Tag: grc
-
The Definitive Guide to Compliance Costs: Where Your Budget Goes
Key Takeaways Businesses are managing compliance on multiple fronts: cybersecurity standards, privacy regulations, third-party oversight, and sector-specific rules that change faster than budgets can adapt. Each requirement adds to the total cost of compliance. It’s easy to pinpoint your audit fees or the price of their GRC platform. But those are only part of the……
-
The Definitive Guide to Compliance Costs: Where Your Budget Goes
Key Takeaways Businesses are managing compliance on multiple fronts: cybersecurity standards, privacy regulations, third-party oversight, and sector-specific rules that change faster than budgets can adapt. Each requirement adds to the total cost of compliance. It’s easy to pinpoint your audit fees or the price of their GRC platform. But those are only part of the……
-
The Gravity of Process: Why New Tech Never Fixes Broken Process and Can AI Change It?
Tags: advisory, ai, api, best-practice, business, cybersecurity, data, flaw, grc, incident response, risk, siem, soar, soc, technology, threat, tool, trainingLet’s tackle the age old question: can new technology fix broken or missing processes? And then let’s add: does AI and AI agents change the answer you would give? Gemini illustration based on this blog This is the question which I recently debated with some friends, with a few AIs and with myself. The context was of…
-
Breaking Down Silos: Why You Need an Ecosystem View of Cloud Risk
Tags: access, attack, business, ciso, cloud, compliance, container, cvss, cyber, data, data-breach, exploit, governance, grc, identity, infrastructure, Internet, least-privilege, metric, network, risk, threat, tool, training, vulnerabilityA disjointed approach to cloud security generates more noise than clarity, making it hard for you to prioritize what to fix first. Learn how Tenable dissolves this challenge by integrating cloud security into a unified exposure management platform giving you the context to pinpoint your organization’s biggest cyber risks. Don’t just manage cloud security understand…
-
Breaking Down Silos: Why You Need an Ecosystem View of Cloud Risk
Tags: access, attack, business, ciso, cloud, compliance, container, cvss, cyber, data, data-breach, exploit, governance, grc, identity, infrastructure, Internet, least-privilege, metric, network, risk, threat, tool, training, vulnerabilityA disjointed approach to cloud security generates more noise than clarity, making it hard for you to prioritize what to fix first. Learn how Tenable dissolves this challenge by integrating cloud security into a unified exposure management platform giving you the context to pinpoint your organization’s biggest cyber risks. Don’t just manage cloud security understand…
-
Hiscout als Goldsponsor auf dem BCM Summit 2025 in Hamburg
Am 25. und 26. September findet der BCM Summit 2025 im Gastwerk Hotel Hamburg statt. Hiscout, führender Anbieter von GRC-Software, ist auch in diesem Jahr wieder vor Ort als Goldsponsor des Events. Die Konferenz zählt zu den wichtigsten Branchentreffen für Business-Continuity-Management (BCM) und Krisenmanagement im deutschsprachigen Raum. Der Summit bringt Fach- und Führungskräfte aus […]…
-
Hiscout als Goldsponsor auf dem BCM Summit 2025 in Hamburg
Am 25. und 26. September findet der BCM Summit 2025 im Gastwerk Hotel Hamburg statt. Hiscout, führender Anbieter von GRC-Software, ist auch in diesem Jahr wieder vor Ort als Goldsponsor des Events. Die Konferenz zählt zu den wichtigsten Branchentreffen für Business-Continuity-Management (BCM) und Krisenmanagement im deutschsprachigen Raum. Der Summit bringt Fach- und Führungskräfte aus […]…
-
So verändert KI Ihre GRC-Strategie
Tags: ai, ciso, compliance, cyersecurity, framework, fraud, governance, grc, group, monitoring, nist, risk, risk-management, strategy, tool -
Compliance and AIOps: The Role of GRC in IT Operations
By providing a data-driven, automated, and real-time approach to Governance, Risk, and Compliance, Qmulos adds that extra layer of visibility to the overall correlation of operational events. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/08/compliance-and-aiops-the-role-of-grc-in-it-operations/
-
Mind the overconfidence gap: CISOs and staff don’t see eye to eye on security posture
Tags: ai, attack, awareness, business, ciso, compliance, control, cyber, cybersecurity, data, defense, detection, grc, group, hacker, identity, incident response, intelligence, international, least-privilege, metric, network, phishing, ransomware, risk, risk-assessment, risk-management, soc, strategy, technology, threat, tool, training, updateMisplaced priorities: Investments often favor visibility and compliance over “core capabilities like detection engineering, incident response, and threat containment,” according to Santiago Pontiroli, lead security researcher at cybersecurity vendor Acronis TRU.Delayed adaptation: AI-driven threats demand faster, smarter defenses, but key upgrades (such as behavior-based analytics or automation) are often postponed due to underestimated risk, according…
-
Auditmanagement-Modul für die transparente Durchführung von Audits nach ISO19011
Hiscout, ein führender deutscher Anbieter für integrierte GRC-Lösungen (Governance, Risk & Compliance), hat ein neues, effizientes Auditmanagement-Modul auf den Markt gebracht. Mit diesem Modul bietet Hiscout Organisationen ein leistungsstarkes Werkzeug für die effiziente und transparente Durchführung von Audits nach ISO19011. Von der Jahresplanung bis zur revisionssicheren Dokumentation sorgt das Modul für einen durchgängigen, digitalisierten Auditprozess…
-
Modernes ISMSTool für die Berliner Verwaltung sichert digitale Prozesse der Hauptstadt
Die Hiscout hat die Ausschreibung des IT-Dienstleistungszentrums Berlin (ITDZ Berlin) für den Rahmenvertrag ‘ISMS-GRC-Tool” gewonnen. Der Vertrag hat eine Laufzeit von 48 Monaten. Er umfasst die gesamte Berliner Verwaltung als Leistungsempfänger. Rahmenvertrag für ganz Berlin ein strategischer Meilenstein Der Rahmenvertrag wurde über die Vergabeplattform DTAD ausgeschrieben und sieht vor, dass Hiscout die Berliner […] First…
-
How AI is changing the GRC strategy
Tags: access, ai, best-practice, breach, business, ciso, compliance, control, data, detection, finance, framework, fraud, governance, grc, guide, law, monitoring, network, nist, privacy, regulation, risk, risk-analysis, risk-management, strategy, threat, toolAdapting existing frameworks with AI risk controls: AI risks include data safety, misuse of AI tools, privacy considerations, shadow AI, bias and ethical considerations, hallucinations and validating results, legal and reputational issues, and model governance to name a few.AI-related risks should be established as a distinct category within the organization’s risk portfolio by integrating into…
-
July Patch Tuesday: 14 critical Microsoft vulnerabilities, one SAP hole rated at 10 in severity
Tags: access, attack, authentication, business, citrix, computer, control, credentials, cve, cvss, data, email, espionage, exploit, grc, microsoft, monitoring, network, ransomware, remote-code-execution, risk, sap, service, threat, update, vulnerability, windowsNetwork security: Allow PKU2U authentication requests to this computer to use online identities“.Tyler Reguly, Fortra’s associate director of security R&D, told CSO that, based on Microsoft’s presentation of the information, disabling this GPO will mitigate this vulnerability.The second priority is a fix for CVE-2025-49704, a SharePoint Remote Code Execution vulnerability, because it presents a critical risk to a…
-
July Patch Tuesday: 14 critical Microsoft vulnerabilities, one SAP hole rated at 10 in severity
Tags: access, attack, authentication, business, citrix, computer, control, credentials, cve, cvss, data, email, espionage, exploit, grc, microsoft, monitoring, network, ransomware, remote-code-execution, risk, sap, service, threat, update, vulnerability, windowsNetwork security: Allow PKU2U authentication requests to this computer to use online identities“.Tyler Reguly, Fortra’s associate director of security R&D, told CSO that, based on Microsoft’s presentation of the information, disabling this GPO will mitigate this vulnerability.The second priority is a fix for CVE-2025-49704, a SharePoint Remote Code Execution vulnerability, because it presents a critical risk to a…
-
How FinTechs are turning GRC into a strategic enabler
In this Help Net Security interview, Alexander Clemm, Corp GRC Lead, Group CISO, and BCO at Riverty, shares how the GRC landscape for FinTechs has matured in response to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/02/alexander-clemm-riverty-fintechs-grc-landscape/
-
The rise of the compliance super soldier: A new human-AI paradigm in GRC
Tags: ai, automation, awareness, compliance, control, governance, grc, jobs, law, LLM, metric, regulation, risk, skills, strategy, threat, tool, training, updateRegulatory acceleration: Global AI laws are evolving but remain fragmented and volatile. Toolchain convergence: Risk, compliance and engineering workflows are merging into unified platforms. Maturity asymmetry: Few organizations have robust genAI governance strategies, and even fewer have built dedicated AI risk teams. These forces create a scenario where GRC teams must evolve rapidly, from policy monitors to strategic…
-
Third-party risk management is broken, but not beyond repair
Getting to the root of the problem: The surge of TPRM tools has automated much of what was once a manual, resource-intensive process. These platforms were developed to simplify the creation, distribution, and completion of security questionnaires, addressing the operational burden organizations often face when conducting third-party risk audits. While they’ve brought much-needed efficiency, they’ve…
-
The highest-paying jobs in cybersecurity today
Tags: access, ai, application-security, cisco, cloud, compliance, control, corporate, cybersecurity, data, defense, detection, firewall, governance, grc, hacker, identity, incident response, infrastructure, intelligence, jobs, network, penetration-testing, privacy, risk, risk-assessment, risk-management, skills, soc, threat, tool, training, vulnerability, vulnerability-managementSee “Top 12 cloud security certifications”See “CISSP certification: Requirements, training, exam, and cost”See “CCSP certification: Exam, cost, requirements, training, salary” Security engineer: After security architects, security engineers receive the second-highest annual cash compensation ($191,000), with a base salary of $168,000. Nearly a third (31%) of security engineers surveyed also received annual equity grants.Like their architect…
-
Security, risk and compliance in the world of AI agents
Tags: access, ai, api, attack, automation, business, compliance, control, credentials, data, encryption, finance, framework, governance, grc, identity, infection, injection, ISO-27001, jobs, LLM, monitoring, password, privacy, regulation, resilience, risk, service, tool, trainingUnderstand and interpret natural language Access internal and external data sources dynamically Invoke tools (like APIs, databases, search engines) Carry memory to recall prior interactions or results Chain logic to reason through complex multi-step tasks They may be deployed through: Open-source frameworks like LangChain or Semantic Kernel Custom-built agent stacks powered by internal LLM APIs Hybrid orchestration models integrated across business platforms Real-world examples…
-
Hiscout und Innoventon gehen strategische Partnerschaft ein
Hiscout, ein führender Anbieter für integrierte GRC-Lösungen (Governance, Risk & Compliance), gibt heute den Beginn einer strategischen Partnerschaft mit den Software- und IT-Sicherheitsexperten von Innoventon bekannt. Gemeinsam bündeln die Unternehmen ihre Expertise, um Kunden künftig noch umfassendere und maßgeschneiderte Lösungen im Bereich Informationssicherheit und Datenschutz anzubieten. Durch die Partnerschaft profitieren Kunden von einer nahtlosen Integration…
-
Feel the FOMO: Unlocking the Future of GRC Automation
If you’ve been around the governance, risk and compliance (GRC) space for a while, you likely remember the days when GRC workflows involved manually collecting screenshots from several systems, filling out control statuses in spreadsheets and hoping you’re ready for your next audit(s). Those days are gone, or at least, should have, by now… First…
-
Building a Security Portfolio Even When You’re a Blue Teamer
Things to Include on Your CV When Your Job Focuses on Keeping Systems Running If you’re a junior SOC analyst, a GRC specialist, or someone working in ICS environments, the idea of a cyber portfolio might seem irrelevant. It’s not. Employers need tangible proof of your skills, and a well-constructed portfolio does just that –…

