GRC blogi
GRC blogi
Praktilised artiklid juhtimise, riskide ja vastavuse kohta.
-
Access That Follows Responsibility, Not Org Charts
Most platforms manage access by restricting it. Kordon does the opposite — access is earned by assignment and revoked the moment that assignment ends. No legacy visibility, no periodic cleanups.
-
Why Business Process Management Is the Missing Link in GRC
Most GRC programs are built around frameworks and controls, not around the business itself. Learn why connecting your assets, risks, and vendors to business processes is what makes security management actually work.
-
Detailne juhend: Kuidas luua E-ITS varade ja teenusepakkujate register
Praktiline juhend, kuidas kaardistada E-ITS või ISO 27001 rakendamisel varasid ja teenusepakkujaid ning luua registrid, mis toetavad päriselt riskijuhtimist ja kaitsemeetmete valikut.
-
Detailne juhend: Kuidas määratleda E-ITS äriprotsesse?
E-ITS äriprotsesside kaardistamine ja määratlemine: praktiline samm-sammult juhend. Õpi, kuidas dokumenteerida äriprotsesse ja alustada infoturbejuhtimist.
-
No Warrant, No Problem: How Governments Are Building the Surveillance Super App
The U.S. Government is building a super app to monitor everyone without warrants. Where are they getting the data from and how can we protect ourselves?
-
Vendor Tiering in Practice: How to Calibrate Vendor Levels Without Overkill
This post is about making vendor tiering meaningful, so that each tier reflects the vendor’s real exposure and operational importance and efforts can be scaled accordingly.
-
How to Build a Vendor Risk Management Framework
A practical guide to the core pieces of a vendor risk management framework and how to shape them into a repeatable, auditable process.
-
Vendor Management vs. Vendor Risk Management: What's the Difference?
Clearly defining the difference between vendor management and vendor risk management helps you assign ownership correctly and avoid gaps as your organisation grows.
-
On-Premises GRC Platform: Pros, Cons, and When It Makes Sense
Explore the practical pros and cons of choosing an on-premises GRC platform instead of a vendor-hosted cloud deployment.
-
How an Attacker Used 'Spam Bombing' to Gain Remote Access
A short breakdown of how spam bombing can be used in social engineering and what teams can do to spot and resist it.
-
You're an InfoSec Professional Not a Kinderkarten Teacher
Every minute you spend chasing other people for security work is a minute stolen from actual security work.
-
How To Do Policy Training Better
Because nobody learns from a snoozefest. List of actionable small adjustments to make your trainings less boring.
-
19 Essential KPIs to Track Your ISMS's Effectiveness
List of universal KPIs and metrics to measure the progress and effectiveness of any information security management program.
-
GRC Metrics & KPIs Checklist with Example KPIs
A practical checklist for choosing GRC KPIs that support risk reduction, compliance progress, and measurable improvement over time.
-
Risk Management Fail: Mixing Causes with the Risk Itself
People often mix up the risk itself with its potential cause or mitigation. This mistake can significantly impact how risks are understood and managed.
-
NIS 2 Just Came Out But We Already Know What NIS 3 Will Bring
NIS 2 is already shifting expectations for smaller organizations. Based on current regulatory and resilience trends, we can already see what a likely NIS 3 direction would demand from SMBs.
-
The Highest Vendor Risk Happens AFTER Onboarding: Vendor Drift
Vendor risk does not stop at onboarding. This post explains vendor drift, the signals to watch for, and how to monitor third-party risk over time.
-
Choosing the Right Risk Matrix: Hidden Biases and How to Overcome Them
Overview of hidden biases in risk scoring and practical ways to overcome them.
-
Is “We Don’t Use Your Data for AI Training” Enough?
What other ways besides training could your data be used by an AI provider and how to mitigate risks that come with that.
-
How to Collaborate within the Organisation to Capture All Assets?
Learn how to collaborate across teams, engage key stakeholders, and streamline asset discovery for a complete inventory. Simple, effective, and practical tips!
-
How to Guide: Mapping Assets to Business Processes
Map assets to business processes to improve security, manage risks, and prioritize protection. Learn how to uncover dependencies and avoid common pitfalls.
-
How to Choose a Risk Management Tool?
This article explores key tools to manage risk and criteria to choose the best ones for your organization.
-
The Ultimate Guide to Asset Inventory Management
Ultimate guide on asset inventory management focusing on practical steps you can take to move beyond basic inventory tracking, using modern tools, processes, and collaboration to turn asset management into a strategic asset that continuously supports security, compliance, and operational resilience.
-
Top Information Security Risks to monitor in 2025
Explore the top 10 information security risks for 2025, featuring real-world examples of each threat.
-
25 Essential Operational Risks with Practical examples
Practical real world examples of operational risks for every modern organisation to consider. Includes downloadable example risk registry CSV.
-
5 categories of risk modern companies need to consider
A deep dive into different categories of risk a modern company needs to consider, with real world examples.
-
Asset Inventory Best Practices to Build Resilience and Security
A solid asset inventory is key to meeting ISO 27001 requirements and strengthening your security management. In this article, we’ll cover practical tips for building and maintaining an asset inventory that keeps your compliance on track and your security robust. Get ready for actionable steps you can implement right away.