Sign in
Sectors
AML
Application Security
Artificial Intelligence
Audit Management
Biometrics
Blockchain
Cloud Security
Compliance
Content Security
Cryptocurrency
Cyber Security
Data Loss Prevention
Data Security
Defence
DevSecOps
Digital Forensics
Disaster Management
Encryption
Endpoint Security
Enterprise Security
Firmware Monitoring
Fraud Management
Governance
GRC
IAM
IGA
Infrastructure Security
IoT Security
KYC
Managed Security
Security Talk
Home
GRCInsights
News
Conferences
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Privacy Policy
Password recovery
Recover your password
your email
Search
.
Sectors
AML
Application Security
Artificial Intelligence
Audit Management
Biometrics
Blockchain
Cloud Security
Compliance
Content Security
Cryptocurrency
Cyber Security
Data Loss Prevention
Data Security
Defence
DevSecOps
Digital Forensics
Disaster Management
Encryption
Endpoint Security
Enterprise Security
Firmware Monitoring
Fraud Management
Governance
GRC
IAM
IGA
Infrastructure Security
IoT Security
KYC
Managed Security
Mobile Security
Multifactor Authentication
Network Security
Payment Security
Penetration Testing
Perimeter Security
Physical Security
Ransomware
Regulatory
Risk Management
SaaS Security
SCRM
Security Assessment
Security Automation
Security Consulting
Server Security
Third Party Risk
Threat Management
Vulnerability Management
Web Security
Zerotrust Security
GRCInsights
About us
Conferences
APAC
CANADA
EUROPE
LATAM
MIDDLE EAST
US
Search
Linkedin
Twitter
Sectors
AML
Application Security
Artificial Intelligence
Audit Management
Biometrics
Blockchain
Cloud Security
Compliance
Content Security
Cryptocurrency
Cyber Security
Data Loss Prevention
Data Security
Defence
DevSecOps
Digital Forensics
Disaster Management
Encryption
Endpoint Security
Enterprise Security
Firmware Monitoring
Fraud Management
Governance
GRC
IAM
IGA
Infrastructure Security
IoT Security
KYC
Managed Security
Mobile Security
Multifactor Authentication
Network Security
Payment Security
Penetration Testing
Perimeter Security
Physical Security
Ransomware
Regulatory
Risk Management
SaaS Security
SCRM
Security Assessment
Security Automation
Security Consulting
Server Security
Third Party Risk
Threat Management
Vulnerability Management
Web Security
Zerotrust Security
GRCInsights
About us
Conferences
APAC
CANADA
EUROPE
LATAM
MIDDLE EAST
US
Search
Linkedin
Twitter
Home
Security
Security
Blockchain
Blockchain & GDPR – Two asymmetric or perhaps complementary concepts?
By Ioannis E. Giannakakis, Group General Counsel / Chief Compliance & Risk Officer/Group Data Protection Officer, Avramar
-
March 23, 2022
The recent entry into force on 25 May 2018 of the General Data Protection...
News
Unpacking the Tech Mishap
By GRC Outlook
-
March 22, 2022
Even though our cognitive ability is integral to what we are about, human beings...
GRCInsights
SafeBase is a portal that simplifies vendor due dilligence
By Cassio Goldschmidt, Chief Information Security Officer, ServiceTitan
-
March 22, 2022
Modern software has multiple dependencies. If a company builds software, chances are they use...
News
Tightening Up the Policy Strings
By GRC Outlook
-
March 21, 2022
As much as we fixate on the importance of internal factors, we cannot overlook...
Fraud Management
Will cannabis banking risk remain after federal recognition?
By Tony Repanich, President and Chief Operating Officer, Shield Compliance
-
March 21, 2022
As I speak with bankers across the country who are considering launching cannabis banking...
GRCInsights
Ransomware: To Pay or Not to Pay?
By Barry Coatesworth, Director - Risk, Compliance & Security, Guidehouse
-
March 21, 2022
Last year, CNA Financial Corporation, one of the biggest US insurance companies reportedly paid...
Application Security
Application developers – your first line of defense
By Allon Mureinik, Senior Manager, Synopsys
-
March 21, 2022
Defense in depth is a common concept when designing a cybersecurity strategy. The idea...
GRCInsights
The evolution of KYC
By Renitha Singh, Group Financial Crime Compliance Officer, Liberty Holdings Ltd
-
March 21, 2022
When the concept of ‘Know your customer’ was first introduced in South Africa round...
GRCInsights
Your Client is Involved in the Cannabis Industry. Now what?
By Edwin Hogans, KYC Senior Expert, St Louis office & Vaughn Swartz, Executive Vice President, Home Rabobank Group
-
March 21, 2022
Cannabis including marijuana and hemp, continues to be a hot topic and presents a...
Blockchain
Practical Applications for Blockchain at Financial Institutions
By Ryan McInerny, Senior Manager of Compliance, RiskScout
-
March 18, 2022
Let’s start with what blockchain is, a decentralized ledger technology that guarantees the authenticity...
1
...
44
45
46
...
74
Page 45 of 74
Hot Topics
MOVEit incident highlights surging IT supply chain threats
The art of crisis management in logistics as possible support for warfare.
The Importance of Governance in Payroll Management: Mitigating Risk and Ensuring Compliance
Load more