Provisioning Information
Start saving time now!
Use our platforms to:
- Reduce the time it takes to complete assessments by 70-80%.
- Utilize our content library and out-of-the-box survey content to measure compliance to standards and other defined requirements.
- Automate the entire risk assessment process.
Have a question? Call us at 1-800-360-1898
Almost there, just one more step until you are automating assessments!
*Do not enter / into any fields
RiskWatch Content Libraries
- Active Shooter - Active Shooter Preparedness
- AEO (Authorized Economic Operator) - World Customs Organization’s standard to secure global trade.
- Business Continuity - Assessment of an organization’s level of preparedness for product and service delivery following an unforeseen disruption.
- California Consumer Privacy Act – Privacy rights and consumer protection for residents of California.
- CFATS – Chemical Facility Anti-Terrorism Standards. Cybersecurity and Infrastructure Security Agency’s program focused specifically on security at high-risk chemical facilities.
- CFPB (Consumer Financial Protection Bureau) – Financial Sector compliance for EOCA, EFTA, Fair Lending, HMDA, MLA, RESPA, SAFE, TILA, & TISA.
- Cloud Security Alliance – Guidance for managing and mitigating the risks associated with the adoption of cloud computing technology.
- COBIT 2019 – Control Objectives for Information and Related Technologies – Recommended best practices for governance and control process of information systems and technology.
- COVID-19 Workplace Guidance – Based on OSHA’s document OSHA 3990-03 2020 Guidance on Preparing Workplaces for COVID-19. It focuses on engineering, administrative, and work practice controls and personal protective equipment (PPE).
- C-TPAT – The Customs-Trade Partnership Against Terrorism (C-TPAT) is a voluntary supply chain security program led by U.S. Customs and Border Protection (CBP) focused on improving the security of private companies’ supply chains with respect to terrorism.
- Cybersecurity Maturity Model Certification – A Department of Defense verification mechanism to ensure appropriate levels of cybersecurity practices and processes are in place to ensure basic cyber hygiene as well as protect controlled unclassified information (CUI) that resides on the Department’s industry partners’ networks.
- DEA – Controlled substance storage security.
- Enterprise Mobile Device Security – NIST 800-124 Guidelines for managing the security of mobile devices in the enterprise.
- FEMA 426 – Federal Emergency Management Agency – Reference Manual to Mitigate Potential Terrorist Attacks.
- FFIEC – Federal Financial Institutions Examination Council – A formal U.S. government interagency body.
- GDPR – The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU).
- GLBA Compliance – Gramm-Leach-Bliley Act (Financial Modernization Act of 1999) – A federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals.
- HIPAA, HITECH, IAHSS, California Health & Safety Code 1257.7 & Joint Commission – Health Insurance Portability and Accountability Act (including Omnibus Rule) – ensures equal access to certain health and human services and protects the privacy and security of health information. HITECH Breach Notification – Brings additional compliance standards to healthcare organizations regarding breach notification for unauthorized disclosure of unsecured PHI. IAHSS – International Association for Healthcare Security and Safety. Joint Commission – National patient safety goals. OCR Risk Analysis Final Rule – The Office for Civil Rights (OCR) – Guidance on the provisions in the HIPAA Security Rule. California Health & Safety Code 1257.7 – Hospital security and safety assessment.
- Industrial Physical Security – Security standards that meet the guidelines of ASIS International.
- IRS 1075 – Guidance for US government agencies and their agents to protect Federal Tax Information.
- ISO 27001 – International Organization for Standards – Information technology, Security techniques, Information security management systems, Requirements.
- NATF CIP 014 – Physical security standard for electric power substations.
- NCUA – National Credit Union Administration – An independent federal agency created by the United States Congress to regulate, charter, and supervise federal credit unions.
- New York Shield Act – New York state’s safeguard requirements for protecting “private information” of New York residents and security breach notification requirements.
- New York DFS Cybersecurity – New York State Department of Financial Services’ Cybersecurity Requirements for Financial Services Companies, 23 NYCRR 500.
- NFPA 1600 – National Fire Protection Association – Disaster/Emergency Management and Business Continuity/Continuity of Operations Programs.
- NIST 800-171 – Guidelines for protecting government controlled unclassified information
- NIST 800-53 – National Institute of Standards and Technology – Security and Privacy Controls for Federal Information Systems and Organizations.
- NIST 800-66 – Guidelines for Implementing the Health Insurance Portability and Accountability Act.
- NIST CSF (Cyber Security Framework)– Voluntary guidance, based on existing standards, guidelines, and practices, for critical infrastructure organizations to better manage and reduce cybersecurity risk.
- OSHA 3148 – Occupational Safety and Health Administration – Guidelines for preventing workplace violence for healthcare and social service workers.
- PCI DSS – Payment Card Industry Data Security Standards – Information security standard for organizations that handle branded credit cards from the major card schemes.
- Privacy Shield – Data protection requirements for transferring personal data from the European Union and Switzerland to the United States in support of transatlantic commerce.
- Project Risk – Assessment of an organization’s Project Management policies and individual projects.
- Supplement to Authentication in an Internet Banking Environment – A FFIEC guidance supplements the FDIC’s supervisory expectations regarding customer authentication, layered security, and other controls in an increasingly hostile online environment.
- Top 20 Cyber Controls – Compilation of the most critical cyber security controls.
- Vendor Risk – Assessment of the level of inherited risk from your third-party vendors/service providers.
- Vendor Risk Lite – Comprehensive, high-level survey of a vendor’s internal information security controls.
- Wind Farm Security – Critical Infrastructure focused on wind farm facility physical security. Workplace Violence Prevention