article thumbnail

Cybersecurity Audit Checklist

Reciprocity

To assure that all those parts are working as intended, you should perform a cybersecurity audit. Audits aren’t just good sense, either; many data privacy and security regulations require audits. That said, the steps for a cybersecurity audit can be long. Define the scope of your audit.

Audit 52
article thumbnail

Not another BCM Program audit?

Stratogrid Advisory

Not another BCM Program audit? Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 4 minutes Another Business Continuity Management (BCM) Program audit. At its core, an audit is simply an assessment used to discover which areas the business will require a focus in the future.

Audit 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Not another BCM Program audit?

Stratogrid Advisory

Not another BCM Program audit? Another Business Continuity Management (BCM) Program audit. Some organizations think of audits as tedious, and often unnecessary, accounting procedures, rather than as a powerful business tool that can be used to improve the organization’s capabilities. BCM Program Audits.

Audit 52
article thumbnail

Art of Essentialism in BCM – The Disciplined Pursuit of Less

MHA Consulting

audit requests, questionnaires, etc.) Inventory all of the program initiatives (Policy, Plans, Strategies, Audits, BIAs, etc.) eliminate, transfer, outsource, etc.). I liken BCM programs to a watch with many moving parts; some critical and others not so critical to its operation and ability to provide accurate time.

BCM 52
article thumbnail

How Inflation Impacts Business Technology… and What to Do About It

NexusTek

A careful self-audit is likely to reveal that your company is paying for cloud-based and/or desktop software licenses that are not being used by your employees. This is because co-managed IT allows your in-house IT team to focus on higher-value tasks—improving job satisfaction—while outsourcing routine, but time-consuming, tasks to your MSP.

article thumbnail

Policy Management 101

Fusion Risk Management

The scrutiny is going to get even more stringent in a post-COVID world since so many institutions had to rely on aggressive outsourcing. However, for the 1/3 that don’t, here are some helpful tips and notes: Scrutiny of third-party risk practices has never been greater. The policy should be relatively brief but appropriately detailed.

article thumbnail

Severe Weather Preparedness: Managing Severe Weather Events During Other Crises

everbridge

Be ready to outsource to consultants or contractors in case there are gaps. This centralized system should be able to audit all your natural disaster communications, activities, and tasks. Processes – Prepare to update your SOPs as the ongoing pandemic continues to morph and affect public health requirements.