Browse the SRC




Search within: Entire SIG Website
  


Original Source: Risk Support

"The following Checklist is intended to provide general information to assist clients in managing and minimising the risks associated with short and long-term...

Original Source: ITIL / Wikipedia

"ITIL (formerly an acronym for Information Technology Infrastructure Library) is a set of detailed practices for IT service management (ITSM) that focuses...

Original Source: Wikipedia / CMMI

"Capability Maturity Model Integration (CMMI) is a process level improvement training and appraisal program. Administered by the CMMI Institute, a...

Original Source:  Fair Institute by Rachel Slabotsky

"I recently had a conversation with clients around a risk analysis they conducted and noticed as they walked me through it that they...

Original Source: Reciprocity WRITTEN BY KAREN WALSH

"PCI DSS compliance comes with over 100 pages of requirements. However, the Appendices offer ways to think about how you can limit your...

Original Source: Advocate Daily

"New causes of action for breach of privacy make data breach one of the most significant risks facing Canadian companies — but organizations may have an...

Original Source: The OCC

"At the Office of the Comptroller of the Currency, we are making certain that institutions with federal charters have a regulatory framework that is receptive to...

Original Source: GSX Blog by Eileen Fitzgerald

"We are delighted to post an article on the challenges of managing Service Leve Agreements by ITIL Standards, by Bill Heffernan of SureSkills...

Original Source: Vericode By Evan Wade

"The fact that communication is a vital aspect of successful third-party relationships is obvious. ("You mean to tell me I have to talk to the...

Original Source: Uni Assignment Center

"Introduction; this research is outline the various factors of business environment to achieve their business objective through main three prospects,...

Pages