- Chief Compliance Officer and VP of Legal Affairs, Arrow Electronics
By Tammy Whitehouse2014-12-09T11:00:00
As cyber-security attacks become everyday news, companies are racing to identify and mitigate their risks. Some of that is “pure” IT security; much of it is about applying a control framework smartly to new technologies—and empowering the right person to oversee these risks. “Companies ... for the most part are ...
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2015-08-04T14:30:00Z By Edith Orenstein
Image: Gone are the days when “access control” meant locking your door or filing cabinet. Now compliance, IT, and audit teams must collaborate on controls to access networks rather than physical stores of information. Inside, we look at three best practices to design strong access control and at how to ...
2015-02-10T11:45:00Z By Joe Mont
Image: Again and again, with both guidance and comment letters, the SEC has urged companies to avoid using “boilerplate” language in disclosures—and companies never seem to embrace the message. “There is an extraordinary amount of boilerplate disclosure across topics and across industries,” says Jean Rogers, head of the Sustainability Accounting ...
2015-01-21T11:15:00Z By Tammy Whitehouse
Internal auditors with not enough to do, cheer up: Digital marketing risk is emerging as a new headache to keep you busy. Data theft and fraud are rampant, and ways to find and seal up those weaknesses aren’t entirely clear. “It’s a newer area,” says Bill Michalisin of the Institute ...
Site powered by Webvision Cloud