, market visionary, and forecasting guru Maxine Most is the founding principal of Acuity Market Intelligence, a strategic research and analysis consultancy recognized as the definitive authority on global biometrics market development.

article thumbnail

Security Industry Association Announces Winners of the 2021 SIA New Product Showcase Awards

Security Industry Association

Tardiff, founder, MRT Security Consulting LLC. Key/Equipment Assets Management Solutions. Thank you to our dedicated judges for volunteering your time, expertise and efforts to make the 2021 SIA New Product Showcase a success.”. Additionally, Marc R. The 2021 SIA New Product Showcase award winners are: Best New Product Award.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISO 27001 Requirements Checklist: Steps and Tips for Implementation

Reciprocity

8 – Asset Management. Asset Management, Annex A.8 This section addresses how organizations define acceptable information protection obligations and identify information assets. Businesses frequently use consulting firms to complete the ISO 27001 gap analysis. 5 – Information Security Policies.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

The categories, in turn, consist of 108 sub-categories listing the requirements and controls necessary to satisfy each category, well as “informative references” that provide a list of additional frameworks and other resources to consult for more information. How you manage this access depends on the risks associated with unauthorized access.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

The categories, in turn, consist of 108 sub-categories listing the requirements and controls necessary to satisfy each category, well as “informative references” that provide a list of additional frameworks and other resources to consult for more information. How you manage this access depends on the risks associated with unauthorized access.