The authors of the new Cyber Risk Management Program framework explain how it can set an organization up to better comply with SEC and other disclosure and reporting regulations. In a landmark ...
TSA's Credential Authentication Technology program was one of those selected for further scrutiny by the Government Accountability Office (TSA photo) The Department of Homeland Security (DHS) spends ...
The Internet2 NET+ service portfolio is a selection of cloud solutions requested, evaluated, and advanced by the R&E community. The addition of NET+ UpGuard now expands options for third-party risk ...
Are you interested in regulatory compliance and risk management jobs in the healthcare or business finance industry? Compliance-related jobs are one of the hottest growth areas in the U.S., with the ...
The state of North Dakota detects about 4 billion cyber-related attacks a year on its systems and networks. “We get hit with a lot of different attacks,” explained Michael Gregg, North Dakota’s chief ...
The title of a March 24 report of the Housing and Urban Development Office of the Inspector General lays out the document’s ...
Amtrak’s internal yet independent Office of Inspector General (OIG) has released a report on Phase 1 (of four) of the railroad’s Long Distance Fleet Replacement (LDFR) program, defining the $7 billion ...
Risk management is the process of identifying, analyzing, and mitigating uncertainties and threats that can harm your company or organization. No business venture or organizational action can ...
Improve results from development to deployment. How do you become an invaluable leader wherever you work? Keep projects on budget, deliver on schedule and manage programs that run without a hitch. The ...