- Chief Compliance Officer and VP of Legal Affairs, Arrow Electronics
By Matt Honea, CW guest columnist 2023-10-17T13:46:00
The need to prove network compliance is intensifying as lawmakers introduce new privacy legislation and organizations update their contractual security requirements for third-party vendors.
Determining if they’ll meet compliance standards is simple for those who know their network’s behavior, device configuration, and security posture. Unfortunately, most enterprises don’t have this information readily available and spend months manually preparing for inspection.
Continuous access to accurate inventory, real-time data collection and retrieval, and automation are crucial to detecting network issues and thwarting cyberattacks. Those elements are game changers in preparing for and proving compliance by enabling organizations to proactively monitor the network and enforce compliance in a dynamic and efficient manner.
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2023-11-03T10:03:00Z By Adrianne Appel
New York will require financial institutions to conduct risk assessments more often and improve governance under a broad update to the state’s cybersecurity regulations.
2023-11-02T15:00:00Z By Al Raymond, CW guest columnist
“Every compliance activity is a sales activity,” writes Al Raymond, privacy compliance officer at ZoomInfo, regarding his team’s approach to demonstrate to sales how a strong control environment can be a competitive advantage.
2023-10-25T18:04:00Z By Adrianne Appel
Mounting compliance requirements and technological innovations have chief risk officers facing more complex risk environments, according to a KPMG survey.
2025-03-28T14:22:00Z By Thomas Graham, CW guest columnist
Many small organizations within the Defense Industrial Base are struggling to meet the rigorous requirements validated through the Cybersecurity Maturity Model Certification, writes Thomas Graham, CISO at Redspin. If you haven’t been tracking it closely, CMMC was finalized in October, with an effective date of December 16, 2024.
2025-02-10T15:27:00Z By Rezaul Karim, CW guest columnist
The dark web has been depicted as a long-standing hub for crimes, where illegal activities such as drug dealing, financial fraud, weapon sales, murder for hire, stolen credit cards, and ransomware gags are easily accessible to the public.
2024-10-08T14:13:00Z By Jeff Dale
American Water Works Company, which supplies drinking water and wastewater to 14 million customers, disclosed a breach of its computer networks and system due to a cybersecurity incident.
Site powered by Webvision Cloud