
Risk Crew Resources
GRC blog ISO 42001 - AI Management System blog Resources GRC resources Resource Type Article Blog
ISO 42001: Key Insights You Need to Know
Introducing ISO 42001 – the world’s first international management system standard focused specifically on AI. [...]
Blog GRC blog ISO 27001 blog Resources GRC resources Resource Type Article
ISO 27001 Requirements | Your Roadmap to Compliance
Data breaches and cyberattacks have become daily concerns for information security professionals and business leaders. [...]
Resource Type Discovery Session Resources GRC resources
DORA | DISCOVERY SESSION
Blog Resources GRC resources Resource Type Guide
DORA Compliance Checklist | GUIDE
Article AI Governance blog Blog GRC blog ISO 42001 - AI Management System blog Resources GRC resources Resource Type
Ideation to Execution: Building Your AI Governance Framework
AI governance is the foundation of responsible AI usage. It’s a framework of policies, practices [...]
Resource Type Article Blog GRC blog ISO 42001 - AI Management System blog Resources GRC resources
Stay Ahead of UK AI Regulations: Ensure Compliance Early
As artificial intelligence continues to reshape the way we all work and how enterprises operate, [...]
Blog GRC blog DORA blog Resources GRC resources Article
Essential Information | The DORA Regulation in the UK
How Does DORA Apply in the UK? Although the Digital Operational Resilience Act (DORA) is [...]
GRC blog DORA blog Resources GRC resources Resource Type Article Blog
DORA Compliance Checklist to Actionable Steps
Achieving compliance with the Digital Operational Resilience Act (DORA) may seem challenging, but with the [...]
Resources GRC resources Resource Type Article Blog GRC blog DORA blog
An Overview to DORA’s Regulatory Technical Standards (RTS)
What is DORA and How Does it Differ from Existing Risk Management Frameworks? Well, DORA [...]
Resources GRC resources Resource Type Discovery Session
Complimentary ISO 27001 | DISCOVERY SESSION
Benefits of the ISO 27001 Gap Assessment
Blog GRC blog GRC resources Resource Type Article
SAMA Cybersecurity Framework Compliance: Benefits and Requirements
Understanding SAMA’s Cyber Security Framework Due to the increasing ubiquity of cyber-attacks, the financial sector [...]
Resources GRC resources Resource Type Article Blog GRC blog DORA blog
A Complete Guide to the Digital Operational Resilience Act (DORA)
Trying to understand DORA? Think of it like this: The Digital Operational Resilience Act (DORA) [...]
ISO 42001 - AI Management System blog Resources GRC resources Resource Type Article Blog GRC blog
AI Governance – Secure the Future by Embracing Responsible AI Practices
AI in Simple Terms At its core, AI is simply software that can ‘think’, ‘learn’, [...]
Resource Type Article Blog GRC blog ISO 27001 blog Resources GRC resources
Four ISO 27001 Compliance Key Areas You Should Know
Many things that are important in getting ISO 27001 compliant but in this blog post, [...]
Blog Resources GRC resources Resource Type Guide
SOC 2 Timeline and Checklist | GUIDE
Article Blog GRC blog ISO 27001 blog Resources GRC resources Resource Type
How to Establish a Clear Desk & Clear Screen Policy for Your Organisation
You know that feeling when you walk into an office, and it looks like a [...]
Resources GRC resources Resource Type Article Blog GRC blog NIS2 blog
NIS2 Directive Timeline & Requirements to Minimise Risks
NIS 2 is Changing It’s getting Risky out there… The protection of our networks and [...]
GRC blog ISO 27001 blog Resources GRC resources Resource Type Article Blog
How to Get Ready for Your ISO 27001 Audit
In the world of information security, there are many frameworks and countless guidelines. But among [...]
Blog GRC blog ISO 27001 blog Resources GRC resources Resource Type Article
ISO 27001: Steps to Write a Statement of Applicability
ISO 27001 Statement of Applicability A central component of becoming compliant with ISO 27001 is [...]
Blog GRC blog SOC 2 blog Resources GRC resources Resource Type Article
Preparing for a SOC 2 Audit? Follow These 5 Key Steps
Thinking About Getting Your Cloud Platform SOC 2 Compliant? If your company handles sensitive data, [...]
Article AI Governance blog Blog GRC blog ISO 42001 - AI Management System blog Resources GRC resources Resource Type
Don’t Be Afraid of AI. Treat It Like an Insider Threat
If artificial intelligence wants to be human so badly, let’s start treating it like one. [...]
GRC blog ISO 27001 blog Resources GRC resources Resource Type Case Study Blog
How Agrimetrics Successfully Attained ISO 27001 Certification | CASE STUDY
About the Company Agrimetrics, founded in 2014, is a leading Agri-tech Centre dedicated to revolutionising [...]
GRC resources Resource Type Article Blog GRC blog ISO 27001 blog Resources
ISO 27001 Clauses 4-10: Your Complete Guide
ISO/IEC 27001 is an international standard for creating an information security management system (ISMS). It [...]
Blog Resources GRC resources Resource Type Guide
ISO 27001 Mandatory Documentation Checklist | GUIDE
Blog GRC blog ISO 27001 blog Resources GRC resources Resource Type Article
ISO 27001 Penetration Testing Requirements – Risk Crew
A common question that comes up when implementing ISO 27001 is: Should I include security [...]
Resource Type Guide Resources GRC resources
ISO 27001:2022 Transition | GUIDE
ISO 27001 blog Resources GRC resources Resource Type Article Blog GRC blog
ISO 27001 Information Security Tips to Overcome Compliance Challenges
When looking to embark on achieving ISO 27001 Compliance, every organisation should know what challenges [...]
Blog GRC blog ISO 27001 blog Resources GRC resources Resource Type Article
ISO 27001:2022 Update – What You Need to Know
The revised version of ISO 27001 finally landed on 25 October 2022. It’s been almost [...]
Blog GRC blog SOC 2 blog Resources GRC resources Resource Type Article
12 Essential Policies for Achieving SOC 2 Compliance
If you are considering getting your organisation SOC 2 compliant, this blog should be an [...]
Article Blog GRC blog SOC 2 blog Resources GRC resources Resource Type
How Long Does SOC 2 Compliance Take and How Can You Get Certified?
It seems like a long project to reach SOC compliance, right? Well, not if you [...]
Resource Type Article Blog GRC blog Cyber Essentials blog Resources GRC resources
Why Cyber Essentials is Not Just a Tick Box – Interview with Dr Emma Philpott
As the question ‘why do I need a Cyber Essentials certification?’ continues to arise, Dr [...]
GRC resources Resource Type Article Blog GRC blog ISO 27001 blog SOC 2 blog Resources
ISO 27001 vs SOC 2: Apples and Oranges
What’s the difference between ISO 27001 verses SOC 2? Good question. SOC 2 is becoming [...]
Blog Resources GRC resources Resource Type Video
SOC-It-2-Me Summit | VIDEO
