CMMC for Defense contractors
Cybersecurity Maturity Model Certification
FACTA Red Flags Rule for creditors
FACTA Red Flags Rule for creditors
Fair and Accurate Credit Transactions Act
GLBA for financial institutions
Gramm-Leach-Blilley Act
HIPAA & HITECH for healthcare
Health Insurance Portability and Accountability
FERPA & Clery Act for educators
Family Educational Rights and Privacy Act
FCPA for international businesses
Foreign Corrupt Practices Act
Vendor Management
For Third-Party Risk Management
Our Risk Intelligence & Solutions Quest
Businesses' and institutions' reliance on information technology grows every day. In fact, the trend is no longer to just get digitized, or even to go online—we have moved toward completely "paperless" offices.
When filing systems and information warehouses were physically within walls it was dangerous and far more difficult to steal or misuse sensitive information. Today's virtual world presents only nebulous barriers to information thieves.
This has necessitated the promulgation of laws and regulations to criminalize cyber intrusions and internal abuses, and they set information assurance requirements to protect sensitive consumer, financial, health and educational information.
At a minimum, covered businesses and institutions must comply with various regulations that require physical and procedural safeguards for IT systems and physical spaces that house protected information. Failure to meet regulatory minimums can result in serious consequences that could, potentially, expose a business to financial failure through fines, lawsuits or lost business.