Posted on July 9, 2015 by lexi
Herbert McMorris, Information Security Analyst
The availability of critical systems and the confidentiality and integrity of customer data are paramount to the survival of organizations today. According to a Forrester Research, Inc. report “Maximize Business Performance With A World-Class GRC Program” published May 16, 2014, “Unexpected events are at best distracting and at worst catastrophic for organizations. A critical element of any good GRC program is the ability to identify and
Posted in IT Audit Management
Posted on December 18, 2014 by ashley
This word cloud was provided by the RSA Conference during its December 15th, 2014 webinar and reflects the most frequent terms used across more than 1700 speaking submissions. The largest words are those most commonly cited in conference session titles that were submitted for consideration to be included in this year’s RSA Conference agenda.
During this December 15th RSAC webinar, Britta Glade, Senior Content Manager and Hugh Thompson, Program Committee Chair, for RSA Conferences shared
Posted in Incident Response Management, IT Audit Management, IT Compliance and Regulatory Change Management, IT GRC, IT Risk Management and Risk Assessments, Policy Management, Security Awareness Training, Social Engineering, Vendor Risk Management, Vulnerability Management
Posted on October 23, 2013 by ashley
cprlorca believes current audit and compliance management challenges will be eliminated when organizations place priority on protecting their proprietary and customer information. This is why cprlorca focuses on strategic information security risk management that leads to a streamlined audit process and compliance by default.
Once an organization has completed a risk assessment they can map identified controls to their specific compliance requirements and authority documents. Along
Posted on June 11, 2013 by traceadmin
As organizations continue to place more critical data in the cloud, they must vet their vendors and engage in due diligence to avoid security nightmares. Risks can be extreme when the wrong vendor supports an organization’s cloud-based information security efforts. cprlorca is a pioneer in cloud information security software and has recently introduced TraceCSO, an end-to-end risk management solution that helps companies prepare themselves for their migration to the cloud.
Posted on June 6, 2013 by traceadmin
The typical IT auditor is awash in documents, spreadsheets, reports and other manually generated pieces of information and is fervently trying to make sense of all of the information contained within. Auditing is a challenging and time-consuming task that makes finding an information “needle” in the data “haystack” an almost insurmountable task.
With the amount of information generated increasing exponentially and security or auditing requirements on the rise, IT audits are expensive
Posted in IT Audit Management
Posted on January 21, 2013 by traceadmin
When you’re searching for an Information Security Program, look no further than cprlorca. We are a trusted partner who works closely with you organization to ensure that the software solutions and professional services we provide you with meet your needs now and in the future. Our cloud security officer, TraceCSO, is the first and only risk and compliance solution that enables organizations to create and manage a complete risk-based information security program. The Information Security
Posted in Incident Response Management, IT Audit Management, IT Compliance and Regulatory Change Management, IT Risk Management and Risk Assessments, Policy Management, Security Awareness Training, Vendor Risk Management, Vulnerability Management
Posted on January 3, 2013 by traceadmin
Information security program development and implementation is not a simple process, but it is an absolutely essential and on-going process – particularly if your organization is responsible for maintaining the integrity, availability, and confidentiality of customer information or business-critical data. Information security programs are mandated by authorities in industries like health management, banking, and energy, as well as other state and federal agencies, but the legal and business
Posted in Incident Response Management, IT Audit Management, IT Compliance and Regulatory Change Management, IT Risk Management and Risk Assessments, Policy Management, Vendor Risk Management, Vulnerability Management