How ISO Standards Address Third-party Risk Management
ISO is one of the most widely used vendor risk management frameworks. Certification to ISO/IEC 27001 is…
Cyber Leaders of the World: Timothy Spear, Co-Founder and CTO of Whonome
Please tell us a bit about yourself, your background, and your journey of becoming a co-founder and…
Student Data Privacy: Balancing Privacy and Innovation
Privacy a Growing Risk for Students Along with this explosion in the growth of online learning tools…
Vendor Management Best Practices for Lasting Success
What is Vendor Risk Management? Managing the risks posed by the large network of vendors associated with…
Preparing for the Future of EdTech Security: What Companies Need to Know
What is EdTech? Short for education technology, EdTech includes applications and digital technology used in primary, secondary,…
Leveraging NIST OSCAL to Provide Compliance Automation: The Complete Guide
What is OSCAL? OSCAL provides a traceable and machine-readable data format for capturing and sharing security information.…
Texas Privacy and Security Act: Key Points
And Then There Were Ten The Texas Data Privacy and Security Act (HB4) was approved by the…
Understanding the Florida Digital Bill of Rights
Florida Senate Bill 262 has passed in the Republican-led Florida legislature. The Florida Privacy Act attempts to…
High-profile Data Breaches: the Controls That Could Protect You
Data breaches can have far-reaching financial and reputational impacts on your business. Without proper attention to detail…
Cyber Leaders of the World: Andrew Dutton, Virtual CISO at DuHart Consulting
Please tell us a bit about yourself, your background, and your journey of becoming a Virtual CISO…
NIST 800-171 Revision 3: The Impact on CMMC Compliance and How To Get Ready
If you are a company that holds a contract with the DoD and handles CUI, you are…
Centraleyes Central Class: Mastering Cyber Risk and Compliance Management - Best Practices and Solutions
Watch this Central Class session to learn how you can streamline your cyber risk and compliance management.…
How to Prepare for Montana Consumer Data Privacy Law
They’re Coming Fast and Furious! On April 21, 2023, the Montana Consumer Data Privacy Act (MCDPA) passed…
Everything You Need to Know About the Tennessee Consumer Data Privacy Law
First Same-Date Privacy Laws Tennessee and Montana just passed privacy laws on the same date, April 21,…
What Indiana State Data Privacy Law Means for Your Company
Last week, Senate Bill 5 passed unanimously in The Indiana House with a definitive 98-0 vote. The…
Centraleyes Launches the First of its Kind Higher-Ed Cyber Risk Program in Collaboration with FSU
The key objective is to bring hands-on training and experience on best practices and the key role…
Iowa Passes Data Privacy Law: What You Need to Know to Be Compliant
Iowa joined the privacy club last week when it passed a comprehensive consumer data privacy law, officially…
Centraleyes Product Webinar: Next Gen GRC - 3rd-Party Vedor Risk Management
Does the term GRC make you cringe? Do you find yourself procrastinating any task related to risk,…
Understanding Qualitative and Quantitative Risk Analysis in Definitive
Calculating risk is similar to attempting to forecast the future; you won’t always be accurate, but with…