Rsam
Rsam
Blog Post
  • By Will Whitaker A common controls framework is the ultimate goal for most risk management groups. Whether you’re facing HIPAA, SOX, ISO 27001/2, NIST 800-53, HISTRUST CSF, or other mandates from your regulators, your IT organization has a variety of compliance requirements to meet and a common controls framework is the best way to meet […] The post Is a Compliance Risk Management Common Controls ...

Rsam
Rsam
Blog Post
  • IT Risk Management in Healthcare. Stop Using Spreadsheets for GRC. By Dawn Gustafson “Skinny the columns!” It became the battle cry and gallows-humor refrain among the dozens of IT risk management senior executives I worked with at a major healthcare insurer in 2013. We were mass-editing a spreadsheet in a conference room over a several […] The post IT Risk Management in Healthcare: Stop Using Spr...

Rsam
Rsam
Blog Post
  • Choosing the right vendor risk management software can help your organization navigate the often complex process of 3rd party risk management. As enterprises continue to outsource more aspects of their operations to third parties, they expose themselves to more shared risk. Vendor risk management can be a staggering responsibility. Most organizations understand the need to automate […] The post Ve...

Rsam
Rsam
Blog Post
  • Vendor Risk Management for Healthcare Casestudy Vendor risk management in healthcare can be a challenge. Often times multiple business units are tasked with needed assessments from legal, security and financial risk. Often, from the same vendor. An enterprise risk management platform is often the best approach to reduce duplicative tasks and create stronger buy in […] The post Vendor Risk Manageme...

Rsam
Rsam
Blog Post
  •   Is Cybersecurity One Word or Two… or Hyphenated? You’re writing your NIST Cybersecurity Framework roadmap report to the board of directors, and there it is: Cybersecurity. Do you spell it as one word or two? Or do you use a hyphen? A quick Google search shows all three spellings in practice, but less so with […] The post Is Cybersecurity One Word or Two… or Hyphenated? appeared first on Rsam.

Rsam
Rsam
Blog Post
  • What’s different about NIST CSF 1.1? As part of RSAM’s Cybersecurity Luncheons, RSAM CEO, Vivek Shivananda, has been traveling the U.S. speaking to cybersecurity professionals about the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF). While many organizations are interested in operationalizing the NIST CSF, they’re also grappling with how to do so. […] The post NI...

Rsam
Rsam
Blog Post
  • What barriers do organizations encounter as they embrace NIST CSF? The National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) has garnered a great deal of interest amongst cyber security professionals. However, as RSAM CEO Vivek Shivananda has discovered during the RSAM Cybersecurity Luncheons, the implementation of the NIST CSF does not reflect the […] The post NIST CSF...

Rsam
Rsam
Blog Post
  • What’s different about NIST CSF 1.1? As part of RSAM’s Cybersecurity Luncheons, RSAM CEO, Vivek Shivananda, has been traveling the U.S. speaking to cybersecurity professionals about the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF). While many organizations are interested in operationalizing the NIST CSF, they’re also grappling with how to do so. […] The post NI...

Rsam
Rsam
Blog Post
  • Will NIST CSF be mandated in the future by a legislative or industry body? When it comes to operationalizing the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF), cybersecurity professionals across the country share many of the same questions and concerns. One of the questions RSAM CEO Vivek Shivananda often receives during the […] The post NIST CSF Questions from ...

Rsam
Rsam
Blog Post
  • How does operationalizing the CSF benefit an organization when it comes to dealing with an attack? There is a lot of interest around the NIST CSF. A recent Rsam survey revealed that 87% of InfoSec leaders said they plan to incorporate NIST CSF into their risk and compliance strategy. A 2017 HIMSS Cybersecurity Survey also […] The post NIST CSF Questions from the Road Part 2 appeared first on Rsam.

Rsam
Rsam
Blog Post
  •   We Already Use a Control Framework. Do We Really Need NIST CSF? If your organization is interested in building a cybersecurity strategy around the NIST CSF—but you don’t know where to start—you’re not alone. Despite growing interest in the National Institute of Standards and Technology Cybersecurity Framework, many organizations continue to struggle with how […] The post NIST CSF Questions from ...

Rsam
Rsam
Blog Post
  • As compliance professionals know, the regulatory landscape is constantly changing. As soon as one regulation is complied with, a few more pop up to take its place. It takes a huge effort just to keep up with hundreds of new or updated compliance regulations, standards, and guidelines with their hundreds of redundant, overlapping controls. How […] The post Compliance by the Numbers appeared first o...

Rsam
Rsam
Blog Post
  • Andrew Vesay, Rsam Client Partner and Financial Services specialist, discusses the recent New York Department of Financial Services (NYDFS) cybersecurity regulation. Covered entities, and unregulated third party providers, must adhere to new requirements that went into effect on August 28, 2017. Andrew discusses the impact of the strict new regulation, additional pending cybersecurity reforms and ...

Rsam
Rsam
Blog Post
  • Information Management magazine recently posted this article by Rsam CEO & Co-Founder, Vivek Shivananda. First published in 2014, the NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) encompasses a set of voluntary cybersecurity risk management tools and practices to be used by the private and public sector. Its goal is to provide a […] The post Security leaders’ re...

Rsam
Rsam
Blog Post
  • Attempts to fill 36,000 cybersecurity position shortfall. Virginia just became the first state to adopt the NIST National Initiative for Cyber Security Education (NICE) Framework and is the first state to officially endorse the guideline. This action follows recent action by New York, which as of August 28, 2017 requires covered entities to be in […] The post Virginia Becomes First State to Adopt ...

Rsam
Rsam
Blog Post
  • The National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF) is giving CISOs a foundation for communicating more clearly with the board about security issues, says Vivek Shivananda of Rsam. Shivananda discusses the challenges and opportunities CISOs face today. While cybersecurity concerns give them a ‘seat at the table,’ it requires them to have […] The post BankInfoSec...

Rsam
Rsam
Blog Post
  • Andrew Vesay, Rsam Client Partner and Financial Services specialist, discusses the recent New York Department of Financial Services (NYDFS) cybersecurity regulation. Covered entities, and unregulated third party providers, must adhere to new requirements that went into effect on August 28, 2017. Andrew discusses the impact of the strict new regulation, additional pending cybersecurity reforms and ...

Rsam
Rsam
Blog Post
  • Recently, Rsam CEO Vivek Shivananda spoke with a diverse and engaged group of information security leaders who came to discuss the NIST CSF framework. The session was moderated by ISMG Media Editor Tom Field. The conversation revealed common challenges and hopes around how NIST CSF can help improve an organization’s security posture. During the conversation, […] The post Here’s What Security Leade...

Rsam
Rsam
Blog Post
  • Organizations understand that risk is fluent and every-present. It typically falls to the Chief Compliance to keep the Board of Directors and other stakeholders informed while ensuring that the company is ‘in compliance’ a vast array of regulations, policies and standards. The challenge of managing so many moving parts can be a constant battle.  Manual […] The post Corporate Compliance & Oversight...

Rsam
Rsam
Blog Post
  • If you don’t have a CISO, probably not. Recent outbreaks of cyberattacks like WannaCry, Petya and NotPetya can do a significant amount of damage to healthcare companies, who have a wealth of rich sensitive private health information. The acceleration of these types of attacks has created a surge of activity among InfoSec leaders who are […] The post Is Your Healthcare Organization Set to Meet the ...

Rsam
Rsam
Blog Post
  • Many organizations plan to align their risk and compliance program around the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF)? The framework, introduced several years ago, is quickly becoming one of the world’s de facto security standards yet organizations are struggling to implement it. Some of the struggle stems from not having an […] The post What Factors Impac...

Rsam
Rsam
Blog Post
  • Rsam CEO Vivek Shivananda was recently interviewed by the editor of TechCompanyNews.com. They dug into reasons why traditional GRC platforms have gotten a bad rap due to issues like over-engineered designs and the inability to adapt to change. Read the interview here. The post Why Do GRC Platforms Have a Bad Rap? appeared first on Rsam.

Rsam
Rsam
Blog Post
  • Organizations world-wide are tasked with an avalanche of risk and compliance challenges. Reporter Glesni Holland, from CNME magazine, which covers stories across enterprise technology in the Middle East, interviewed Rsam CEO Vivek Shivananda to get his insight on this topic. Read the interview on CNME, highlights include: Data siloes impede your view of risk An integrated reference […] The post Ho...

Rsam
Rsam
Blog Post
  • Listen to Rsam CEO Vivek Shivananda talk about the Gartner 2017 IT Risk Management Magic Quadrant, published June 29, 2017 Magic Quadrant. In this two-minute audio clip, Shivananda discusses how analyst reports have evolved over the years and his view of the importance of these publications to organizations seeking solutions to risk and compliance challenges. […] The post Audio Blog: Rsam CEO Inte...

Rsam
Rsam
Blog Post
  • Nearly every risk and compliance leader agrees that managing vendors isn’t easy. Some enterprises have tens of thousands of vendors across the world. Automation and adaptability are the keys to success.  Gartner as just published its 2017 IT Vendor Risk Management Magic Quadrant.  Enterprises use it to help them navigate the often complex path to […] The post Gartner 2017 IT Vendor Risk Management...

Rsam
Rsam
Blog Post
  • The Gartner 2017 IT Risk Management Magic Quadrant is now available. The report (published June 29, 2017 by analysts Khushbu Pratap, Jeffrey Wheatman,  and Matthew T. Stamper) is used by information security, risk management and compliance leaders around the world to help them understand their choices when it comes to managing risk and compliance. Rsam is named a Leader in this […] The post Gartne...

Rsam
Rsam
Blog Post
  • According to a recent report titled, “Worldwide DDoS Attacks and Cyber Insights” Research Report” (by Neustar), the volume and velocity of DDoS attacks while detection and response times are lagging. More than 1,000 survey respondents across vertical industries participated in the survey. Eight-four percent said their organization suffered a DDoS attack in the last year, […] The post DDoS Detectio...

Rsam
Rsam
Blog Post
  • Listen to the full interview Rsam’s Timmerman on Why Organizations Need Both Proactive and Reactive Strategies Many security leaders argue over whether their incident response posture needs to be proactive or reactive. But Rsam CISO Bryan Timmerman says it isn’t either or – that organizations need both. Here’s why. “If you’ve got an incident response […] The post Incident Response Reconsidered app...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.