White papers, solution briefs & more
In this document, Zhao Tian presents a role-based access control permission model for RSA Archer to allow for better security, reporting and user management.
Each chapter in this series explores a concept that we’ve seen to be critical to the success of any GRC deployment, whether you already have a GRC tool in place or you’re starting from scratch. Written by Kirk Hogan, Iceberg’s senior GRC consultant.
The European Union General Data Protection Regulation (GDPR) will drive unprecedented changes in the way organizations handle personal data when it comes into effect in May 2018. To help organizations prepare, we’ve put together a resource page to help answer your questions.
To drive better business results from vulnerability management programs, companies need collaboration between IT and the business to share accountability for vulnerability management and the risk they impose on the business. Written by David White, a senior GRC consultant with Iceberg.
How a large North American financial institution used RSA Archer to centralize and automate their Application Risk Management process. They moved from spreadsheets to a centralized inventory of risk data, allowing for more confident, informed and effective decisions.
Companies partner with hundreds – or even thousands – of suppliers to deliver products and services. Every vendor, large or small, is a potential point of risk for the organization. Read how Iceberg helps organizations build strategic programs to deliver trusted, transparent and timely information on vendor risk, giving them the agility to make informed and effective business decisions.
What is Risk Intelligence?
Iceberg delivers Risk Intelligence: Trusted, aggregated and transparent risk data, enabling organizations to make more informed, confident and effective business solutions.
For more information please contact us at email@example.com or call 855-595-0808 x261.