Don’t Wait for a Fire to Test Your Fire Alarm: Check Your GRC Maturity Now

Don’t Wait for a Fire to Test Your Fire Alarm: Check Your GRC Maturity Now

Let’s be honest — Governance, Risk, and Compliance (GRC) often feels like a maze of policies, audits, and checklists. For many organizations, GRC is something they do because they must — not because they truly understand how well it’s working.  So, Where Do We Begin?  Before you can improve your GRC efforts, you need to […]

Urgent is Loud, Important is Quiet

Urgent is Loud, Important is Quiet

                               Urgent is Loud, Important is Quiet                                        Are you listening to the quiet stuff? In some of my earlier posts I talked […]

From Crisis to Compliance : An opportunity to implement SEBI mandates that will ensure Peace of Mind

From Crisis to Compliance : An opportunity to implement SEBI mandates that will ensure Peace of Mind

In a key development for regulated entities, the Securities and Exchange Board of India (SEBI) has extended the deadline for implementing Technology Compliance from the original date to August 31, 2025. The Banking, Financial Services and Insurance (BFSI) sector is navigating legacy technologies, rising risks, and at the same time trying to comply with SEBI […]

Threats change faster than you can react

Threats change faster than you can react

Environmental Challenges in Technology GRC Progress is man’s ability to complicate simplicity – Thor Heyerdahl As anything grows, gets wider acceptability, and achieves success, it goes from self-regulation to being regulated by norms. However, this success attracts people who want to take advantage and profit from dubious exploitation of that success. And that finally brings […]

Cyberattacks – What you can’t see can hurt you.

Cyberattacks – What you can’t see can hurt you.

Why is Technology GRC so difficult? “There are only two types of companies: those that know they’ve been compromised, and those that don’t know.” I am sure you have heard some variation of this quote variously attributed to John Chambers (former CEO of CISCO) or to Dmitri Alperovitch (formerly of McAfee) So, why is it […]

Beyond the Checkbox: Making Technology Compliance a Strategic Priority

Beyond the Checkbox: Making Technology Compliance a Strategic Priority

Why do Enterprises Struggle with Technology Compliance?  In the last year, I have talked to leaders such as CXOs, VPs, Technology Heads and CISOs in medium and large organizations to understand how they track and establish if they are doing all they should be doing to secure their Technology assets.   The topic of discussion was […]

Technology Compliance – The A-P-I-A framework

Technology Compliance – The A-P-I-A framework

As a provider of software solutions and in recent years hosting them on the cloud, we follow security standards diligently. In fact, that is a part of our deliverables to our customers. This write-up comes from the experience of being responsible for the security of our own information assets and those of our customers’. Ensuring […]

Sharing is not always caring!

Sharing is not always caring!

In IT compliance, control over data sharing is a major preventive step against accidental or intentional data breaches.  Here are a couple of cases that could have been avoided with better control over data sharing.  Roger Duronio was a UBS Wealth Management systems administrator. In 2006, he used a “logic bomb” to damage the company’s […]

Authorized Personnel only!!!

Authorized Personnel only!!!

Major public-facing companies have fallen victim to unauthorized individuals gaining access to sensitive data. Here are three famous cases which describe on the result of an authorized person gaining access or someone not being careful while granting access to the most sensitive data. Case 1 – Pennsylvania Department of Education — mis-assigned permissions In February 2018, […]

Compliance Never Has a Day off!

Compliance Never Has a Day off!

How is it that when I buy insurance or make a financial transaction, I immediately begin receiving contacts from companies offering similar products and services? They know me, my email ID, and sometimes my phone number. Is it an example of data or information theft? An insider theft? How many times do we hear about […]

The heavy burden on Compliance Officers

The heavy burden on Compliance Officers

Compliance has a cost. But non-compliance can be costlier. It could run into millions and billions as in the case that Ford Motor Co. is currently fighting. Ford Motor Co. said in June 2021 that it could face up to $1.3 billion in penalties in a long-running dispute over import duties paid on Ford Transit […]