Blog
by KirkpatrickPrice / July 16th, 2014
[av_one_full first min_height='' vertical_alignment='' space='' custom_margin='' margin='0px' padding='0px' border='' border_color='' radius='0px' background_color='' src='' background_position='top left' background_repeat='no-repeat' animation=''] [av_blog blog_type='posts' categories='13' link='category,13' blog_style='multi-big' columns='1' contents='excerpt_read_more'…
Information Security Management Series: Risk Assessment
by Sarah Harvey / July 11th, 2014
Are you wondering why a risk assessment is so important? Do you need more information about how to conduct a risk assessment? If it is…
Vendor Compliance Management Series: Where To Start?
by Sarah Harvey / May 29th, 2014
What’s Changed? There needs to be a full chain of custody as the CFPB expects you to “oversee their business relationships with service providers…
CFPB Readiness Series: Making Risk Assessment Work For You
by KirkpatrickPrice / March 24th, 2014
Once you’ve determined that you need to undergo a CFPB audit, conducting a risk assessment enables you to find and address gaps before the…
CFPB Readiness Series: Developing an Internal Audit Process
by KirkpatrickPrice / February 25th, 2014
When you begin preparing for your CFPB examination, it is critical that you develop and implement an internal audit process to provide an independent,…