Browse the SRC




Search within: Entire SIG Website
  


Original Source:  Fair Institute by Rachel Slabotsky

"I recently had a conversation with clients around a risk analysis they conducted and noticed as they walked me through it that they...

Original Source: Reciprocity WRITTEN BY KAREN WALSH

"PCI DSS compliance comes with over 100 pages of requirements. However, the Appendices offer ways to think about how you can limit your...

Original Source: Advocate Daily

"New causes of action for breach of privacy make data breach one of the most significant risks facing Canadian companies — but organizations may have an...

Original Source: GSX Blog by Eileen Fitzgerald

"We are delighted to post an article on the challenges of managing Service Leve Agreements by ITIL Standards, by Bill Heffernan of SureSkills...

Original Source: Vericode By Evan Wade

"The fact that communication is a vital aspect of successful third-party relationships is obvious. ("You mean to tell me I have to talk to the...

Original Source: Uni Assignment Center

"Introduction; this research is outline the various factors of business environment to achieve their business objective through main three prospects,...

Original Source: TBI Central

"This paper was developed for companies who are considering or in the process of sourcing major Information Technology (IT) or Business Process programs to an...

Original Source: KJ Koster

"There are many different methods and techniques for monitoring distributed systems. Most people do not explicitly state what type of monitoring they desire or...

Original Source: Security Scorecard

"Point-in-time assessments are outdated as soon as they're made. They don't take into account changes in security posture. If a vendor is breached, you...

Original Source: NY Times

"On a Thursday evening in mid-January, a group of top Wells Fargo executives sat down for dinner in an upscale surf-and-turf restaurant near the White House. At...

Pages