How to Achieve GDPR Cybersecurity Compliance with ERM Software
How to Achieve GDPR Cybersecurity Compliance with ERM softwareSteven Minsky | Aug. 24, 2017 In less than 9 months, the General Data Protection Regulation (GDPR), the most important change in data...
View ArticleTechnological Interconnectivity Increases Exposure to Cyber Risks
Technological Interconnectivity Increases Exposure to Cyber Risks Steven Minsky | May 31, 2016 Back in August of 2015, we discussed a vulnerability in Android’s operating system that put both personal...
View ArticleThe Freedom of Information Act Reduces Vendor Management Risk
The Freedom of Information Act Reduces Vendor Management Risk Steven Minsky | June 15, 2016 Does your organization rely on vendors or other third parties? In the likely event that it does, are your...
View ArticleMaturity Model Approach to ERM Recommended by Office of Management and Budget...
Maturity Model Approach to ERM Recommended by Office of Management and Budget (OMB Circular A-123) Steven Minsky | Aug. 17, 2016 Washington’s Office of Management and Budget, an Executive Office of...
View ArticleDomestic Political Risk: Operating in the Uncertainty of a New Era (Part 1)
Domestic Political Risk: Operating in the Uncertainty of a New Era (Part 1) Steven Minsky | March 21, 2017 What Is Domestic Political Risk? Political risk refers to conditions and events that affect...
View ArticleKmart Cyber Breach: Another Failure in Risk Management
Kmart Cyber Breach: Another Failure in Risk ManagementSteven Minsky | July 26, 2017 Kmart recently suffered another cyber breach (the second in the past few years) that echoes events affecting...
View ArticleHow to Achieve GDPR Cybersecurity Compliance with ERM Software
How to Achieve GDPR Cybersecurity Compliance with ERM softwareSteven Minsky | Aug. 24, 2017 In less than 9 months, the General Data Protection Regulation (GDPR), the most important change in data...
View ArticleHow ERM Could Have Prevented the Uber and United Airlines Pitfalls
How ERM Could Have Prevented the Uber and United Airlines Pitfalls Steven Minsky | Oct. 13th, 2017 In an increasingly transparent world, failures in risk management within the widespread and nearly...
View ArticleThe FCPA Pilot Program Guides Businesses Towards an ERM Approach
The FCPA Pilot Program Guides Businesses Towards an ERM ApproachSteven Minsky | Oct. 26, 2017 Back in June, the U.S. Justice Department declined to prosecute Boston-based engineering firm CDM Smith on...
View ArticleHow to Eliminate 81% of Your Cybersecurity Vulnerabilities in 90 Days
Eliminate 81% of Your Cybersecurity Vulnerabilities in 90 DaysSteven Minsky | March 28, 2019 Cybersecurity vulnerabilities are an increasing concern for every company in every industry. Year over year,...
View ArticleDesigning a Software that Predicts the Future
Designing a Software that Predicts the Future Steven Minsky | August 4, 2020 Some say the impacts of the coronavirus were unknowable and that the future (including a looming economic collapse) is...
View Article