STICKY

Resilience | June 20, 2018

Resilience: a Proactive vs Reactive approach

Resilience has been there in a small scale much before organizations has started talking about it. In most cases Resilience as a pro-active approach or in much common words – […]


Share this:

Basics | February 1, 2025

Planning an IT Audit for SOC 2 Controls: A Practical Approach

System and Organization Controls (SOC) 2 reports are critical for assessing the security, availability, processing integrity, confidentiality, and privacy of a service organization’s systems. Executing an IT audit for SOC […]


Share this:

Basics | January 7, 2025

Understanding Compensating Controls

In the world of IT Audit and Risk Management for any organization, controls play a crucial role in ensuring security, compliance, and operational efficiency. However, in certain situations, an organization […]


Share this:

Basics | January 4, 2025

COSO vs. COBIT Frameworks: Understanding the Differences

Frameworks help organizations establish strong internal controls, manage risks, and ensure compliance. Two widely used frameworks—COSO (Committee of Sponsoring Organizations of the Treadway Commission) and COBIT (Control Objectives for Information […]


Share this:

Resilience | September 10, 2018

Adapting changes:City Resilience

The world is at the mid of climate change, that building resilience for each city have become necessity of the hour. City Resilience is a vast topic that is structured […]


Share this:

Cyber Resilience | September 1, 2018

Cyber Insurance as a step towards Cyber Resilience

While thinking about Cyber Resilience from Cyber Security, the very first change in thought process is we accept the fact that our security mechanisms / defense strategies will fail, in […]


Share this:

Business Continuity | July 18, 2018

Peer Collaboration to effectively Manage Third Party Risks

Background The threat landscape is increasing everyday, and so are the need to comply with the changing regulations, and all this in alignment with corporate goals. When we consider third-party […]


Share this:

Cyber Security | July 18, 2018

Dealing the Risk with Smart Things

During this period of digital transformations TPRM is the buzz word for most of the corporate services. When TPRM deals with analyzing and controlling risks attached to the operations, data […]


Share this: