Browse the SRC




Search within: Entire SIG Website
  


Original Source: Steele Global

"This paper will address issues of concern, including:

  • Lawful Bases for Processing Personal Data Under GDPR
  • Applications of Lawful Bases...

Original Source: Steele Global

"Five practical steps to overcoming the challenges of implementing a risk-based third-party program..."

Original Source: ITIL / Wikipedia

"ITIL (formerly an acronym for Information Technology Infrastructure Library) is a set of detailed practices for IT service management (ITSM) that focuses...

Original Source: Wikipedia / CMMI

"Capability Maturity Model Integration (CMMI) is a process level improvement training and appraisal program. Administered by the CMMI Institute, a...

Original Source:  Fair Institute by Rachel Slabotsky

"I recently had a conversation with clients around a risk analysis they conducted and noticed as they walked me through it that they...

Original Source: Reciprocity WRITTEN BY KAREN WALSH

"PCI DSS compliance comes with over 100 pages of requirements. However, the Appendices offer ways to think about how you can limit your...

Original Source: Advocate Daily

"New causes of action for breach of privacy make data breach one of the most significant risks facing Canadian companies — but organizations may have an...

Original Source: GSX Blog by Eileen Fitzgerald

"We are delighted to post an article on the challenges of managing Service Leve Agreements by ITIL Standards, by Bill Heffernan of SureSkills...

Original Source: Vericode By Evan Wade

"The fact that communication is a vital aspect of successful third-party relationships is obvious. ("You mean to tell me I have to talk to the...

Original Source: Uni Assignment Center

"Introduction; this research is outline the various factors of business environment to achieve their business objective through main three prospects,...

Pages