access (5)


Hi Global Risk Community member,

Your business systems hold critical information about your company, so it’s important to know who has access into these systems and what they are doing with that access.

Fastpath and OCEG have created an infographic that shows the benefits of an automated, audit-ready access control framework.

Read this infographic to discover how to:

  • Improve efficiency in your audit processes
  • Reduce errors
  • Decrease exposure to penalties from employee theft and compliance viola
Read more…


ISACA, a leading nonprofit organization dedicated to the development, adoption, and use of industry-leading information security knowledge and best practices, opened up its 50th anniversary celebration this year with their 2019 North America CACS Conference. I was fortunate enough to be invited to speak to the more than 1,500 cybersecurity professionals in attendance about how to operationalize their cybersecurity programs and turn policy into action.

The North America CACS Conference is the prem

Read more…


The global 5G infrastructure market is expected to generate a revenue of $XX billion in 2020, and is projected to reach $XX billion by 2025, at a CAGR of XX%. This high growth is supported by the growing demand from a range of distinct applications where the current communication network technologies and bandwidths struggle to deliver optimum performance. The performance factors used to represent this new age network are low latency, high bandwidth, high system spectral efficiency, and peak thro

Read more…

Recently organizations have been faced with the increasing threat of cyber attacks, whether from external hackers such as lulzsec or from internal attacks such as wikileaks.  Your customers' personally identifiable information, organization's intellectual property, and confidential files are all vulnerable to attack.

How prepared is your IT Risk Management? How vulnerable is your organization to a cyber-attack?  What would the consequences of a cyber-attack be on your organization? Your board nee

Read more…

Identity and Access Management (IAM)

Identity and Access Management (IAM) – Thoughts

It’s high time for big enterprises to realize the importance of identity and access management (I&AM) technology as an integral part of their security footprint. Even though I&AM is in the limelight for quite long time, still I believe it’s a relative new term that means different things to different people.

What is Identity and Access Management (I&AM)?

As Wikipedia says, “Identity management or ID management is a broad administrative area that deals

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!