Reducing Cyber Risk With Minimal Resources: Maximizing Efficiency for Consultants
Wondering how you can provide cost-effective cyber risk assessment services? Check out these valuable tips to reduce cyber risk with minimal resources.
Vendor Risk Management Processes for Enterprise Supply Chains: Why Microsoft Excel is Not Enough
Enterprise VRM is a comprehensive process, and MS Excel is not the right tool for the job. In this post, we’ve discussed the reasons why spreadsheets are not enough for the VRM process.
Virginia is For Privacy, Part 1
3 Basic Things to Know About Virginia’s New Consumer Data Protection Act. Learn about Consumer Data Protection Act and how it affects your company's policies, notices, procedures, and processes.
The Evolving Third-Party Data Breach Landscape: What's Going On and How to Protect Your Data With Vendor Risk Management Software
Find out how the third-party data breach landscape changes and what techniques malicious actors use to steal data. Learn how you can protect your data with vendor risk management software.
Supply Chain Risk Management (SCRM) in the Manufacturing Industry: How to Identify, Assess, and Remediate Third-Party Risk Up and Down the Chain
Learn how the manufacturing industry's supply chain threats are evolving. How to identify, assess, and mitigate third-party risks to secure your manufacturing business.
Third Party Risk Management Lessons Learned from Recent Accellion Breach
Find out the lessons we can learn from Accellion Breach and know the Third Party Risk Management best practices takeaways.
Third-Party Risk Management Solutions for Software Supply Chains
Learn the features that you should consider in looking for a supply chain risk management platform for your software vendors.
Cyber360 - Automating Cyber Security Risk Assessments - Overview
CENTRL's Cyber360 enables consultants to streamline cyber security assessments, wow clients, and scale to unlock more revenue.
Infographic - 5 ways Vendor360 can help you assess and mitigate third-party risks
Vendor360 is an advanced and flexible third-party risk management platform that streamlines and simplifies your vendor risk management process.
Identifying Third-Party Risk in Your Supply Chain: Best Steps for Vendor Due Diligence
Find out the critical steps of vendor risk due diligence. From collecting business information to assessing security and legal risks, this guide has got you covered.
Comprehensive Vendor Risk Management (VRM): How to Conduct a Cyber Security Risk Assessment
Check out this step-by-step guide to conduct a comprehensive cyber security risk assessment. Use CENTRL's Vendor360 platform to streamline the assessment process.
Sealing the Deal on Another Privacy Settlement
FTC Announces Settlement with Travel Services Company Over Unsecured Cloud Database and Misleading Online Privacy Messaging
Resolve to Enhance Your Company’s Vendor Oversight Practices in 2021
Mortgage Industry Data Analytics Company Settles FTC Allegations that it Failed to Ensure Vendor was Adequately Protecting the Personal Information of Consumers
Resolve to Prepare for Supply Chain Cyber Attacks with Better Vendor Risk Management Practices in 2021
Recent attacks highlight importance of proactive and preventive measures to counter intrusions through your supply chain.
Get ready: The CCPA is now the CPRA
CPRA was voted into law on November 3, 2020 by 56% of the Golden State’s voters. 9 million Californians voted in favor of these new consumer privacy protections.
Keeping Data Secure in Thailand
New Personal Data Security Standards for Data Controllers Subject to Thailand’s Personal Data Protection Act (PDPA)
Caution - CCPA Construction Ahead
Proposed Modifications to New CCPA Regulations Released for Public Comment. CCPA is starting to remind some of never-ending road construction with all of its caution flags, detour signage, and miles of orange cones – and headaches for drivers.
Privacy360 - Integrated Privacy Management Platform - Explainer Video
See how companies can leverage CENTRL's Privacy360 software platform to help operationalize their compliance across multiple privacy regulations.
The More You Know
California AG Provides Additional Information on Focus of Recent CCPA Notices of Non-compliance. The more you know now about the OAG’s current enforcement focus, the more you can do now.
Privacy by Vote
California Privacy Ballot Initiative Instructs Regulator to Issue Regulations Imposing Cybersecurity Audit and Risk Assessment Requirements
24 and Me - Proposition 24 (CCPA 2.0) on November 3rd California Ballot
Human DNA is about five feet long. You may need a longer leap to move your current CCPA compliance program to a CPRA compliance program. This posting summarizes only some of the provisions of the CPRA.