RiskWatch Content Libraries 2018-09-13T19:17:09+00:00
Loading...
  • GDPR – The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU).

  • COBiT 5 – Control Objectives for Information and Related Technologies – Recommended best practices for governance and control process of information systems and technology.

  • ISO 27001 – International Organization for Standards – Information technology, Security techniques, Information security management systems, Requirements.

  • NIST 800-53 – National Institute of Standards and Technology – Security and Privacy Controls for Federal Information Systems and Organizations.

  • NIST CSF (Cyber Security Framework)– Voluntary guidance, based on existing standards, guidelines, and practices, for critical infrastructure organizations to better manage and reduce cybersecurity risk.

  • PCI DSS – Payment Card Industry Data Security Standards – Information security standard for organizations that handle branded credit cards from the major card schemes.

  • GLBA Compliance – Gramm-Leach-Bliley Act (Financial Modernization Act of 1999) – A federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals.

  • FFIEC – Federal Financial Institutions Examination Council – A formal U.S. government interagency body.

  • NCUA – National Credit Union Administration – An independent federal agency created by the United States Congress to regulate, charter, and supervise federal credit unions.

  • Supplement to Authentication in an Internet Banking Environment – A FFIEC guidance supplements the FDIC’s supervisory expectations regarding customer authentication, layered security, and other controls in an increasingly hostile online environment.

We have a product for any type of engagement

Reduce exposure to liability. Manage risk. Monitor and maintain security. Track continuous improvement.

Prepare for audits. Meet regulatory compliance. Identify vulnerabilities. Manage your mitigation plan.

Evaluate cyber risk across multiple scopes. Build a register of risk for your assets. Reduce your chance of cyber attacks.

  • SOX – Sarbanes-Oxley Compliance – Requires that all publicly held companies must establish internal controls and procedures for financial reporting to reduce the possibility of corporate fraud.

  • HIPAA – Health Insurance Portability and Accountability Act – ensures equal access to certain health and human services and protects the privacy and security of health information.

  • NIST 800-66 – A Resource Guide for Implementing HIPAA.

  • HITECH – Health Information Technology for Economic and Clinical Health Act. Brings additional compliance standards to healthcare organizations and is directly related to HIPAA.

  • OCR Risk Analysis Final Rule – The Office for Civil Rights (OCR) – Guidance on the provisions in the HIPAA Security Rule.

  • HIPAA Omnibus Rule – Implements a number of provisions of the Health Information Technology for Economic and Clinical Health (HITECH) Act, to strengthen the privacy and security protections for health information established under the Health Insurance Portability and Accountability Act of 1996 (HIPAA).

  • IAHSS – International Association for Healthcare Security and Safety.

  • OSHA 3148 – Occupational Safety and Health Administration – Guidelines for preventing workplace violence for healthcare and social service workers.

  • Joint Commission – National patient safety goals.

  • California Health & Safety Code 1257.7 – Hospital security and safety assessment.

  • Center for Missing and Exploited Children.

  • Pharmaceutical Security.

  • Workplace Violence Prevention.

  • Cash Handling & Processes.

  • FEMA 426 – Federal Emergency Management Agency – Reference Manual to Mitigate Potential Terrorist Attacks.

  • NFPA 1600 – National Fire Protection Association – Disaster/Emergency Management and Business Continuity/Continuity of Operations Programs.

  • C-TPAT – The Customs-Trade Partnership Against Terrorism (C-TPAT) is a voluntary supply chain security program led by U.S. Customs and Border Protection (CBP) focused on improving the security of private companies’ supply chains with respect to terrorism.

  • Business Continuity – Assessment of an organization’s level of preparedness for product and service delivery following an unforeseen disruption.

  • Vendor Risk – Assessment of the level of inherited risk from your third-party vendors/service providers.

  • Project Risk – Assessment of an organization’s Project Management policies and individual projects.

  • Wind Farm Security – Critical Infrastructure focused on wind farm facility physical security.

  • AEO (Authorized Economic Operator) – World Customs Organization’s standard to secure global trade.

  • Industrial Physical Security – Security standards that meet the guidelines of ASIS International.

  • CFPB (Consumer Financial Protection Bureau) – Financial Sector compliance for EOCA, EFTA, Fair Lending, HMDA, MLA, RESPA, SAFE, TILA, & TISA.

  • DEA – Controlled substance storage security

  • NIST 800-171 – Guidelines for protecting government controlled unclassified information

  • Top 20 Cyber Controls – Compilation of the most critical cyber security controls

Get Started with our products, for free.

RiskWatch Products are easy to use, free to try and can be customized to fit your businesses needs.

Get Started for Free
An image of various electronic devices demonstrating that the product can be used on any device