On Tuesday, October 24, 2023, regulators published an updated version of the Ransomware Self-Assessment Tool (R-SAT). In this blog, we’ll discuss what the R-SAT is, what got updated, and what you need to do about it.
Get our blog posts straight to your inbox.
This article will look at the top features to consider when evaluating an information security risk assessment software solution, including elements related to inherent and residual risk calculation, inventory and prioritization of assets, risk response, and reporting.
Three of the federal banking agencies published new guidance on Third-Party Relationships: Risk Management. Here are eight things community banks need to know about it.
This article will tell you what you can expect in your 2023 exam and take you through a bit of the history of each acronym.
In this article, we will discuss what a GLBA risk assessment is as well as how to do one, and why it is so important to the world of information security.
Learn how to respond to the Cybersecurity & Infrastructure Security Agency (CISA) direct call to action to "Implement Cybersecurity Measures Now."
In this article, we dive into the details of multifactor authentication, including how it improves security, what financial institution guidance says about it, and more.
At Tandem, we occasionally receive questions from our clients on the topic of an “IT audit risk assessment." Where did this concept come from, what exactly is it, and how would you begin to conduct one? Let’s find out.
In this article, we discuss the increasingly adopted definition of risk in today's cybersecurity world as well as its associated opportunities.
An organization’s security is only as strong as its weakest element, and ransomware is a threat that exploits vulnerabilities to their fullest extent. As such, having a plan for responding to ransomware is key to an organization’s cyber resilience.
In October 2020, the NIST published NISTIR 8286 over Integrating Cybersecurity and ERM. In this article, we will summarize some of the key concepts presented in the NIST document.