menu

News

July 18, 2018 | Release Notes

Release Notes 07.17.18

Updates to the CCH were released Tuesday, July 17th, 2018. Bug Fixes CCH: Quotes Fixed the issue with quotes displaying incorrect data. CCH: New Authority Documents notification: Non-standard Calculation Fixed the issue with the non-standard …

Read More
July 16, 2018 | Job Postings

GDS Advisory – Third Party Risk Management Manager (non-FS) EY, Taguig City, All, Philippines (Salary not disclosed)

Third Party Risk Management – Manager will be responsible for leading a team of information security assessors. Responsibilities • Lead and manage the delivery of third party risk management engagements, such engagements involve performing a security …

Read More
July 16, 2018 | News/Articles

Have you ever seen a really bad compliance glossary?

We have, and we don’t like them any more than you do. Did you know that glossary definitions of compliance terms are often inaccurate, and create conflicting definitions? We’ve seen it over and over again. …

Read More
July 16, 2018 | Weekly Updates

2 new Authority Documents have been added to the UCF

Framework for Improving Critical Infrastructure CybersecurityAD ID: 2934Status: ReleasedAvailability: FreeCitation Format: ID (Reference ID)Document Type: Framework for Improving Critical Infrastructure CybersecurityOriginator: US National Institute of Standards and TechnologyParent Category: North AmericaEffective Date: 2018-04-16Language: engClick here to launch this Authority Document in the Common Controls …

Read More

Recorded Webinar: Compliance Auditing 101, The Easiest Way to Reduce

Did you miss the Unified Compliance/Quantivate webinar? You missed seeing how the CCH can deduplicate a list of mandates in a snap. You don’t know why you can depend on the accuracy of that process. …

Read More
July 10, 2018 | Job Postings

Computer Systems Security Analyst, Orlando, FL (Salary not disclosed) StigViewer

The Computer System Security Analyst will assist with Information Assurance tasks on the Joint Land Component Constructive Training Capability (JLCCTC) program, to include performing environment vulnerability scans, remediation of vulnerabilities by applying recommended patches and …

Read More

What Everyone Needs to Know About New Tools for Asset Compliance

Looking for an accurate way to track asset compliance? Learn how to create and maintain a common asset enumeration scheme! If you answer “yes” to any of the following, we suggest you register for our …

Read More
July 9, 2018 | Job Postings

Cyber Security Analyst III, Scientific Research – North Charleston, SC (Salary not disclosed) StigViewer

Scientific Research Corporation is an advanced information technology engineering company that provides innovative products and services to government and private industry, as well as independent institutions. At the core of our capabilities is a seasoned …

Read More
July 9, 2018 | Job Postings

IT Risk Reporting Ernst & Young AG, Argentina (Salary not diisclosed)

The IT Risk Strategy & Coordination function creates and maintains EY Technologies’ risk management framework, processes, tooling, and strategy. What are you going to do?

Read More
July 6, 2018 | Weekly Updates

2 Authority Documents being mapped into the UCF

3348 Map Citations for “ISO 9001 Quality Management systems – Requirements, Fifth edition 2015-09-15” [AD 2942] into the UCF START DATE: : 2018-06-14   Team Members: Mapper: Damaris Iglesias Reviewer: Erwin Rydell Approver: Keanu Cohen Lexicographer: Vicki McEwen   Follow the …

Read More
1 2 3 18