Risk
Today’s corporate environment is exceptionally challenging and presents new critical issues for boards than in the recent past. It is worthwhile for chief audit executives (CAEs) to take stock of this new environment and assess and anticipate how they can...
When it comes to cybersecurity, identifying risk is only half the battle. A CISO’s next step is to share these risks with leadership to strengthen the organization’s security posture, minimize losses and maximize the ROI of technology investments. Successfully taking...
Auditing practices are constantly evolving to meet the ever-changing needs of businesses and their customers. Modernization of audit processes is essential for internal audit productivity to keep up with the latest technological developments, such as data analytics and assurance environment...
Identifying the need for a dedicated software tool to enhance your business is only the first step toward adopting GRC technology in your organization. It’s essential to build a solid business case to get your recommendation over the line. For...
Developing a tech-aware audit function How do companies build a more agile, tech-aware audit function? What new audit technologies are necessary? How will these technologies change audit plans and activities? And what about the governance of this brave new risk...
As organizations increasingly rely on third parties to deliver elements of their service, third-party risk increases. As a result, it becomes increasingly important to know that your third-party risk management is effective. But how can you measure this? The answer: implement a...
Change is the new status quo. With rapid shifts on all fronts, organizations need accurate data to make the right decisions at the right time. Though internal audit departments have the power to stop adverse risk events in their tracks,...
Amidst heightened uncertainty, more technology and security leaders are turning to scientific models that can reduce their technology loss exposure, validate their decisions and demonstrate returns on their investments. The Diligent IT Risk Management Master Class Toolkit provides actionable guidance...
The Kenyan government has long been committed to digital transformation and has devised various initiatives to digitize its services. The country’s Vision 2030 aims to make Kenya a digital hub and increase the country’s technology capabilities. The government has also...
Only 4% of organizations don’t use any third-party apps. For the whopping 96% that do, an effective third-party risk management strategy with third-party risk management metrics is essential. Third-party risk management metrics (TPRM) help organizations understand whether or not their strategy...
Showing 1-10 of 61 results