The widespread use of information technology (IT) can introduce various risks that affect financial reporting and the audit process. To assist auditors in identifying and addressing these risks, the ...
One the most challenging areas facing healthcare organizations today is the decision to adopt an electronic health records system. This decision involves significant financial resources and time ...
As we recently discussed, CalPrivacy (the cool new name the California Privacy Protection Agency recently gave itself) adopted new CCPA regulations earlier this year ...
With the growing demands of huge data sets, an everchanging regulatory landscape, and constantly evolving typologies, the challenge of assessing, documenting, and managing financial crime risk has ...
Protecting national security information is a critically important element of the Department of Defense and intelligence community Industrial Security Program. The overall guidance is provided by 32 ...
All Software as a Service (SaaS) applications or products proposed for integration with College systems and for the use of the College community must be reviewed to ascertain compatibility with ...
Risk assessment is a systematic method of analyzing risk. It started in the nuclear and aeronautical industries, and has now spread to many other industries including the finance, transportation, ...
The FDIC says it is altering its IT risk assessment programme to cater for the increasing reliance by banks on newer technologies, such as networks, the Internet and enterprise-wide processing. The ...
Any technology risk assessment should be made in terms of the potential effect on the business, not any effect on IT assets or goals. One of my frustrations over the years has been the continuing ...
Not a subscriber? Apply online today. Risk management has been among the top priorities on board agendas and in procurement departments for many years, yet companies found themselves unprepared for ...
Every time a major Internet-connected-product is released, we keep coming back to the debate over security vs. convenience. The progression of arguments goes something like this: As a security ...