Compass IT Compliance Blog / Security (12)

FFIEC Guidance: Significant Changes to the Management Booklet

FFIEC Guidance: Significant Changes to the Management Booklet

On November 10th, the Federal Financial Institutions Examination Council (FFIEC) issued a revised Management booklet which is a part of the IT Examination Handbook. This is considered a major revision of the booklet and the first one to take place since 2004. As just a quick overview, …

Read Story

The Top 5 Reasons You Should Have a Vendor Management Program

The Top 5 Reasons You Should Have a Vendor Management Program

Last week we talked about what Vendor Management is and really why you should care about it for your organization. This week we are going to outline the top 5 reasons, in no particular order, of why your organization needs to have a Vendor Management Program implemented and that makes …

Read Story

What is a Vendor Management Program and Why Should You Care?

What is a Vendor Management Program and Why Should You Care?

Vendor Management is a term that is thrown around all the time, but what does it really mean? If we look at it on the surface, it is a method for managing your vendors and third party service providers. That's a little obvious of course, but let's look at the definition of Vendor Mana …

Read Story

PCI Compliance and the Transition to EMV

PCI Compliance and the Transition to EMV

Read Story

IT Security vs. Regulatory Compliance: Which One Came First?

IT Security vs. Regulatory Compliance: Which One Came First?

Security or Compliance. Which one should we focus on? On the surface, this almost sounds like the question of which came first, the chicken or the egg. But if we dig deeper, we start to see that while they are similar and have similar goals, they can be very different in how they are …

Read Story

IT Risk Assessments: Why Don't Companies Conduct Them?

A group of business professionals debate at a meeting

Data breaches are everywhere! Every time you read the news online or watch the news, there is some form of Cybersecurity problem that has taken place somewhere in the world. Whether it is a credit card data breach or a healthcare data breach, there is no doubt that the security of our …

Read Story

Subscribe by email