Author: Anwita

Anwita is a cybersecurity enthusiast and veteran blogger all rolled into one. Her love for everything cybersecurity started her journey into the world compliance. With multiple certifications on cybersecurity under her belt, she aims to simplify complex security related topics for all audiences. She loves to read nonfiction, listen to progressive rock, and watches sitcoms on the weekends.
    ISO 27001 Password Policy
    ,
    ISO 27001 Password Policy: Guidelines and Best Practices
    Identity theft is not a joke, Jim. Millions of people suffer every year! Remember this dialogue from the popular TV show The Office? As compliance experts, we believe these are golden words to live by. Identity theft in a business environment ranges from wide net phishing attempts to targeted spear phishing attempts. And this is…
    ISO 27001 Checklist
    ,
    ISO 27001 Checklist: 13 Easy Steps To Get Started
    ISO 27001, the gold information security standard, is quite comprehensive and structured in its approach. Most companies either feel overwhelmed about where to start or try to over-engineer things. Our ISO 27001 checklist solves for just that. It saves you time by minimizing the guesswork and provides the roadmap you need to accelerate the certification…
    GRC Metrics: KPIs, KRIs, & KCIs
    GRC Metrics: KPIs, KRIs, & KCIs Explained + Sample Checklist
    As you scale, the amount of people, processes, and technology you add to your infrastructure increases. This not only adds a number of risks into the mix but also creates an unprecedented level of compliance chaos. The emergence of GRC helps to close these gaps.  This module heavily depends on certain metrics – KPIs, KRIs,…
    ,
    Compliance Posture: How to Assess & Improve It
    Managing compliance posture is like a circus—most parts work in harmony until one day, they just don’t. When one component slips, it doesn’t just stop, it creates a domino effect. Before you know it, you’re putting out fires, giving you less time to spend on business-critical tasks like managing compliance. It is a situation no…
    Compliance Best Practices: How to Stay Ahead of Regulatory Challenges 
    Running compliance projects is pretty much like a circus. You are juggling multiple things at once—all goes fine until an important bit fails, and chaos unfolds. Before you know it, your team is putting out fires, trying to put broken systems back together, and not knowing how to keep things in motion.  While there is…
    Tabletop CISOs: Benefits, Sample Exercises, & Free Templates
    A survey conducted by the Ponemon Institute highlighted skill shortages as a key factor contributing to a data breach’s cost. All research and data on cybersecurity point to a common finding: the number of attacks is going up each year and shows no signs of slowing down. These facts underscore the importance of skilled CISOs…