cloud computing

PWC Report: A Guide to Cloud Audits

Today, Internal Audit is in a state of rapid transformation, thanks largely to cloud technologies. IT is rapidly modernizing our data centers from virtualization to software defined data centers so as to build out increasingly sophisticated private clouds.


Top 10 Cybersecurity Predictions for 2015

Fueled by cybercrime, cyber warfare and cyber terrorism, the cost of cybersecurity and risk management will double in 2015. That’s the bad news. The good news is there will be a shift to cyber offense that will begin to stem the tide of cyber threats.


Conselium Places Evgeniya Vintner as Regional Compliance Manager for Teva Pharmaceuticals

Conselium, an executive search firm, has completed a search on behalf of Teva Pharmaceuticals.  Ms. Evgeniya Vinter began her role of Regional Compliance Manager Russia & CIS August 4, 2014 in their Moscow, Russia office. Ms. Vinter’s Responsibilities include: Support Local Compliance Officers (LCO) in the region in development of  processes and procedures Coordinate annual […]

concept of providing security

How CMOs Can Better Protect Customer Data

Customer data is one of your organization's most valuable assets. It yields insights into consumer preferences and purchase intentions. But even though the privacy issue surrounding such data is a hot topic among businesses and consumers, it has not traditionally been a priority among chief marketing officers (CMOs). That needs to change.


KnowBe4 Issues Alert: Social Engineering Threats Soaring

KnowBe4 says “watch out” for cybercriminals looking to make some extra cash during scam season – it’s a social engineering bonanza with threats on multiple fronts. Tampa Bay, FL (Dec 3, 2014) – KnowBe4 issued an alert today warning of a recent spate of high profile social engineering attempts targeted at prominent businesses. One such […]

data privacy

Protecting Your Information in the Digital Age: Is Your Business Prepared?

Internet Privacy in the Digital Age As Internet usage continues to grow all across the world, security risks have become a reality for businesses. Irrespective of the size and type of your business, you cannot ignore the possibility of Internet security risks. Online security risks pose a major threat to businesses, as evidenced by the […]