• ComplyTec NERC Compliance Management App-Pack

    For over two decades, ComplyTec Inc. has provided Governance Risk and Compliance (GRC) or Integrated Risk Management (IRM) solutions to the utility industry.  ComplyTec is a strategic partner ...
    Christine Tran
    last modified by Susan Read-Miller
  • California Consumer Privacy Act Authoritative Source Content

    The California Consumer Privacy Act was passed in 2018 and goes into effect on January 1, 2020.  This bill grants consumers the right to request businesses disclose the categories and specific pieces of personal ...
    Susan Read-Miller
    last modified by Christine Tran
  • Crowe Pandemic Response App-Pack

      Crowe LLP is a public accounting, consulting and technology firm with offices around the world. Crowe uses its deep industry expertise to provide audit services to public and private entities. The firm and its...
    Christine Tran
    last modified by Susan Read-Miller
  • NTT ISMS Risk Assessment App-Pack

    Designing the right processes, organization, and templates during the initial setup of an Information Security Management System (ISMS) are challenges organizations face. Rolling out ISMS in a big organization require...
    Gloria Higley
    last modified by Susan Read-Miller
  • Thomson Reuters Regulatory Intelligence Integration

    Thomson Reuters Regulatory Intelligence includes global coverage of over 750 regulatory bodies and more than 2,500 collections of regulatory and legislative materials. It is powered by news, analysis, and practical gu...
    Susan Read-Miller
    last modified by Susan Read-Miller
  • Wolters Kluwer NILS™ INsource® Integration

    Wolters Kluwer is a global provider of actionable regulatory content designed to work to support regulatory change management initiatives. Wolters Kluwer has over 400 in house experts (former regulators, compliance at...
    Christine Tran
    last modified by Susan Read-Miller
  • American Institute of CPAs (AICPA) Privacy Maturity Model Authoritative Source Content

    The American Institute of CPAs (AICPA) provides the world’s largest member association representing the accounting profession. The organization includes 431,000+ members in 130 countries and territories, re...
    Susan Read-Miller
    last modified by Susan Read-Miller
  • Cybersecurity Maturity Model Certification Framework (CMMC) Authoritative Source Content

    The Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S)) has developed the Cybersecurity Maturity Model Certification (CMMC) framework in concert with U.S. Department of Defense (Do...
    Gloria Higley
    last modified by Susan Read-Miller
  • European Union (E.U.) Regulatory Technical Standards for Authentication Authoritative Source Content

    The Regulatory Technical Standards on strong customer authentication and secure communication are key to achieving the objective of the revised Payment Services Directive (PSD2) for enhancing consumer protection, prom...
    Gloria Higley
    last modified by Susan Read-Miller
  • HITRUST CSF™ Authoritative Source Content

    The foundation of all HITRUST® programs and services is the HITRUST CSF™, a certifiable framework that provides organizations with a comprehensive, flexible, and efficient approach to regulatory compliance ...
    Christine Tran
    last modified by Susan Read-Miller
  • NTT ISMS Control Assessment App-Pack

    Designing the right processes, organization, and templates during the initial setup of an Information Security Management System (ISMS) are challenges organizations face. Rolling out ISMS in a big organization require...
    Gloria Higley
    last modified by Susan Read-Miller
  • Hong Kong Monetary Authority (HKMA) Authoritative Source Content

    The Hong Kong Monetary Authority (HKMA) is Hong Kong’s central banking institution. Established in 1993, the HKMA maintains currency stability within the framework of the Linked Exchange Rate System, promotes th...
    Susan Read-Miller
    last modified by Susan Read-Miller
  • Industrial Internet Consortium (IIC) IoT SMM Framework Authoritative Source Content

    The Industrial Internet Consortium is a global not-for-profit partnership of industry, government and academia founded in March 2014. Their mission is to bring together organizations and technologies necessary to acce...
    Gloria Higley
    last modified by Susan Read-Miller
  • Microsoft Software Development Lifecycle Authoritative Source Content

    The Microsoft Security Development Lifecycle (SDL) is an industry-leading software security assurance process. A Microsoft-wide initiative and a mandatory policy since 2004, the SDL has played a critical role in embed...
    Susan Read-Miller
    last modified by Susan Read-Miller
  • U.K. National Cyber Security Centre (NCSC) Cyber Assessment Framework Authoritative Source Content

    The United Kingdom National Cyber Security Centre (NCSC) Cyber Assessment Framework (CAF) provides a systematic and comprehensive approach to assessing the extent to which cyber risks to essential functions are being ...
    Gloria Higley
    last modified by Susan Read-Miller
  • U.K. Network and Information Systems Regulations Authoritative Source Content

    The U.K. Security of Network & Information Systems Regulations (NIS Regulations) provide legal measures aimed at boosting the overall level of security (both cyber and physical resilience) of network and informati...
    Susan Read-Miller
    last modified by Susan Read-Miller
  • U.S. Sarbanes-Oxley Act Authoritative Source Content

    The Sarbanes–Oxley Act of 2002, also known as the 'Public Company Accounting Reform and Investor Protection Act' (in the Senate) and 'Corporate and Auditing Accountability and Responsibility Act' (in the House) ...
    Susan Read-Miller
    last modified by Susan Read-Miller
  • U.S. State Privacy Laws Authoritative Source Content

    This authoritative source comprises state privacy laws for the following U.S. States: Maine - An Act To Protect the Privacy of Online Customer Information Nevada - Chapter 603A Security and Privacy of Personal ...
    Gloria Higley
    last modified by Susan Read-Miller
  • U.S. White House 25 Point Implementation Plan to Reform Federal Information Technology Management Authoritative Source Content

    The U.S. White House 25 Point Implementation Plan to Reform Federal Information Technology Management was released to U.S. federal agencies in an effort to deliver more value to the American taxpayer. The recomme...
    Susan Read-Miller
    last modified by Susan Read-Miller
  • U.S. State Data Security Laws Authoritative Source Content

    RSA Archer provides authoritative source content for U.S. State Data Security Laws.  Two authoritative source content packages are available:   Data Security Laws for Companies and Insurers - ...
    Christine Tran
    last modified by Susan Read-Miller