With 2020 coming to an end, many of us are breathing a sigh of relief. To say that it has been a tough year would be an understatement. This has especially been the case for the cybersecurity field. To paint a picture of the kind of year we’ve had, the Cybersecurity Breaches Survey 2020 is enlightening. The survey revealed that … Read More
Cyber resilience: making your third-party vendors part of your security environment
We live in an era where there’s a need for real-time visibility of an organisation’s security posture. Without this kind of clarity, we wouldn’t know if our efforts today will also work tomorrow. It takes only a single moment for an organisation’s defence strategy to come crashing down. Today, we need to shift to a more dynamic, real-time cyber defence. … Read More
Top Digital Supply Chain Risk Management Strategies
RiskXchange provides a unique 360-degree cybersecurity risk rating management approach. Organisations are constantly in a state of digital transformation and the switch to cloud services has thrown up a whole host of cyber risk factors. Cyber risk is very similar to health risk in the sense that the more vendors you come into contact with the greater the risk to … Read More
Vendor Risk Management Audit Checklist
RiskXchange’s VRM framework can identify and mitigate third-party risk factors, business uncertainties, legal liabilities, and repetitional damage. Vendor risk management (VRM) encompasses all measures that monitor and manage risks that may arise from third-party vendors and suppliers of information technology (IT) products and services. VRM programs are designed to ensure that IT service providers, third-party products and vendors cannot cause … Read More
Third Party Risk Management in the context of GDPR
The General Data Protection Regulation (GDPR) is an EU regulation on privacy and data protection. The GDPR compliance checklist covers the transfer of personal data both inside and outside of the EU and EEA areas. The GDPR gives control to individuals over their personal data and increases the obligations of organisations to deal with that data in secure and transparent … Read More