IBM OpenPages GRC Services | GRC Consulting – iTechGRC

Top Telecom and Network Regulatory Compliance Risks to Watch in 2024

Federal agencies’ landmark regulations, such as the net neutrality, Truth-in-Billing policy, and robocall and texting guidelines, underscore the importance of risk and compliance management for telcos. Like every other industry, the U.S. telecom sector is a part of the GenAI adoption race, and communications services providers (CSPs) are tasked with providing proof of concept. From… Continue reading Top Telecom and Network Regulatory Compliance Risks to Watch in 2024

An Insider’s View of a BCP Failure: What an IT Manager Wants You to Know?

A business continuity plan (BCP) document is an enterprise IT manager’s crisis playbook. At a deeper level, it provides a snapshot of the IT assets, systems, and processes to be protected at all costs from probable disruptions. In summary, it highlights the importance of keeping the business running during an outage or its impact.    As… Continue reading An Insider’s View of a BCP Failure: What an IT Manager Wants You to Know?

Will the Cookie Crumble? Google Chrome Reverses the End of Third-party Cookies (Part 1)

A while ago, there were talks about entirely phasing out third-party cookies in 2024. Google Chrome also restricted third-party cookies to 1% of its browsers. In July, the search engine giant announced reversing its plan to deprecate third-party cookies and continue developments in Privacy Sandbox APIs to enhance user consent and web privacy.    Web browsers… Continue reading Will the Cookie Crumble? Google Chrome Reverses the End of Third-party Cookies (Part 1)

The Allure of Healthcare Data: Why is it a Hotbed for Healthcare Cybersecurity Breaches?

Digital health systems and data-driven medical devices enhance performance and care quality in the healthcare industry. However, converting large volumes of personal health data into digital formats for storage and usage introduces several privacy and data security concerns. Healthcare data such as patient information, clinical observations, payment details, prescriptions and treatment records, and personally identifiable… Continue reading The Allure of Healthcare Data: Why is it a Hotbed for Healthcare Cybersecurity Breaches?

Data Management and Data Governance: What’s the Difference?

  You have probably heard about data management and data governance several times in our blogs. You aren’t the only one assuming they mean the same or involve similar functions. Although they are related, there are significant differences between them. Let’s dive into understanding how these two concepts differ and operate.    What is Data… Continue reading Data Management and Data Governance: What’s the Difference?

U.S. Data Protection and Privacy Laws: Federal Updates (Part2)

As states in the U.S. intensify data protection guardrails, efforts escalate at the federal level with new rule proposals, prompt actions, and legal settlements. C-level and data privacy leaders worldwide are actively raising the bar with effective data governance to keep their firms risk-free and compliant with data protection and privacy laws.    iTech GRC’s IBM-certified… Continue reading U.S. Data Protection and Privacy Laws: Federal Updates (Part2)

Four Lessons on Avoiding a GRC Failure

Large corporations, brands, and enterprises have a fair share of reasons to fall behind their governance, risk, and compliance management objectives, resulting in a massive GRC failure. It is common knowledge that getting a hold of GRC needs is complicated, but regulatory bodies and governments quickly slap hefty penalties that can run into billions of… Continue reading Four Lessons on Avoiding a GRC Failure

FDIC Risk Review 2024: A Nuanced Approach to Risk for U.S. Community Banks

Rising interest rates and an uptick in liabilities drive banking and financial institutions into liquidity risks. We have witnessed the repercussions of misaligned liquid asset portfolios and funding resources, leading banks into epic insolvencies and meltdowns. Federal agencies issued regulatory updates to tighten lending functions. They increased the asset reserves threshold to prevent another sorry… Continue reading FDIC Risk Review 2024: A Nuanced Approach to Risk for U.S. Community Banks

Rise of Social Engineering: Types of Social Engineering Attacks (Part 2)

After a prelude to the concept of social engineering as an emerging form of cybersecurity attack, let’s explore the different forms your enterprise may likely encounter.    First, let’s have a quick look at some stats on social engineering assaults:   An average business encounters nearly 700 social engineering attacks annually.    50% of social engineering attacks… Continue reading Rise of Social Engineering: Types of Social Engineering Attacks (Part 2)

Seven Valuable Lessons on Third-party Risk Management

Recently, a leading bank made headlines for suffering a massive third-party data breach that compromised tens of thousands of its customers’ personal data. Third-party associations help banking and financial institutions deliver innovative solutions and products to cater to customer demands. Often, third-party alliances are risky and, therefore, require a highly responsive and resilient third-party risk… Continue reading Seven Valuable Lessons on Third-party Risk Management