News & Analysis as of

Risk Mitigation Risk Management Third-Party Service Provider

Mitratech Holdings, Inc

Compliance Down Under: Understanding Australian Regulation CPS 230

The Australian Prudential Regulation Authority (APRA) released Prudential Standard CPS 230 in March 2017. At a glance, the regulation aims to strengthen the cybersecurity resilience and operational risk management of the...more

Ervin Cohen & Jessup LLP

Mitigating a Company’s Liability When a Data Breach Is Suffered by a Vendor or Service Provider

Data breaches by large companies have been in the news for some time. Over the last several years several companies, including Marriott, Yahoo and Volkswagon, have been victimized by hackers who have broken into a company’s...more

Mitratech Holdings, Inc

What is a Vendor Risk Assessment?

We recently dove into what vendor risk and vendor risk management entails. Once you understand that this is the risk that results from vendors, it’s simple to extend this and establish that vendor risk assessment (VRA), or...more

Mitratech Holdings, Inc

What is Vendor Risk & Vendor Risk Management (VRM)?

Vendor risk management (VRM), or third-party risk management, is the management, monitoring, and evaluation of risks that result from third-party vendors and suppliers of products and services. It’s a crucial initiative...more

Reveal

The eDiscovery Impostor and How to Spot Them

Reveal on

“To err is human,” but in an industry as seemingly driven by precision as eDiscovery, errors are all too common. Yes, mistakes are going to happen. Which is why we can fall back on processes and procedures to ensure that even...more

The Volkov Law Group

Lessons Learned from the Capital One Data Breach (Part I of III)

The Volkov Law Group on

Not to say, I told you so, but around the same time that the Capital One data breach occurred, I was reminding clients that nearly half of  all significant data breaches or cyber-incidents occur because of internal actors. ...more

Morgan Lewis

MAS issues revised Guidelines on Outsourcing

Morgan Lewis on

Institutions will need to meet deadlines to conduct a self-assessment of existing outsourcing arrangements, rectify identified deficiencies, and put in place measures to mitigate interim risks where a deficiency is...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide