Results for

Sort by:
  • Blog
    February 6, 2020
    We see the dissonance all the time. Organizations struggle to get their IT and accounting teams working together and IT’s desire to introduce cloud computing to the mix can often strike a flat note. Fortunately, harmony can be achieved in just three simple steps. On its face, “moving to the cloud” seems like a simple enough term. Yet, as we will see, the term “cloud” carries a lot of meanings.…
  • Blog
    February 7, 2020
    On October 10, 2019, the California Attorney General released proposed regulations to the California Consumer Privacy Act (CCPA), introducing some new requirements that were not originally included in the CCPA. The regulations are divided into seven articles, which we discussed in an earlier blog here. In this post, we will undertake a comprehensive review of the proposed regulations and identify…
  • Blog
    January 9, 2020
    When it comes to cybersecurity and privileged access management (PAM), we have some bad news, and we have some good news. “Breaches are inevitable” is the bad news. But the good news is that adding resiliency to PAM programs can, and will, make a significant difference in an organization’s risk posture. In a recent webinar on this topic, we focused on how cyber resiliency gives organizations the…
  • Blog
    January 10, 2020
    In a recent news briefing, the California Attorney General (AG) gave insight on two topics regarding the California Consumer Privacy Act (CCPA), which took effect on January 1. A question frequently asked is whether an organization has to include the “Do Not Sell My Personal Information” button or link on the business’ homepage? Furthermore, the Consumer Privacy Rights Act of 2020, colloquially…
  • Podcast
    December 12, 2021
    Transparency and consequences can be powerful leadership deterrents.
  • Blog
    January 16, 2020
    When extreme events happen, it’s major news. And likely, we all find ourselves thinking, “Thank God it’s not us.” This time. We all remember the 2017 nightmare scenario shipping giant Maersk endured when it was infected with the NotPetya virus, essentially bringing the company’s infrastructure and technology to a complete halt. Forty thousand end-user devices, 4,500 servers and 2,500 applications…
  • Blog
    May 24, 2018
    For as long as business intelligence (BI) has existed, organizations have made significant investments in high-performing platforms – only to find no one will use the solution. Why? For one, end users cannot find information quickly, or at all. Two, the information they do find isn’t relevant. Three, they expect their BI systems to work as effortlessly as popular search engines and social media,…
  • Whitepaper
    August 1, 2022
    The purpose of security analytics in an organization Security metrics and the analysis of security information can be challenging concepts even for leading organizations. As information security professionals, most of us have been taught that in order to have a mature information security function we must both document and measure the organization’s security capabilities. If policies are the…
  • Whitepaper
    August 1, 2022
    U.S. Deputy Attorney General Lisa Monaco has called sanctions “the new FCPA.” [1] The EU has issued a proposal that would make sanctions evasion an EU crime [2] . The U.K.’s Office of Financial Sanctions Implementation (OFSI) is under pressure from key global partners to step up its enforcement activity [3]. These developments are just a few of the signs that the national…
  • Blog
    June 14, 2018
    The clock is ticking as organizations get set to meet the requirements of new lease accounting standards. Issued in February 2016, FASB Accounting Standards Codification (ASC) Topic 842 requires lessees to report assets and liabilities related to leases of one year or more on the balance sheet. The new lease standard takes effect starting December 2018 for public companies and a year later for…
Loading...