How ISO Standards Address Third-party Risk Management

How ISO Standards Address Third-party Risk Management

ISO is one of the most widely used vendor risk management frameworks. Certification to ISO/IEC 27001 is…
Cyber Leaders of the World: Timothy Spear, Co-Founder and CTO of Whonome

Cyber Leaders of the World: Timothy Spear, Co-Founder and CTO of Whonome

Please tell us a bit about yourself, your background, and your journey of becoming a co-founder and…
Student Data Privacy: Balancing Privacy and Innovation

Student Data Privacy: Balancing Privacy and Innovation

Privacy a Growing Risk for Students  Along with this explosion in the growth of online learning tools…
Vendor Management Best Practices for Lasting Success

Vendor Management Best Practices for Lasting Success

What is Vendor Risk Management? Managing the risks posed by the large network of vendors associated with…
Preparing for the Future of EdTech Security: What Companies Need to Know

Preparing for the Future of EdTech Security: What Companies Need to Know

What is EdTech? Short for education technology,  EdTech includes applications and digital technology used in primary, secondary,…
Leveraging NIST OSCAL to Provide Compliance Automation: The Complete Guide

Leveraging NIST OSCAL to Provide Compliance Automation: The Complete Guide

What is OSCAL? OSCAL provides a traceable and machine-readable data format for capturing and sharing security information.…
Texas Privacy and Security Act: Key Points

Texas Privacy and Security Act: Key Points

And Then There Were Ten The Texas Data Privacy and Security Act (HB4) was approved by the…
Understanding the Florida Digital Bill of Rights

Understanding the Florida Digital Bill of Rights

Florida Senate Bill 262 has passed in the Republican-led Florida legislature. The Florida Privacy Act attempts to…
High-profile Data Breaches: the Controls That Could Protect You

High-profile Data Breaches: the Controls That Could Protect You

Data breaches can have far-reaching financial and reputational impacts on your business.  Without proper attention to detail…
Cyber Leaders of the World: Andrew Dutton, Virtual CISO at DuHart Consulting

Cyber Leaders of the World: Andrew Dutton, Virtual CISO at DuHart Consulting

Please tell us a bit about yourself, your background, and your journey of becoming a Virtual CISO…
NIST 800-171 Revision 3: The Impact on CMMC Compliance and How To Get Ready

NIST 800-171 Revision 3: The Impact on CMMC Compliance and How To Get Ready

If you are a company that holds a contract with the DoD and handles CUI, you are…

Centraleyes Central Class: Mastering Cyber Risk and Compliance Management - Best Practices and Solutions

Watch this Central Class session to learn how you can streamline your cyber risk and compliance management.…
How to Prepare for Montana Consumer Data Privacy Law

How to Prepare for Montana Consumer Data Privacy Law

They’re Coming Fast and Furious! On April 21, 2023, the Montana Consumer Data Privacy Act (MCDPA) passed…
Everything You Need to Know About the Tennessee Consumer Data Privacy Law

Everything You Need to Know About the Tennessee Consumer Data Privacy Law

First Same-Date Privacy Laws Tennessee and Montana just passed privacy laws on the same date, April 21,…
What Indiana State Data Privacy Law Means for Your Company

What Indiana State Data Privacy Law Means for Your Company

Last week, Senate Bill 5 passed unanimously in The Indiana House with a definitive 98-0 vote. The…
Centraleyes Launches the First of its Kind Higher-Ed Cyber Risk Program in Collaboration with FSU

Centraleyes Launches the First of its Kind Higher-Ed Cyber Risk Program in Collaboration with FSU

The key objective is to bring hands-on training and experience on best practices and the key role…
Iowa Passes Data Privacy Law: What You Need to Know to Be Compliant

Iowa Passes Data Privacy Law: What You Need to Know to Be Compliant

Iowa joined the privacy club last week when it passed a comprehensive consumer data privacy law, officially…

Centraleyes Product Webinar: Next Gen GRC - 3rd-Party Vedor Risk Management

Does the term GRC make you cringe? Do you find yourself procrastinating any task related to risk,…
Understanding Qualitative and Quantitative Risk Analysis in Definitive

Understanding Qualitative and Quantitative Risk Analysis in Definitive

Calculating risk is similar to attempting to forecast the future; you won’t always be accurate, but with…
Skip to content