Top 5 Issues Companies Should Consider When Utilizing Big Data

Posted on August 22nd, 2018 in Cybersecurity, Information Security Risk, GDPR by Jon Siegler

One of the greatest assets a company can have is knowledge about its customers. With the advancement of technology, it is now easier and cheaper than ever to collect and store large amounts of data for long periods of time. While the advantages of big data storage and processing are endless, it’s crucial to consider the issues surrounding big data privacy and compliance.



Creating a Culture of Risk Throughout the Organization

Posted on August 7th, 2018 in ERM, Risk Management by Jon Siegler

An effective risk culture is one that allows and encourages individuals and departments to take risks in an educated and confident manner. When separating companies based on their risk culture, you will find two types of companies: companies that do not acknowledge risk and companies that have given every employee the power to identify & monitor for potential risk. In this post you’ll learn: why creating a culture of risk is important, how to create a culture of risk, and what a good risk culture looks like.


5 Practical Steps to Scale Your Vendor Risk Management Program

Posted on July 16th, 2018 in Vendor Management, Third-Party Risk by Matt Kunkel

At our recent webinar with ITGRCFORUM we discussed practical steps to scale your vendor risk management program. Over 500 attendees joined the webinar and learned 5 practical steps they could implement to scale their third-party vendor risk management programs, which address the most common vendor risks and problems. 


How an Integrated Risk Management Program Could Have Prevented it All for Wells Fargo

Posted on July 5th, 2018 in ERM by Matt Kunkel

Wells Fargo is in the midst of a governance, risk, and compliance nightmare. Misunderstanding or completely dismissing company policies has cost Wells Fargo “$414 million in refunds and settlements, and hundreds of millions more on legal fees, consultants and other costs related to the accounts scandal and its aftermath,” as well as hundreds of millions in potential growth, and immense reputational damage that will take years to recover from. This post will look into where Wells Fargo went wrong and how they could have prevented it all. 


A Proactive Approach to Enterprise Risk Management

Posted on June 15th, 2018 in ERM by Jon Siegler

Companies of all sizes and across virtually all industries are beginning to see the necessity of having an enterprise risk management (ERM) program that is comprehensive, organization-wide, and integrated within strategic planning efforts. In this post, we’ll look at the steps required to implement a proactive ERM program, the benefits seen across an organization once risk is handled proactively, and how to select an ERM tool that is robust and mature enough to address the issues organizations are facing with regards to ERM.


7 Things to Know about the NIST CSF Update

Posted on May 24th, 2018 in Cybersecurity by Szuyin Leow

On April 16, 2018, the National Institute of Standards and Technology (NIST), released updates to their Cybersecurity Framework (CSF) titled “Framework for Improving Critical Infrastructure Cybersecurity Version 1.1”...The updates work seamlessly with the original framework and are intended to be implemented by first time and current framework users. 


LogicGate Helps You Meet OIG's 7 Key Elements of Compliance

Posted on May 16th, 2018 in Policy Management, Compliance by Gary Elens

There are many complex issues in the healthcare industry. With looming government regulation and drastic changes in policy, 2018 is projected to be a year of unknowns and change. In addition to implementing new regulations, the industry must still meet current compliance requirements without fail.The Office of Inspector General’s (OIG) 7 Key Elements of Compliance are the minimum standard and mandatory for all hospitals. Using an automated system that will streamline and reduce potential risk while also adapting to the needs of an individual hospital is paramount in this uncertain climate.


Transform Your Incident Response Plan from a Static Policy Document to an Interactive Process

Posted on April 26th, 2018 in Incident Management by Jon Siegler

Benjamin Franklin supposedly said, “if you fail to plan, you are planning to fail.” Although, this sentiment is never more true than in an organization’s preparation for risk “only twenty-five percent [of organizations] have an Incident-Response (IR) plan applied consistently across the organization, and twenty-three percent have no incident response plan at all,” according to the Ponemon Institute. In order to protect your organization from risk, it is imperative to transform your Incident-Response plan from a static document to an interactive process. 


Why Compliance Controls Should be Embedded into Your Business Processes

Posted on April 19th, 2018 in Compliance, GRC by Gary Elens

Compliance is an intricate and difficult practice that many enterprises have siloed into departmental issues and concerns, but it is essential for the success of an organization. The difficulty with compliance is enterprises are attempting to regulate all rules and processes with a disorganized, inadequate, and an unregulated system. Compliance is defined as “the process of conforming with external rules and regulations and internally defined directives and standards.” In order to fully meet compliance standards, every internal and external rule and regulation must be considered and embedded into the process. If controls are not embedded into the process, the organization is vulnerable to risks and attacks that could be expensive if not detrimental.


The Power of a Graph Database

Posted on April 4th, 2018 in Graph Database, Risk Management by Dan Campbell

Recently, LogicGate's engineering team undertook the effort to migrate our application from a relational database to a graph database. To better understand this decision and its benefit to LogicGate users, it's important to know a little bit about LogicGate and a little bit about databases in general.