Skip to content

Insurance

Curated content for the cybersecurity, risk and compliance professional interested in Insurance.

abstract_blog_circle_lime
 Third party risk management for cyber risks in 2022

Many people view risk in business as something that should be avoided at all costs. However, we believe that with the appropriate third-party risk management processes, these..

Read More

 Considerations when shopping for cyber insurance

I just returned from the RIMS2020 conference in San Francisco and while the newly built façade of Moscone Center was impressive, COVID protocols were dialed in and many friendly..

Read More

Cyber Security Risk 101: Introduction, Frameworks and Management

More than ever, organizations of all sizes are finding themselves under increasing pressure to mitigate and manage cyber risk. With cybercrime soaring and cyber incidents..

Read More

 A quick and easy digital solution for ASIC RG 271

It is now mandatory to comply with ASIC Regulatory Guide (RG) 271. Are you ready? You know all about the complexities of managing customer complaints while juggling ASIC..

Read More

APRAcadabra – APRA CPS 234 Compliance Tips for Service Providers

If you already (or wish to) work with APRA regulated entities, this is for you. Great news! Our friends at APRA have given your clients until July 1 this year to achieve..

Read More

APRAcadabra! APRA CPS 234 Compliance Tips for Business

Introduction If you are regulated by APRA, then this is for you. Now that you have started ensuring that newly contracted third parties handle your information appropriately..

Read More

 5 reasons why spreadsheets don't work for managing risk assessments

Introduction If your organisation relies on Excel and Word as its preferred tools for managing compliance and risk assessment, this could have disastrous consequences for the..

Read More

 Third-party risk management: In the hot seat with APRA

Summary On November 7, 2018, the Australian Prudential Regulation Authority (APRA) released the final version of its prudential standard on information security management in the..

Read More