Resources

Comprehensive Vendor Risk Management (VRM): How to Conduct a Cyber Security Risk Assessment

Check out this step-by-step guide to conduct a comprehensive cyber security risk assessment. Use CENTRL's Vendor360 platform to streamline the assessment process.

What is Third-Party Risk Management (TPRM)?

Learn more about Third-party risk management (TPRM) and the common types of vendor risk. We'll share some examples of regulatory frameworks around third-party risk, and how to best mitigate third-party risk for your organization.

Sealing the Deal on Another Privacy Settlement

FTC Announces Settlement with Travel Services Company Over Unsecured Cloud Database and Misleading Online Privacy Messaging

Privacy360 - Privacy Management Platform - Data Sheet

Key features of CENTRL privacy management platform for compliance across multiple privacy regulations. View or download PDF.

Resolve to Enhance Your Company’s Vendor Oversight Practices in 2021

Mortgage Industry Data Analytics Company Settles FTC Allegations that it Failed to Ensure Vendor was Adequately Protecting the Personal Information of Consumers

Resolve to Prepare for Supply Chain Cyber Attacks with Better Vendor Risk Management Practices in 2021

Recent attacks highlight importance of proactive and preventive measures to counter intrusions through your supply chain.

Get ready: The CCPA is now the CPRA

CPRA was voted into law on November 3, 2020 by 56% of the Golden State’s voters. 9 million Californians voted in favor of these new consumer privacy protections.

Keeping Data Secure in Thailand

New Personal Data Security Standards for Data Controllers Subject to Thailand’s Personal Data Protection Act (PDPA)

Caution - CCPA Construction Ahead

Proposed Modifications to New CCPA Regulations Released for Public Comment. CCPA is starting to remind some of never-ending road construction with all of its caution flags, detour signage, and miles of orange cones – and headaches for drivers.

Bank Network Management as a Sustainable Process?

Systematizing Network Management, you are transforming a cost draining unit into an efficient, environmentally friendly organization that can be both highly cost efficient and a business and investment driver.

The More You Know

California AG Provides Additional Information on Focus of Recent CCPA Notices of Non-compliance. The more you know now about the OAG’s current enforcement focus, the more you can do now.

Privacy by Vote

California Privacy Ballot Initiative Instructs Regulator to Issue Regulations Imposing Cybersecurity Audit and Risk Assessment Requirements

Global Bank Network Management Platform Brochure

Automating Bank Network Management. Global Network Managers are confronted with the challenge of managing the selection, oversight, risk and cost of hundreds of Agent banks around the world in an increasingly complex environment.

24 and Me - Proposition 24 (CCPA 2.0) on November 3rd California Ballot

Human DNA is about five feet long. You may need a longer leap to move your current CCPA compliance program to a CPRA compliance program. This posting summarizes only some of the provisions of the CPRA.

As the LGPD Turns - Brazilian Senate Rejects Postponement of Effective Date of LGPD

The LGPD also applies to organizations that intend to offer goods or services to individuals in Brazil.

New Required CCPA Reading

Final CCPA regulations were approved and effective on August 14, 2020. In a news release published with the final regulations, the AG advised that the regulations establish procedures for compliance.

INFOGRAPHIC - How your peers are saving 50% of time spent on ODD processes

With ODD360 — a SaaS solution built by industry experts — firms are boosting their operational efficiency and saving time spent on manual processes.

More Privacy Pyramids to Climb - Egypt Adopts Personal Data Protection Law

The pyramids in Egypt were built with smooth and angled sides to symbolize the rays of the sun. The sun light is shining today on a more recent development in Egypt.

3 Tips for Working with Your Suppliers to Operationalize Australia’s Modern Slavery Act

3 Tips for Working with Your Suppliers to Operationalize Australia’s Modern Slavery Act. Most companies with national or global supply chains have implemented some form of vendor risk management program.

EisnerAmper scales its Risk Assessment Services with Cyber360

Leading advisory firm gains efficiency and delights clients by moving assessment services to the cloud interface with built-in benchmarking, scoring, and reporting

EisnerAmper scales its Risk Assessment Services with Cyber360 - Downloadable PDF

Learn how CENTRL's Cyber360 helps EisnerAmper enhance client satisfaction, gain efficiency, and increase revenue.

  • {index}
  • {title}

    {content}