Rsam
Rsam
Blog Post

New blog articles detected.

  • Here’s What Security Leaders Want from NIST CSF
    Recently, Rsam CEO Vivek Shivananda spoke with a diverse and engaged group of information security leaders who came to discuss the NIST CSF framework. The session was moderated by ISMG Media Editor Tom Field. The conversation revealed common challenges and hopes around how NIST CSF can help improve an organization’s security posture. During the conversation, […] The post Here’s What Security Leade...
Rsam
Rsam
Blog Post

New blog articles detected.

  • Corporate Compliance & Oversight Primer
    Organizations understand that risk is fluent and every-present. It typically falls to the Chief Compliance to keep the Board of Directors and other stakeholders informed while ensuring that the company is ‘in compliance’ a vast array of regulations, policies and standards. The challenge of managing so many moving parts can be a constant battle.  Manual […] The post Corporate Compliance & Oversight...
Rsam
Rsam
Blog Post

New blog articles detected.

  • Is Your Healthcare Organization Set to Meet the Demands of Cybersecurity?
    If you don’t have a CISO, probably not. Recent outbreaks of cyberattacks like WannaCry, Petya and NotPetya can do a significant amount of damage to healthcare companies, who have a wealth of rich sensitive private health information. The acceleration of these types of attacks has created a surge of activity among InfoSec leaders who are […] The post Is Your Healthcare Organization Set to Meet the ...
Rsam
Rsam
Blog Post

New blog articles detected.

  • What Factors Impact Successful Implementation of NIST CSF?
    Many organizations plan to align their risk and compliance program around the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF)? The framework, introduced several years ago, is quickly becoming one of the world’s de facto security standards yet organizations are struggling to implement it. Some of the struggle stems from not having an […] The post What Factors Impac...
Rsam
Rsam
Blog Post

New blog articles detected.

  • Why Do GRC Platforms Have a Bad Rap?
    Rsam CEO Vivek Shivananda was recently interviewed by the editor of TechCompanyNews.com. They dug into reasons why traditional GRC platforms have gotten a bad rap due to issues like over-engineered designs and the inability to adapt to change. Read the interview here. The post Why Do GRC Platforms Have a Bad Rap? appeared first on Rsam.
Rsam
Rsam
Blog Post

New blog articles detected.

  • How can C-Suite implement effective GRC strategies?
    Organizations world-wide are tasked with an avalanche of risk and compliance challenges. Reporter Glesni Holland, from CNME magazine, which covers stories across enterprise technology in the Middle East, interviewed Rsam CEO Vivek Shivananda to get his insight on this topic. Read the interview on CNME, highlights include: Data siloes impede your view of risk An integrated reference […] The post Ho...
Rsam
Rsam
Blog Post

New blog articles detected.

  • Audio Blog: Rsam CEO Interviewed About Being Named Leader in New 2017 Magic Quadrant for IT Risk
    Listen to Rsam CEO Vivek Shivananda talk about the Gartner 2017 IT Risk Management Magic Quadrant, published June 29, 2017 Magic Quadrant. In this two-minute audio clip, Shivananda discusses how analyst reports have evolved over the years and his view of the importance of these publications to organizations seeking solutions to risk and compliance challenges. […] The post Audio Blog: Rsam CEO Inte...
Rsam
Rsam
Blog Post

New blog articles detected.

  • Gartner 2017 IT Vendor Risk Management Magic Quadrant Sheds Light on Common Challenges
    Nearly every risk and compliance leader agrees that managing vendors isn’t easy. Some enterprises have tens of thousands of vendors across the world. Automation and adaptability are the keys to success.  Gartner as just published its 2017 IT Vendor Risk Management Magic Quadrant.  Enterprises use it to help them navigate the often complex path to […] The post Gartner 2017 IT Vendor Risk Management...
Rsam
Rsam
Blog Post

New blog articles detected.

  • Gartner 2017 IT Risk Management Magic Quadrant Available
    The Gartner 2017 IT Risk Management Magic Quadrant is now available. The report (published June 29, 2017 by analysts Khushbu Pratap, Jeffrey Wheatman,  and Matthew T. Stamper) is used by information security, risk management and compliance leaders around the world to help them understand their choices when it comes to managing risk and compliance. Rsam is named a Leader in this […] The post Gartne...
Rsam
Rsam
Blog Post

New blog articles detected.

  • DDoS Detection & Response Rates Not Keeping Up with Spike in Attacks
    According to a recent report titled, “Worldwide DDoS Attacks and Cyber Insights” Research Report” (by Neustar), the volume and velocity of DDoS attacks while detection and response times are lagging. More than 1,000 survey respondents across vertical industries participated in the survey. Eight-four percent said their organization suffered a DDoS attack in the last year, […] The post DDoS Detectio...
Rsam
Rsam
Blog Post

New blog articles detected.

  • Incident Response Reconsidered
    Listen to the full interview Rsam’s Timmerman on Why Organizations Need Both Proactive and Reactive Strategies Many security leaders argue over whether their incident response posture needs to be proactive or reactive. But Rsam CISO Bryan Timmerman says it isn’t either or – that organizations need both. Here’s why. “If you’ve got an incident response […] The post Incident Response Reconsidered app...
Rsam
Rsam
Blog Post

New blog articles detected.

  • Cognosec Interviews Bill Dedrick on How Organizations Benefit from the Rsam GRC Platform
    Rsam is an agile platform specialising in GRC which can track every aspect of your companies Risk, Threats and Regulatory Change.  As part of Cognosec’s Partner Profile series, we speak to Rsam’s Bill Dedrick, Chief Revenue Officer at Rsam, to find out how organizations can benefit from its GRC platform. Could you explain briefly what […] The post Cognosec Interviews Bill Dedrick on How Organizati...
Rsam
Rsam
Blog Post

New blog articles detected.

  • This is Not Another Wannacry Blog
    Ok. Maybe it’s a little. As cyber-attacks and cyber-terrorism make news daily, we are often treated to the same cyber-security maxims you hear at every keynote address: “Your security program should be proactive not reactive.” Who doesn’t want to be proactive? It sounds good at board meetings and strategic conversations with leadership.  However, the hype […] The post This is Not Another Wannacry ...
Rsam
Rsam
Blog Post

New blog articles detected.

  • What if Netflix Put as Much Energy into Vendor Risk Assessments as They Do on Movie Reviews?
    Earlier this month, Netflix discovered something that Financial Services & Healthcare organizations already knew; you’re only as secure as your most insecure partner.  A hacker published ten upcoming episodes of the new season of the Netflix show, “Orange is the New Black.” The cyberattack was conducted on Netflix via their post-production vendor, Larson Studio. The […] The post What if Netflix Pu...
Rsam
Rsam
Blog Post

New blog articles detected.

  • NY State Announces Record Number of Breaches in 2016. Will 23 NYCRR 500 Stem the Tide in 2017?
    Just three weeks after the effective date of the new NY State Cybersecurity regulations, New York Attorney General, Eric T. Schneiderman, announced that in 2016 his office received a record number of data breach notices in 2016. The close to 1,300 reported data breaches in 2016 represented a 60 percent increase over the previous year; […] The post NY State Announces Record Number of Breaches in 20...
Rsam
Rsam
Blog Post

New blog articles detected.

  • (Audio) What’s the True ROI of Automating Vendor Risk?
    Organizations across sectors have come to understand the inherent security risks posed by third-party vendors. But too many approach vendor risk management with a manual process, says Daniel de Juan of Rsam. To attain true ROI, security leaders must explore new, automated VRM solutions, says de Juan, Director of Product Management at Rsam. “Manual processes […] The post (Audio) What’s the True ROI...
Rsam
Rsam
Blog Post

New blog articles detected.

  • NY State Says New Regulations Could Provide National Cyber Model for Insurance Companies
    At the National Association of Insurance Commissioners (NAIC) meeting in Denver this weekend, Maria Vullo, superintendent of the NY State Department of Financial Services, said that other states should adopt NY’s cybersecurity regulations as an example of how insurance companies could protect their organizations from breaches. “We believe the best way for industry to focus […] The post NY State Sa...
Rsam
Rsam
Blog Post

New blog articles detected.

  • Vendor Risk Concerns Top of Mind for 83% of Survey Respondents
    Concerns about third party risk continue to dominate the risk and compliance conversation. As enterprises outsource more and more of their business operations to third parties, their exposure to shared risk grows exponentially. More than 150 risk and compliance professionals registered for Rsam’s webinar today titled “Vendor Risk Management Checklist: Are Your Ready?” During the webinar attendees ...
Rsam
Rsam
Blog Post

New blog articles detected.

  • New York’s New Cybersecurity Regulations Start Today
    After considering all the feedback that was submitted during the 45-day comment period, the state of New York’s new cybersecurity regulations were enacted today. While most regulations seem rote, this one has an interesting twist. “This is the first time I’ve seen a regulator explicitly allow firms to outsource the Chief Information Security Officer (CISO) role,” […] The post New York’s New Cybers...
Rsam
Rsam
Blog Post

New blog articles detected.

  • Vendor Risk Management Ranks High on the Minds of RSA 2017 Attendees
    Vendor Risk Management (VRM) was a hot topic discussed on the exhibit floor at RSA 2017. The Rsam team on-site collected comments they heard from risk and compliance professionals trying to wrangle in vendor risk.  We weren’t surprised to learn that the struggle is real and causing lots of hand-ringing. With hundreds or even tens […] The post Vendor Risk Management Ranks High on the Minds of RSA 2...
Rsam
Rsam
Blog Post

New blog articles detected.

  • Healthcare Regulations Under Trump: What Will Change?
    The Healthcare industry is no stranger to change. As a new administration settles into the White House it naturally begs the question, “what’s in store?” While the administration has stated a position of ‘less government,’ it’s hard to predict how and when it might impact industry laws and regulations. According to a report by HealthcareInfoSecurity.com, […] The post Healthcare Regulations Under T...
  • Cloud Administrator
    LOCATION: ALL MAJOR US CITIES OVERVIEW Rsam is a market leader and fastest time to value provider of Governance, Risk and Compliance (GRC) solutions. The Rsam platform delivers unparalleled flexibility for companies to leverage Out-Of-The-Box solutions and “Build Your Own” (BYO) applications for a wide range of GRC functional areas including Audit, Business Continuity Management, […] The post Clou...
  • Security Incident Response Event: Norfolk, VA February 2
    A new report released today by MarketIntelReports shows the global incident response market is expected to grow at a CAGR of 12.99% between now 2020. Concerns over data loss continue to plague organizations as scrutiny becomes even more intense.  Often the biggest impediments to addressing incident response begin with internal roadblocks. Rsam is hosting a […] The post Security Incident Response E...
  • Risk & Compliance Predictions for 2017
    The New Year is almost here. As risk and compliance professionals, it’s in our DNA to anticipate situations that will likely come our way and figure out how we’ll respond.  Here are five predictions that Rsam is tracking for 2017. #1 – Organizations Will Favor Speed over Perfection One reason GRC platforms have had a […] The post Risk & Compliance Predictions for 2017 appeared first on Rsam.
  • Rsam survey discovers 46% of respondents aren’t using metrics for their vendor risk management program.
    How long is your commute from work to home? I live just 7 miles away from my office but it can take anywhere from 30 minutes to an hour. Given the wide time variances, I experiment with many different routes. Regardless which route I may take on any given day, I always time my trip. […] The post Rsam survey discovers 46% of respondents aren’t using metrics for their vendor risk management program....
  • Can You Use an IT Ticketing Platform for your GRC Program?
    We recently published a paper, “Which Platform is the Best Fit for Your Use Case? Comparing Salesforce, ServiceNow and Rsam.” Since then we’ve gotten questions pertaining to the value of using an IT System, like ServiceNow, for GRC activities. Most people seem to have a primary motivating for taking this route, which is to leverage […] The post Can You Use an IT Ticketing Platform for your GRC Pro...
  • Vendor Risk Management Best Practices: Questions & Answers
    Rsam and PWC met with Atlanta area businesses on November 3 to talk about the hot topic of vendor risk management (VRM). Attendees asked great questions about best practices. We want to share them since they’re likely universal. Question: Is there a success story about a company that’s done VRM well? And, which functional area should ‘own’ […] The post Vendor Risk Management Best Practices: Questi...
  • Information Security GRC vs Information Technology GRC – Who Owns It?
    Do you consider IT governance, risk and compliance (GRC) a function of IT or Information Security (IS)? It’s a fundamental question that could impact the success of your program. For one, it can dictate who has decision-making, accountability and jurisdiction over the tools you use to manage IT-GRC. Confusion about ownership often arises because the […] The post Information Security GRC vs Informa...
  • New Fed Cybersecurity Proposal Impacts Financial Services
    Federal banking regulators aim to impose new cyber security standards on financial institutions with $50B or more in assets. The FDIC, Federal Reserve and OCC published the new guidelines on October 19 and expect to finalize them in January 2017. What does it mean for you? The proposal calls for higher standards imposed on institutions […] The post New Fed Cybersecurity Proposal Impacts Financial ...
  • Does Your Vendor Risk Management Comply with FFIEC Updates?
    The FFIEC recently updated its landmark Information Security (IS) Booklet, which provides guidance for organizations’ Information Security Program and Risk Management processes. The update was intended to bring additional focus to IT risk management as well as update information security processes. One area of increased scrutiny is third party risk management. Analyst firm Gartner predicts […] The...
Rsam
Rsam
Blog Post

New blog articles detected.

  • A CISO’s 8 Recommendations for a Security Incident Response Program
    Most large organizations have a security incident response (IR) program in place – even if it only exists in a three-ring binder. The challenge for most is to get from its current form into an automated platform that will empower you to respond better, faster and with precision. In a presentation delivered during Rsam’s 2016 […] The post A CISO’s 8 Recommendations for a Security Incident Response ...
  • The Yahoo Breach & Vendor Access Reviews
    Yahoo confirmed yesterday that 500 million of their clients personal information was stolen in a 2014 breach of historic proportion. The theft may have included email addresses, phone numbers, dates of birth, passwords and security questions and answers.  Yahoo said it is warning its customers who may have been effected to reset their passwords and […] The post The Yahoo Breach & Vendor Access Rev...
Rsam
Rsam
Blog Post

New blog articles detected.

  • Support Services Policies
    Support Services Policies Relational Security Corporation (“Rsam”) Support Services Policies OVERVIEW Support Services are available only to licensees with valid Software licenses. Technical Support is provided for current release(s) of the Software provided the software has not been altered. Rsam is not responsible for Software installed on hardware or with operating system configurations that fa...
  • Is Your Organization Over-Exposed to Vendor Risk?
    Before Target and Home Depot there was the Epsilon breach. Deemed the “Hack of the Century” in 2011, it was a massive breach impacting the world’s largest brands caused by a company that consumers probably never heard of. Epsilon, one of the world’s largest digital marketing firms, handles more than 40 billion emails a year […] The post Is Your Organization Over-Exposed to Vendor Risk? appeared fi...
  • A Healthcare Company Offers Best Practices for Security Incident Response
    Cyber security is truly an exercise in managing daily chaos to prevent a negative impact to the organization. Information security leaders are conductors of a vast orchestra of people, processes and technology that must all play from the same sheet of music. Their job gets more difficult every year as the scope of what needs […] The post A Healthcare Company Offers Best Practices for Security Inci...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.