Request a Demo
GLBA Safeguards Rule Risk Assessment, 2024 Complete Guide

SaltyCloud Research Team

Updated Feb 29, 2024 Read Time 21 min

Welcome to the 2024 edition of our Complete Guide, Conducting a GLBA Safeguards Rule Risk Assessment. This Complete Guide is an essential extension of our cornerstone article, Understanding the GLBA Safeguards Rule, Complete Guide.

Introduction

The Gramm-Leach-Bliley Act’s (GLBA) Safeguards Rule mandates that financial institutions conduct regular risk assessments to evaluate the security of customer information and protect it against unauthorized access that could result in substantial harm or inconvenience to a customer.

This comprehensive guide from SaltyCloud defines the GLBA, the GLBA Safeguards Rule, and the GLBA Safeguards Rule risk assessment. It provides a checklist of keysteps to take to conduct a successful risk assessment including determining the scope, selecting frameworks, designing questionnaires, assessing risks, and tracking risks in a risk register. Whether you need a refresher or are undertaking your first GLBA risk assessment, this guide offers best practices to help your financial institution perform effective and collaborative risk assessments that enable compliance and cyber resilience.

Understanding the basics

What is the GLBA?

The GLBA is federal legislation that mandates financial institutions to be transparent about their information-sharing practices and to take robust measures to secure sensitive consumer data.

What is the GLBA Safeguards Rule?

The GLBA Safeguards Rule is a regulatory framework that mandates financial institutions to implement comprehensive security measures, including an information security risk management (ISRM) program, for protecting customer data. Originally established in 2003 and known formally as the Standards for Safeguarding Customer Information, the rule outlines a multi-layered approach involving administrative, technical, and physical safeguards. Its primary goal is to ensure the security and privacy of customer information. The Federal Trade Commission (FTC) most recently updated these guidelines on December 9, 2021, with the amendments, termed the Final Rule, becoming effective in June, 2023.

The Department of Education, which oversees GLBA compliance for higher education institutions handling Federal Student Aid (FSA) data, has also made several updates. Most notably, it has recently updated the Student Aid Internet Gateway (SAIG) Agreement to incorporate the GLBA Safeguards Rule. You can read about how the GLBA Safeguards Rule affects higher education institutions in our separate guide, GLBA Compliance in Higher Education: A Complete Guide.

What is a GLBA Safeguards Rule risk assessment?

A GLBA Safeguards Rule risk assessment is a mandatory, structured process for financial institutions to identify, evaluate, and address information security risks, as stipulated in 16 CFR 314.4. The rule sets forth essential requirements but allows institutions flexibility in their approach, not prescribing any specific security or risk management frameworks. Institutions often align the Safeguards Rule’s requirements with established frameworks such as NIST 800-171, NIST 800-53, NIST CSF, CIS, or ISO/IEC 27001. For conducting the risk assessment, many adopt proven methodologies from frameworks like NIST 800-39 or ISO/IEC 27005, tailoring the process to fit their size, complexity, and the nature of their data usage.

A GLBA Safeguards Rule risk assessment is a mandatory, structured process for financial institutions to identify, evaluate, and address information security risks, as stipulated in 16 CFR 314.4.

The Safeguards Rule mandates that risk assessments must, at a minimum:

  • Include criteria for evaluating and categorizing identified security risks or threats to the required safeguards for customer information, such as likelihood, impact, and velocity ratings.
  • Assess the confidentiality, integrity, and availability of information systems and customer data based on the Safeguard Rule’s standards, including identifying any gaps.
  • Describe requirements for how identified risks related to the required safeguards will be mitigated and how the information security program will address these risks. This involves tracking findings, evidence, risk owners, remediation plans, milestones, and other details.

The role of GLBA compliance software

GLBA compliance software embodies a suite of features and components designed to facilitate, streamline, and automate the process of complying with the Safeguards Rule under the Gramm-Leach-Bliley Act (GLBA), with a specific focus on information security risk management. This software simplifies complex compliance requirements by offering functionalities such as:

  • Risk assessment management and a risk register (314.4(b)): Tools that support the systematic identification, evaluation, and documentation of risks to consumer financial information, aiding in the development and upkeep of a comprehensive risk register.
  • IT asset and third-party vendor inventory management (314.4(c)(2)): Capabilities that enable the detailed tracking and categorization of IT assets and third-party vendors, assessing their significance and associated risks to prioritize security efforts effectively.
  • Third-party vendor management (314.4(f)): Features focused on the governance and evaluation of third-party service providers, ensuring their security measures meet the organization’s standards and comply with GLBA regulations.
  • Compliance and risk reporting to governance bodies (314.4(i)): Mechanisms for crafting and presenting detailed reports on compliance activities and risk assessments to boards of directors or equivalent governing bodies, facilitating informed decision-making and oversight.

GLBA compliance software embodies a suite of features and components designed to facilitate, streamline, and automate the process of complying with the Safeguards Rule under the Gramm-Leach-Bliley Act (GLBA), with a specific focus on information security risk management.

Isora GRC provides the tooling to enable your information security risk management program and meet compliance with the GLBA Safeguards Rule. Isora is a collaborative GRC platform that empowers everyone to own risk together, with user-friendly and flexible tools. With Isora, teams can stay agile and responsive to growing changes, fostering a resilient culture across the organization.

In the checklist section of this complete guide, we’ll demonstrate how Isora helps at every step of of a your GLBA risk assessment.

GLBA Safeguards Rule risk assessment checklist

Conducting a risk assessment as mandated by the GLBA Safeguards Rule is a collaborative effort within your organization, beginning with the scoping phase. This initial phase is critical for identifying and categorizing GLBA-regulated information assets, essentially pinpointing where sensitive customer information is located, how it’s used, and who accesses it.

The core of the risk assessment is to verify the implementation and operational effectiveness of security controls or safeguards. This involves checking whether each control is in place and functioning as intended. The assessment looks for gaps where controls might be missing, inadequately implemented, or not fully effective in protecting the identified information assets.

The outcome of this assessment provides a clear picture of the organization’s compliance status with the GLBA Safeguards Rule and its overall security posture. It identifies areas where security controls need to be established, strengthened, or adjusted to address identified gaps. This sets the stage for subsequent actions within the information security risk management program, focusing on enhancing the organization’s defenses against threats and ensuring ongoing compliance with regulatory requirements.

Manage risk together
Streamline your GRC assessments
Meet security requirements more efficiently with Isora, the GRC Assessment Platform powered by collaboration
Learn More

Step 1. Scope your organization

Scoping your organization refers to the process of defining and understanding the specific people, units, assets, and third parties in your organization that fall under the requirements of the GLBA Safeguards Rule.

Scoping your organization refers to the process of defining and understanding the specific people, units, assets, and third parties in your organization that fall under the requirements of the GLBA Safeguards Rule.

This step is important because without a clear scope, your organization risks wasting time and resources on areas that don’t interact with sensitive consumer financial data.

Several industry-standard guides offer comprehensive frameworks and methodologies for effective IT asset management:

  • NIST 1800-5: Created by the National Institute of Standards and Technology (NIST), this standard focuses on IT asset management, particularly for financial services companies. It offers a modular approach to asset management that includes both hardware and software, aiming to help organizations reduce research and development costs while enhancing asset management efficiency.
  • ISO/IEC 19770-1:2017: This globally recognized standard provides a structured framework for IT asset management applicable across various industries. As part of the ISO 19770 series, it sets the best practices for managing IT assets, covering aspects like governance, roles and responsibilities, and planning.
  • CMMC Assessment Scope – Level 2: Specifically designed for Defense Industrial Base (DIB) contractors, this guide focuses on defining the scope for a Cybersecurity Maturity Model Certification (CMMC) assessment. It categorizes assets into categories including “Controlled Unclassified Information (CUI)”, “Security Protection”, “Contractor Risk Managed”, and “Specialized” assets.

Isora provides a centralized inventory management dashboard where teams can manage their GLBA-covered assets, applications, and third-party vendors. Inventory can either be added automatically through integrations with asset discovery software or manually through CSV uploads. Each inventory record keeps track of owners, data classifications, data categories, deployments, notes, and more.

The third-party inventory section of Isora.

Furthermore, Isora accommodates your organizational structure by allowing the establishment of parent-child relationships among organizational units and the assignment of role-based permissions to users for positions such as unit heads, assessment managers, IT staff, and others. This enables the launching of assessments, assignment of records, and automation of notifications to the appropriate individuals.

Step 2. Choose a security framework

The Safeguards Rule, as outlined in sections 16 CFR 314.3 and 16 CFR 314.4, mandates a series of requirements and technical safeguards—or controls—that organizations must meet or assess through a risk assessment. While the rule requires these controls, it does not prescribe a specific standardized security framework. This flexibility allows you to either leverage an existing framework or adopt one.

While the rule requires these controls, it does not prescribe a specific standardized security framework. This flexibility allows you to either leverage an existing framework or adopt one.

Security frameworks provide organizations with a set of standardized information security controls aimed at addressing a broad spectrum of security vulnerabilities. These frameworks, comprising policies, procedures, and technical measures, are designed to mitigate threats, prevent data breaches, and uphold the integrity, confidentiality, and availability of information.

To help you get started, we put together a crosswalk of the GLBA requirements to some of the most popular security frameworks, including NIST 800-171, NIST 800-53, NIST CSF, CIS, and SCF. You can review the table below or access the spreadsheet.

GLBA Section GLBA Requirement NIST 800-171r2 NIST 800-53r5 NIST CSF 2.0 CISv8 SCF
314.3(a) Requires the development, implementation, and maintenance of a comprehensive information security program, incorporating administrative, technical, and physical safeguards suitable to the organization’s size, complexity, activities, and the sensitivity of customer information. 3.12.4 PL-1 N/A N/A CPL-1
314.4(a) Requires the designation of a qualified individual to oversee and enforce the information security program, with responsibility retained even when using a service provider or an affiliate. 3.2.2 AT-3 GV.RR-01, GV.RR-02 14.9 GOV-04
314.4(b) Requires the information security program to be based on a risk assessment that identifies and evaluates internal and external risks to customer information and assesses the sufficiency of safeguards in place. 3.11.1 RA-3, PM-9 ID.RA-01 N/A RSK-04
314.4(c)(1) Requires the design and implementation of safeguards to control identified risks, including access controls to authenticate and permit access only to authorized users. 3.1.1, 3.1.2 AC-2, AC-3, AC-17 PR.AA 6.8 IAC-15

IAC-20

314.4(c)(2) Requires the identification and management of data, personnel, devices, systems, and facilities according to their importance to business objectives and the risk strategy. 3.4.1 CM-8 ID.AM 1.1 AST-02
314.4(c)(3) Requires the protection of all customer information, held or transmitted, by encryption or, if infeasible, by effective alternative compensating controls approved by the Qualified Individual. 3.13.8, 3.13.11 SC-8, SC-13 PR.DS 3.10, 3.11 CRY-01

CRY-01.1

CRY-03

314.4(c)(4) Requires secure development practices for in-house developed applications and procedures for evaluating the security of externally developed applications used for transmitting, accessing, or storing customer information. 3.13.2 SA-3, SA-4, SA-8, SA-9 PR.PS-06 16.1, 16.2, 16.3 SEA-01
314.4(c)(5) Requires the implementation of multi-factor authentication for individuals accessing any information system, unless an equivalent or more secure access control is approved in writing by the Qualified Individual. 3.5.3 IA-2 PR.AA-02 6.3, 6.4, 6.5 IAC-06

IAC-06.1

IAC-06.2

IAC-06.3

IAC-06.4

314.4(c)(6)(i) Requires the development, implementation, and maintenance of secure disposal procedures for customer information no later than two years after the last date of its use, unless retention is necessary for business operations, legal, or regulatory reasons. 3.7.3, 3.8.3 MA-2, MP-6 N/A 3.5 DCH-08

DCH-09

314.4(c)(7) Requires the adoption of procedures for change management. 3.4.3, 3.4.4 CM-3, CM-4 PR.PS-01 N/A CHG-01

CHG-02

314.4(c)(8) Requires the implementation of policies, procedures, and controls to monitor and log the activities of authorized users and detect unauthorized access, use, or tampering with customer information. 3.3.1, 3.3.2 AU-2, AU-3, AU-6, AU-12 DE.CM-01, DE.CM-03, DE.CM-09 8.1, 8.2, 8.5 MON-02

MON-10

314.4(d)(1) Requires regular testing or monitoring of the effectiveness of key controls, systems, and procedures, including those for detecting actual and attempted intrusions into information systems. 3.12.1, 3.12.3 CA-2, CA-5, CA-7 N/A N/A IAO-02
314.4(d)(2) Requires continuous monitoring or periodic penetration testing and vulnerability assessments for information systems, with specific requirements for annual penetration testing and bi-annual vulnerability assessments based on risk assessments. 3.11.2, 3.11.3 RA-5, CA-5 N/A 7.1, 16.2, 18.1 VPM-06

VPM-07

RSK-07

314.4(e) Requires the implementation of policies and procedures to ensure personnel can enact the information security program, including security awareness training and employing qualified security personnel. 3.2.1, 3.2.2 AT-2, AT-3 PR-AT 14.1, 14.9 SAT-02

SAT-03

314.4(f) Requires taking reasonable steps to select and retain service providers, also known as third-party vendors, capable of maintaining appropriate safeguards for customer information, mandating that service providers implement and maintain such safeguards through contractual agreements, and periodically assessing service providers based on the risks they present and the adequacy of their safeguards. N/A SR-1, SR-2, SR-3 ID.RA-10 15.1, 15.2, 15.3, 15.4, 15.5, 15.6 TPM-01

TPM-01.1

TPM-02

TPM-03

TPM-03.2

TPM-03.3

TPM-04

TPM-04.1

TPM-05

TPM-05.2

TPM-05.7

TPM-06

TPM-08

TPM-09

RSK-09

RSK-09.1

314.4(g) Requires the evaluation and adjustment of the information security program based on the results of testing and monitoring, material changes in operations or business arrangements, risk assessment outcomes, or other circumstances that may impact the information security program. 3.12.3 CA-2, CA-7 GV.OV N/A GOV-03

IAO-05

IAO-03

314.4(h) Requires the establishment of a written incident response plan to promptly respond to and recover from any security event that materially affects the confidentiality, integrity, or availability of customer information. 3.6.1, 3.6.2 IR-4, IR-5, IR-6, IR-8 ID.IM-04 17.4 IRO-02

IRO-04

IRO-05

314.4(i) Requires the Qualified Individual to report in writing regularly, at least annually, to the board of directors or equivalent governing body on the overall status of the information security program and compliance, including material matters related to the program. N/A N/A N/A N/A GOV-01.2

 

Step 3. Design a self-assessment questionnaire (SAQ)

Self-Assessment Questionnaires (SAQs), also known as compliance questionnaires or control self-assessments (CSAs), serve as dynamic tools for conducting risk assessments. SAQs facilitate the identification of compliance gaps against predefined controls and can be instrumental during regulatory audits, providing tangible evidence of risk management efforts.

Self-Assessment Questionnaires (SAQs), also known as compliance questionnaires or control self-assessments (CSAs), serve as dynamic tools for conducting risk assessments.

As an example, let’s consider the specific requirement under 16 CFR 314.4(c)(4), which mandates organizations to adopt secure development practices for in-house and externally developed applications that interact with customer information.

The most basic type of questionnaire is a binary (yes/no) format. This straightforward approach is suitable for initial gap analyses or organizations in the early stages of their information security risk management (ISRM) program. Here’s how you might craft a binary question plus evidence and clarification requirements:

Has the organization adopted secure secure development practices for in-house developed applications utilized for transmitting, accessing, or storing customer information

including procedures for evaluating, assessing, or testing the security of externally developed applications utilized to transmit, access, or store customer information?

Yes Evidence Requirement:
Please provide policy documents, process descriptions, or standard operating procedures that outline the mechanisms your organization has established. Include examples of industry-recognized cybersecurity and data privacy practices incorporated into your development lifecycle.Clarification Requirement:
Please describe how these mechanisms are implemented in practice. This might include details on training programs for staff, the use of secure coding standards, the integration of security in the software development lifecycle (SDLC), and processes for evaluating the security of externally developed applications.
No Evidence Requirement:
N/AClarification Requirement:
Please explain the current barriers to implementing these mechanisms. Discuss any plans or initiatives in place to develop such mechanisms in the future.

On the flip side, questionnaires can also be designed using the Capability Maturity Model (CMM). This approach is more nuanced, suitable for mature organizations looking to assess not just the presence but the maturity and effectiveness of their information security practices. Here’s how you might craft a question with CMM answer choices plus evidence and clarification requirements:

Please evaluate and describe how your organization facilitates the implementation of industry-recognized cybersecurity and data privacy practices in the specification, design, development, implementation, and modification of systems and services, considering the following CMM criteria. Select the statement that best describes your current practices:
Ad Hoc and Inconsistent (CMM Level 1):
Our IT personnel use informal processes to design, build, and maintain secure solutions, with decentralized IT/cyber engineering governance. Responsibilities for implementing and testing cybersecurity & data privacy controls are primarily assigned to business process owners. Our configurations mostly conform to industry-recognized standards for hardening.
Evidence Requirement:
Please provide examples of informal processes used by IT personnel. Documentation on decentralized IT/cyber engineering governance structures.

 

Clarification Requirement:
Please describe details on how responsibilities for cybersecurity and data privacy controls are assigned and managed. Information on the standards used for configurations, if any.

Requirements-Driven, Formally Governed Locally (CMM Level 2):
Our architecture/engineering management uses non-standardized, decentralized methods but is governed by a local/regional Change Advisory Board (CAB). We focus on protecting High Value Assets (HVAs) and ensure that IT personnel implement secure engineering practices. Our technologies are configured to protect data according to its classification and mostly conform to industry standards for hardening.
Evidence Requirement:

Please provide governance documents for the Change Advisory Board (CAB) or similar functions. Policies or procedures that detail the focus on protecting High Value Assets (HVAs).

 

Clarification Requirement:

Please describe the localized/regionalized architecture/engineering management practices. Details on how IT personnel are implementing secure engineering practices.

Standardized and Centrally Managed (CMM Level 3):
Under the guidance of a CISO, our secure engineering practices are standardized and centrally managed, where feasible. A formal Governance, Risk & Compliance (GRC) function oversees cybersecurity & data privacy controls. We have a steering committee for executive oversight and employ a “layered defense” network architecture. A Validated Architecture Design Review (VADR) process is in place for secure practice evaluation.
Evidence Requirement:
Please provide security-focused Concept of Operations (CONOPS) developed by the CISO. Documentation on the Governance, Risk & Compliance (GRC) function’s oversight activities. Records of the steering committee’s meetings and decisions.

 

Clarification Requirement:
Please describe the “layered defense” network architecture and how it’s implemented. Processes and criteria used in the Validated Architecture Design Review (VADR).

Metrics-Driven with Quantitative Management Insight (CMM Level 4):
In addition to meeting all Level 3 criteria, our organization employs metrics-driven processes for secure engineering, providing management with quantitative insights for optimal performance and continuous improvement. We regularly review Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs), involving both business and technical stakeholders in the process improvement based on these metrics.
Evidence Requirement:
Please provide reports that include quantitative analysis of Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs). Documentation on the formal process for reviewing and responding to metrics, KPIs, and KRIs.

 

Clarification Requirement:
Please describe details on how the organization uses these metrics for process improvement and the involvement of business and technical stakeholders in this process.

While SAQs might traditionally be designed using spreadsheet software like Excel, which allows for complex calculations and data analysis, this method is not without drawbacks. Spreadsheets can become cumbersome and challenging to maintain, particularly for information security teams tasked with assessing multiple business units or teams across an organization.

When using Isora, you can either make use of any number of preloaded questionnaire templates including NIST 800-53, NIST 800-171, NIST CSF, CISv8, SCF, and ISO27001 to get you started. Alternatively, you can build a customize SAQ complete with logic, weighted answer choices, help text, evidence upload, and free-text clarification.

Collaborative questionnaire-based assessments in Isora

Step 4. Launch your assessment

Once you’ve scoped your organization, aligned with a security framework, and designed a questionnaire, it’s time to launch the GLBA risk assessment.

When using Isora, the assessment is created in the unit assessment wizard. This feature helps you easily organize all the details of your assessment into collaborative survey that contains the SAQ. This includes selecting the units, people, and assets to be assessed, choosing a questionnaire template, setting a due date for automated notifications, and providing instructions to participants. Additionally, assigning an assessment name, such as “Baseline Assessment,” and grouping the assessment into a series, such as “GLBA Compliance,” to facilitate the comparison of multiple assessments over time.

The GLBA assessment management dashboard on Isora

Once the assessment is launched, Isora’s central assessment management dashboard allows you to track all your unit assessments, view details at-a-glance, access the survey for each unit, and ultimately review the unit’s scorecard report, responses, and evidence upon completion.

Step 5. Collect details and evidence

Once the assessment is underway, participants are notified and tasked with completing the SAQ, uploading supporting evidence, and providing clarifications for their responses.

When using Isora, participants receive an email notification and a link to a dedicated survey page featuring the custom questionnaire. The platform allows for delegation, enabling participants to assign specific sections to colleagues with more direct knowledge or insight. After providing a response, uploading evidence, and offering detailed clarifications, participants can mark the question as complete.

The survey acknowledgment message on Isora.

Upon completion of all questions, the assessment manager acknowledges the survey to confirm its accuracy. It is then forwarded to a unit or team head for the final acknowledgment, marking the assessment as complete.

Step 6. Analzye, identify, and evaluate risks

The concluding phase of the assessment process is perhaps the most critical, as it involves the assigned information security professionals the task of identifying, analyzing, and evaluating potential risks based on the completed questionnaires. This stage often requires the most diligence, as you go through all the evidence with great attention to detail to ensure no stone is left unturned.

The concluding phase of the assessment process is perhaps the most critical, as it involves the assigned information security professionals the task of identifying, analyzing, and evaluating potential risks based on the completed questionnaires.

When using Isora, this crucial step becomes organized and efficient. After participants complete and acknowledge their completed survey, Isora automatically scores the responses and arranges all evidence for your review. The platform provides an array of report widgets for a quick overview, including scores for the overall questionnaire and by each question category. This immediate visualization allows for a rapid assessment of areas where responses were less than favorable, prompting a closer review.

The GLBA scorecard report on Isora.

You can then delve deeper into individual responses to review evidence and clarifications. This layered approach to reviewing the survey enables you to quickly pinpoint any significant security gap. Once identified, you can either export the deficiencies into a CSV file or publish any of the findings as risks in the risk register. Additionally, this data can be used to provide a report on compliance for to the board or leadership team as required by the GLBA Safeguards Rule.

Beyond the risk assessment

While conducting a risk assessment against the required safeguards covers most of the mandates, there are additional steps that can enhance compliance with the GLBA Safeguards Rule and ensure a successful audit.

Manage risks in a risk register

As outlined in Step 6, compiling your findings into a risk register is an effective method to monitor gaps and coordinate remediation plans as mandated by the rule.

When using Isora, any findings that surface during your assessment can be published directly into the risk register and assigned to responsible units and people. Details like treatment, priority, impact, and liklihood can be tracked for each risk. Additionally, assigned teams can keep track of remediation plans, which serve to further illustrate your organization’s efforts towards compliance.

Make it a continuous process

The GLBA Safeguards Rule stipulates the necessity for continuous risk assessments to safeguard consumer data.

When using Isora, you can easily conduct followup SAQ risk assessments while pulling forward historical responses and evidence for continuity. Additionally, by organizing these ongoing assessments into a series, the data can be measured over time.

Demonstrating compliance to your auditor

Efficiently demonstrating compliance involves being proactive and organized. Review examination procedures from authorities like the OCC to identify potential gaps in compliance and start remediation early. Gather all necessary documentation, such as policies, risk assessments, and reports, in an accessible format for auditors.

When using Isora, auditors can be given a special role so they can access the completed assessment and results themselves.

Conclusion

Conducting a successful GLBA Safeguards Rule risk assessment is a complex but critical process for organizations handling protected consumer data. By following the step-by-step checklist covered in this guide, organizations can effectively scope their environment, select an appropriate framework, design a tailored SAQ, collect evidence, analyze risks, and remediate gaps. Leveraging tools like Isora is key to ensure a sustainable and scalable GLBA compliance process.

Enhanced security
Manage GLBA compliance confidently
Work together in Isora to keep customer data safe and build trust
Learn More
Other Relevant Content

Learn how NSPM-33 impacts research institutions and explore compliance strategies, including cybersecurity, export controls, and disclosure requirements.

This guide covers everything you need to know about TAC 202, including what it entails, why it's important, and how you can comply. We even included a TAC 202 checklist to make it easy for your organization to get started.

This Complete Guide explores basics and the compliance checklist for the GLBA Safeguards Rule risk assessment of customer information security programs.

Stay ahead of the curve
Get insightful guides, original research, regulatory updates, and novel solutions delivered straight to your inbox.
Get Started
Manage assessments
confidently with a
collaborative GRC platform