IT Risk & Cybersecurity News

IT Governance Policy Management: 3 Recommendations for CIOs

To successfully meet their compliance objective, Chief Information Officers (CIOs) must implement a risk-adjusted information technology (IT) governance policy framework.   Having good IT risk mandates in place enables you to better understand what your enterprise policies need to look like, and why.  If done effectively and efficiently, having an appropriate framework in place in the right way safeguards your organization from risk and helps you ...

What’s Next for Operational Resilience and EU DORA

The European Union (EU) Digital Operational Resilience Act (DORA), like Spring, is in full swing. I’ve had the good fortune in my role at SAI360 to meet with the Swiss Risk Association, speak at a CeFPro (Center for Financial Professionals) event in London, and participate in a DORA lunch briefing with Luxembourg’s Institute of Internal Auditors and consultants from Deloitte.   EU DORA talk ...

Healthcare Organizations Must Do More to Protect Patient Data from Breaches

Healthcare data breaches are on the rise. In March 2023, there were 63 healthcare data security breaches each impacting more than 500 patients reported to the U.S. Department of Health and Human Services' Office for Civil Rights (OCR). For comparison, February 2023 had 43 and January had 40, reports HIPAA Journal.  This is a 46 percent increase from February, nearly seven percent more than the 12-month average, ...

By |2025-04-28T02:20:19+00:00May 1st, 2023|Compliance, Healthcare GRC, IT Risk & Cybersecurity|

Smart Cyber Defenses Demand a Strategic Approach and Recognized Best Practices (PDF)

Thank you for your interest in the Smart Cyber Defense Whitepaper. Download Healthcare executives are facing significant cybersecurity challenges. This is due to the highly digitized industry landscape. And healthcare’s larger attack surface compared to other industries. In the meantime, cyberattacks are becoming increasingly sophisticated and strategic. These often involve organized criminals and cyber gangs that are highly trained, well-funded, and sometimes even protected by ...

5 Tips to Make Cyber Security in Australia a Business Priority

With over 200 reported cyber incidents every day, Australia is known as one of the most hacked countries in the world. Cyber security in Australia is very much needed. Australia's federal government recently issued the Enforcement Act with harsh penalties to incentivize businesses to improve privacy and data security measures. Penalties for severe and repeated interferences with privacy increased from 2.2 million to 50 million ...

By |2025-04-28T02:13:28+00:00March 14th, 2023|IT Risk & Cybersecurity|

Focus on Fundamentals for IT Security and Risk Management

Security and risk management (SRM) leaders are challenged today by the demands of their positions and expectations from stakeholders. Customers, regulators, auditors, and senior management want different things from SRM leaders. Identifying the processes and services that will demonstrate the value and communicate metrics and information sought by stakeholders is also difficult. Meanwhile, SRM leaders face regulatory requirements that are either new or continuously changing. ...

Key Drivers for 2023 Data Privacy & Information Security Training

Data privacy and information security training continue to remain a top organizational priority. The number and sophistication level of phishing attacks continues to grow worldwide. In the six months ending October 2022, phishing attacks grew by 61 percent over the same period in the previous year. And a recent study by the Anti-Phishing Working Group (APWG) found that in the third quarter of 2022, worldwide phishing attacks ...

By |2025-04-28T02:12:58+00:00March 7th, 2023|Ethics & Compliance Learning, IT Risk & Cybersecurity|