openclose

Site Map

bio

Matt Kunkelarrow

Jon Sieglerarrow

Kevin Jacobsonarrow

Dan Campbellarrow

Julianna Meidellarrow

Greg Kesterarrow

Kirby Aullarrow

Sarah Learnerarrow

Alex Lizenarrow

Andrew Ricearrow

Kaitlyn Martinarrow

Matt Stronczekarrow

Jeff Doddarrow

Kelley Spakowskiarrow

Megan Phee Brownarrow

Danny Hartmanarrow

Jordan Wolfarrow

Dominick Campagnaarrow

Marisa Bloodgoodarrow

Tyler Bobellaarrow

Bobby LaPortearrow

Eric Flickarrow

Gary Elensarrow

Szuyin Leowarrow

Elizabeth Kaydanovskyarrow

event

ABA Risk Management Conference – 2019arrow

industry

Bankingarrow

Insurancearrow

Investment Servicesarrow

Hospitals & Health Systemsarrow

Pharmaceuticalsarrow

Medical Devicesarrow

Oil & Gasarrow

Utilitiesarrow

Alternative Energyarrow

Softwarearrow

FinTecharrow

Telecomarrow

news

LogicGate Announces Record Revenue Growth, Adds CFO and CRO to Executive Teamarrow

LogicGate Showcases Agile GRC Platform at 2019 RSA Conferencearrow

page

Risk & Compliance Processarrow

Privacy Policyarrow

Platformarrow

LogicGate Featuresarrow

Pricingarrow

Platform Securityarrow

Our Industriesarrow

Our Solutionsarrow

Site Maparrow

About Usarrow

Resourcesarrow

Resource Centerarrow

Blogarrow

Meet Our Teamarrow

GRC Solutionsarrow

Request A Demoarrow

Be a Partnerarrow

News at LogicGatearrow

Contact Usarrow

Join the Teamarrow

HIPAA Compliancearrow

LogicGate Eventsarrow

Building a Cyber-Savvy Culture: A Guide to Unlocking the Power of IT Security as a Business Enabler (CIO Email)arrow

Building a Cyber-Savvy Culture: A Guide to Unlocking the Power of IT Security as a Business Enabler (CIO Banners)arrow

Subscription Services Agreementarrow

Customer Support Policyarrow

Services Descriptionarrow

post

LogicGate: Building the Future of GRC Automationarrow

What is Business Process Management (BPM)?arrow

Automate Your Business Processes or Be Left in the Dustarrow

Stop Using Excel to Run Your Business and Build Your Own Appsarrow

Is Your Organization Following a Process Driven Approach to GRC?arrow

Third-Party Vendor Risk Costs PG&E $2.7 Millionarrow

5 Practical Steps to Scale Your Vendor Risk Management Programarrow

7 Things to Know about the NIST CSF Updatearrow

8 Steps Every Company Needs to Know for Success in Regulatory Change Managementarrow

A Guide to the Code of Federal Regulations, or How to Make Sense of 175k+ Pages of Textarrow

A Proactive Approach to Enterprise Risk Managementarrow

Creating a Culture of Risk Throughout the Organizationarrow

Designing an Effective Process to Track Employee Policy Attestations and Certificationsarrow

Drive Employee Engagement in GRC with a Great User Interfacearrow

Enterprise Risk Management Requirements of ORSAarrow

Enterprise Risk Management Should Focus More on the Processarrow

First Step to Managing Information Security: Threat and Vulnerability Assessmentsarrow

GDPR Basics: What you Need to Know to Ensure Compliancearrow

GDPR Industry Focus: How Does GDPR Impact the Tech Industryarrow

GDPR Industry Focus: How does the GDPR Impact Financial Services?arrow

GDPR Industry Focus: Impact of GDPR on Healthcare, Pharma, and PHIarrow

Hitting the Reset Button on ERM: How to Define ERM for Your Organizationarrow

How Much Can Data Breaches Cost US Companies?arrow

How an Integrated Risk Management Program Could Have Prevented it All for Wells Fargoarrow

How to Determine Risk Scores: Internal vs. External Risksarrow

Identifying Gaps in Your Information Security Risk Assessmentsarrow

Ignoring Enterprise Risk Management Can Result in Damaging Lossesarrow

It’s Time to Move Beyond the Spreadsheet for Vendor Risk Managementarrow

LogicGate Helps You Meet OIG’s 7 Key Elements of Compliancearrow

Personal Liability for CCOs: How to Negotiate the Growing Concernarrow

Study: Ease of Use the Top Factor for Purchasing GRC Solutionsarrow

The Power of a Graph Databasearrow

Top 5 Issues Companies Should Consider When Utilizing Big Dataarrow

Transform Your Incident Response Plan from a Static Policy Document to an Interactive Processarrow

Watch LogicGate at Technori!arrow

What are the PCI DSS Requirements?arrow

Why Compliance Controls Should be Embedded into Your Business Processesarrow

How Should GRC Professionals Approach Natural Disaster Risk Management?arrow

Assessing the Marriott Data Breach—and Its Botched Responsearrow

The State of GRC in 2019: Seven Predictions for the Year Aheadarrow

Join Us for a Data Breach Response Webinar on January 17arrow

Preparing for a Data Breach: 6 Steps Your Company Can Take Todayarrow

LogicGate is One of Built In Chicago’s 50 Startups to Watcharrow

The California Consumer Privacy Act Arrives in January 2020. What Can We Expect?arrow

Recapping the ITGRC Webinar “Critical Actions to Survive a Data Breach in 2019 and Beyond”arrow

GRC 101: What is Risk Management?arrow

GRC 101: What is Governance?arrow

GRC 101: What is Compliance?arrow

What are the Top Cybersecurity Threats Companies Face in 2019?arrow

Rush University Data Breach Exposes Personal Information of 45,000 Patientsarrow

resource

GDPR Compliancearrow

Information Security Riskarrow

Enterprise Risk Managementarrow

LogicGate Platformarrow

Third-Party Risk Managementarrow

GDPR Compliance eBookarrow

LogicGate: Building the Future of GRC Automationarrow

Managing Third Party Risk in the Age of GDPRarrow

Five Practical Steps to Scale Your Vendor Risk Management Programarrow

How to Build Organizational Support for ERMarrow

Incident Managementarrow

Compliance Managementarrow

Policy Managementarrow

Business Continuity Managementarrow

Process Templatesarrow

Critical Actions to Survive a Data Breach in 2019 & Beyondarrow

Building a Cyber-Savvy Culture: A Guide to Unlocking the Power of IT Security as a Business Enablerarrow

solution

Enterprise Risk Managementarrow

Third-Party Risk Managementarrow

IT Security Riskarrow

Compliance Managementarrow

Policy Managementarrow

Incident Managementarrow

GDPR Compliancearrow

Audit and Controls Managementarrow

Business Continuity Managementarrow