
Using Risk as part of your strategy
How can Information Security professionals embed the process of risk treatment into daily practices and ensure others...
Blog
Using Risk as part of your strategy
How can Information Security professionals embed the process of risk treatment into daily practices and ensure others in the...
22 February, 2019
How Brexit Will Affect UK Data Flows
Experienced data privacy professional Elena Riazanova explores the effects that Brexit will have on UK data flows and suggests...
21 February, 2019
Why Inherent and Residual Risk are Inadequate: What is the Appetite?
Too often the practice of internal auditing, when performing risk assessments, looks at Inherent Risk (the level of risk before...
8 February, 2019
Strategies to communicate risk internally
We interviewed Martyn O'Connor, Head of Risk and Compliance at Wellesley, to find out how Risk can effectively be communicated...
7 February, 2019
Anatomy of a Risk Assessment
In his second article for FourthLine, Andrew Denley considers what Information Security professionals must cover within a risk...
6 February, 2019
Roles and responsibilities of a Compliance Manager
We interviewed Sheraz Afzal of The Money Shop UK to find out more about what it takes to be a successful compliance leader and...
6 December, 2018
Creating a new SIPP
Anthony Smith considers his recent experiences of setting up new SIPP schemes. The first question I’m often asked is ‘what is a...
6 December, 2018
Correcting Privacy by Design errors with your software supplier
Data protection expert Lisa Wilson exposes the way in which some software companies are profiting from updating non-GDPR...
3 December, 2018
Establishing effective partnerships across the three lines of defence
James Wilson explains how we can enhance the effectiveness of the 3LOD model and establish effective working relationships...
16 November, 2018