{"id":1585447,"date":"2017-08-23T13:54:03","date_gmt":"2017-08-23T19:54:03","guid":{"rendered":"http:\/\/secblvd.wpengine.com\/?page_id=1585447"},"modified":"2018-01-11T02:07:49","modified_gmt":"2018-01-11T07:07:49","slug":"governance-risk-compliance","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/governance-risk-compliance\/","title":{"rendered":"Governance, Risk and Compliance"},"content":{"rendered":"<div id=\"pl-1585447\"  class=\"panel-layout\" ><div id=\"pg-1585447-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1585447-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1585447-0-0-0\" class=\"so-panel widget_text panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-1585447-0-0-0\" >\t\t\t<div class=\"textwidget\"><h1>Governance, Risk and Compliance<\/h1>\n<\/div>\n\t\t<\/div><\/div><div id=\"panel-1585447-0-0-1\" class=\"widget_text so-panel widget_custom_html\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-reused\" id=\"pt-cv-view-2f53dd3mdc\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"ca371c04bf\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037597\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash.png\" class=\"pt-cv-thumbnail img-none\" alt=\"Three tiny people cleaning the inside of a hard drive\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >QNAP\u2019s Buggy Security Fix Causes Chaos<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:54:57-05:00\">5 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037509\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/ai-generated-8662832_1280-1-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"military\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_self cvplbd\" target=\"_self\" >Huge Leak of Customer Data Includes Military Personnel Info<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:07:01-05:00\">6 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037498\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/defining-cyber-risk-assessment-and-a-compliance-gap-analysis-and-how-they-can-be-used-together\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/03\/Security-Risk-Assessment-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"risk, assessment, risk, Qualys, cyberinsurance compliance spending\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/defining-cyber-risk-assessment-and-a-compliance-gap-analysis-and-how-they-can-be-used-together\/\" class=\"_self cvplbd\" target=\"_self\" >Defining Cyber Risk Assessment and a Compliance Gap Analysis and How They Can be Used Together<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/greg-neville\/\" rel=\"author\">Greg Neville<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T08:17:11-05:00\">7 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<a class=\"left carousel-control\" data-target=\"#ca371c04bf\" data-cvslide=\"prev\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-left\"><\/span>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<a class=\"right carousel-control\" data-target=\"#ca371c04bf\" data-cvslide=\"next\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-right\"><\/span>\r\n\t\t\t\t\t<\/a><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-58ed8d63yr\">#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 14px !important }}\n#pt-cv-view-2f53dd3mdc .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t<\/div><\/div><div id=\"panel-1585447-0-0-2\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"2\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore pt-cv-reused\" id=\"pt-cv-view-63f1e1bp89\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037597\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Three tiny people cleaning the inside of a hard drive\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >QNAP\u2019s Buggy Security Fix Causes Chaos<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:54:57-05:00\">November 26, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/automatic-updates\/' title='automatic updates' class='pt-cv-tax-automatic-updates'>automatic updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/data-storage\/' title='data storage' class='pt-cv-tax-data-storage'>data storage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware\/' title='firmware' class='pt-cv-tax-firmware'>firmware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-patch\/' title='firmware patch' class='pt-cv-tax-firmware-patch'>firmware patch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-security\/' title='firmware security' class='pt-cv-tax-firmware-security'>firmware security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-update\/' title='firmware update' class='pt-cv-tax-firmware-update'>firmware update<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-updates\/' title='Firmware Updates' class='pt-cv-tax-firmware-updates'>Firmware Updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hard-disk-drive\/' title='hard disk drive' class='pt-cv-tax-hard-disk-drive'>hard disk drive<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hard-drive\/' title='hard drive' class='pt-cv-tax-hard-drive'>hard drive<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/nas\/' title='NAS' class='pt-cv-tax-nas'>NAS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/os-security-updates\/' title='os security updates' class='pt-cv-tax-os-security-updates'>os security updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/qnap\/' title='QNAP' class='pt-cv-tax-qnap'>QNAP<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/qts\/' title='QTS' class='pt-cv-tax-qts'>QTS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/raid\/' title='RAID' class='pt-cv-tax-raid'>RAID<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/release-management\/' title='Release Management' class='pt-cv-tax-release-management'>Release Management<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security-update\/' title='security update' class='pt-cv-tax-security-update'>security update<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/storage\/' title='storage' class='pt-cv-tax-storage'>storage<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">RAID FAIL: NAS Maker does a CrowdStrike\u2014cleanup on \/dev\/dsk\/c1t2d3s4 please ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037559\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/understanding-the-nydfs-cybersecurity-regulation\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Understanding the NYDFS Cybersecurity Regulation\" title=\"\" data-cvpsrc=\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Funderstanding-nydfs-cybersecurity-regulation&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/understanding-the-nydfs-cybersecurity-regulation\/\" class=\"_self cvplbd\" target=\"_self\" >Understanding the NYDFS Cybersecurity Regulation<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/legit-security\/\" rel=\"author\">Legit Security<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T16:57:44-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/best-practices\/' title='Best Practices' class='pt-cv-tax-best-practices'>Best Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/compliance\/' title='Compliance' class='pt-cv-tax-compliance'>Compliance<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/explainers\/' title='Explainers' class='pt-cv-tax-explainers'>Explainers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/threats\/' title='threats' class='pt-cv-tax-threats'>threats<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Whether you're a small financial service provider or a major institution, if you\u2019re doing business in the state of New York, you need to meet New York Department of Financial Services (NYDFS) ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037561\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"CMMC Compliance Requirements: A Complete Guide\" title=\"\" data-cvpsrc=\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Fcmmc-compliance-requirements&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/\" class=\"_self cvplbd\" target=\"_self\" >CMMC Compliance Requirements: A Complete Guide<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/legit-security\/\" rel=\"author\">Legit Security<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T16:56:55-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/best-practices\/' title='Best Practices' class='pt-cv-tax-best-practices'>Best Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/compliance\/' title='Compliance' class='pt-cv-tax-compliance'>Compliance<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/explainers\/' title='Explainers' class='pt-cv-tax-explainers'>Explainers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/threats\/' title='threats' class='pt-cv-tax-threats'>threats<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Department of Defense (DoD) data is some of the most sensitive out there. That\u2019s why the DoD designed the Cybersecurity Maturity Model Certification (CMMC) framework. It helps software providers implement cybersecurity measures ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037563\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/what-is-ci-cd-security-risks-and-best-practices\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"What Is CI\/CD Security? Risks and Best Practices\" title=\"\" data-cvpsrc=\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Fwhat-is-cicd-security&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/what-is-ci-cd-security-risks-and-best-practices\/\" class=\"_self cvplbd\" target=\"_self\" >What Is CI\/CD Security? Risks and Best Practices<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/legit-security\/\" rel=\"author\">Legit Security<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T16:23:24-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/appsec\/' title='AppSec' class='pt-cv-tax-appsec'>AppSec<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/best-practices\/' title='Best Practices' class='pt-cv-tax-best-practices'>Best Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/compliance\/' title='Compliance' class='pt-cv-tax-compliance'>Compliance<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/devops\/' title='DEVOPS' class='pt-cv-tax-devops'>DEVOPS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/threats\/' title='threats' class='pt-cv-tax-threats'>threats<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Continuous integration and continuous delivery (CI\/CD) pipelines are invaluable in software development. They expedite the deployment process and maintain teams at the forefront of innovation. But with these benefits come unique security ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037573\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/continuous-compliance-monitoring-why-is-it-so-important\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/continuous-compliance-monitoring-why-is-it-so-important\/\" class=\"_self cvplbd\" target=\"_self\" >Continuous Compliance Monitoring: Why Is It So Important?<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/firemon\/\" rel=\"author\">FireMon<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T11:49:29-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/compliance\/' title='Compliance' class='pt-cv-tax-compliance'>Compliance<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Compliance monitoring is vital to ensure organizations maintain adherence to regulatory standards and internal policies in real time, helping avoid data breaches, legal penalties, and reputational harm. Regulations are constantly ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=www.firemon.com&feed_id=661&blog_url=https:\/\/www.firemon.com\">www.firemon.com<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037509\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"military\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/ai-generated-8662832_1280-1-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_self cvplbd\" target=\"_self\" >Huge Leak of Customer Data Includes Military Personnel Info<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:07:01-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/china\/' title='china' class='pt-cv-tax-china'>china<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/elasticsearch\/' title='elasticsearch' class='pt-cv-tax-elasticsearch'>elasticsearch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/enamelpins\/' title='enamelpins' class='pt-cv-tax-enamelpins'>enamelpins<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/leaked-data\/' title='leaked data' class='pt-cv-tax-leaked-data'>leaked data<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">EnamelPins, which manufactures and sells medals, pins, and other emblematic accessories, for months left open an Elasticsearch instance that exposed 300,000 customer emails, including 2,500 from military and government personnel. The company, ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037498\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/defining-cyber-risk-assessment-and-a-compliance-gap-analysis-and-how-they-can-be-used-together\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"risk, assessment, risk, Qualys, cyberinsurance compliance spending\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/03\/Security-Risk-Assessment-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/defining-cyber-risk-assessment-and-a-compliance-gap-analysis-and-how-they-can-be-used-together\/\" class=\"_self cvplbd\" target=\"_self\" >Defining Cyber Risk Assessment and a Compliance Gap Analysis and How They Can be Used Together<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/greg-neville\/\" rel=\"author\">Greg Neville<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T08:17:11-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/compliance-frameworks\/' title='Compliance Frameworks' class='pt-cv-tax-compliance-frameworks'>Compliance Frameworks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber-risk-assessment\/' title='cyber risk assessment' class='pt-cv-tax-cyber-risk-assessment'>cyber risk assessment<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/gap-analysis\/' title='gap analysis' class='pt-cv-tax-gap-analysis'>gap analysis<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/threat-identification\/' title='threat identification' class='pt-cv-tax-threat-identification'>threat identification<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">A cyber risk assessment is a tool that helps organizations identify and prioritize risks associated with threats that are relevant to their unique environment ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037504\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/what-is-cicra-audit-and-why-it-matters\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"What is CICRA Audit and Why It Matters?\" title=\"\" data-cvpsrc=\"https:\/\/kratikal.com\/blog\/wp-content\/uploads\/2024\/11\/CICRA-AUdit-info-1024x491.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/what-is-cicra-audit-and-why-it-matters\/\" class=\"_self cvplbd\" target=\"_self\" >What is CICRA Audit and Why It Matters?<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/puja-saikia\/\" rel=\"author\">Puja Saikia<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T00:21:28-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cert-in\/' title='CERT-In' class='pt-cv-tax-cert-in'>CERT-In<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cicra\/' title='CICRA' class='pt-cv-tax-cicra'>CICRA<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cicra-credit-information-companies-regulation-act-2005\/' title='CICRA-Credit Information Companies (Regulation) Act, 2005' class='pt-cv-tax-cicra-credit-information-companies-regulation-act-2005'>CICRA-Credit Information Companies (Regulation) Act, 2005<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/compliance\/' title='Compliance' class='pt-cv-tax-compliance'>Compliance<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/compliances\/' title='compliances' class='pt-cv-tax-compliances'>compliances<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Credit Information Companies (Regulation) Act was introduced in India in 2005. It was for organizations that handle customers\u2019 credit information to promote transparency in the credit system as well as protect sensitive ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Kratikal Blogs&feed_id=727&blog_url=https:\/\/kratikal.com\/blog\/\">Kratikal Blogs<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037306\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/what-is-fedramp-ato-designations-terms-and-updates\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"What Is FedRAMP ATO? Designations, Terms, and Updates\" title=\"\" data-cvpsrc=\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Fwhat-is-fedramp-ato&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/what-is-fedramp-ato-designations-terms-and-updates\/\" class=\"_self cvplbd\" target=\"_self\" >What Is FedRAMP ATO? Designations, Terms, and Updates<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/legit-security\/\" rel=\"author\">Legit Security<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T15:36:07-05:00\">November 21, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/compliance\/' title='Compliance' class='pt-cv-tax-compliance'>Compliance<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/explainers\/' title='Explainers' class='pt-cv-tax-explainers'>Explainers<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">As a cloud service provider (CSP), working with federal agencies may be one of your goals. But to do so, you need to meet rigorous security standards from the Federal Risk and ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037237\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"A D-Link DSR-250N, which is now EOL\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Here\u2019s Yet Another D-Link RCE That Won\u2019t be Fixed<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T12:33:40-05:00\">November 21, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/d-link\/' title='D-Link' class='pt-cv-tax-d-link'>D-Link<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-corporation\/' title='D-Link Corporation' class='pt-cv-tax-d-link-corporation'>D-Link Corporation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-vulnerability\/' title='D-Link vulnerability' class='pt-cv-tax-d-link-vulnerability'>D-Link vulnerability<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-zero-day\/' title='D-Link zero day' class='pt-cv-tax-d-link-zero-day'>D-Link zero day<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things\/' title='Internet of things' class='pt-cv-tax-internet-of-things'>Internet of things<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot\/' title='Internet of Things (IoT)' class='pt-cv-tax-internet-of-things-iot'>Internet of Things (IoT)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot-security\/' title='Internet of Things (IoT) Security' class='pt-cv-tax-internet-of-things-iot-security'>Internet of Things (IoT) Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-cyber-security\/' title='Internet of Things cyber security' class='pt-cv-tax-internet-of-things-cyber-security'>Internet of Things cyber security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/iot\/' title='iot' class='pt-cv-tax-iot'>iot<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">D-Licious: Stubborn network device maker digs in heels and tells you to buy new gear ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1585447\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"50\" data-nextpages=\"2\" data-sid=\"63f1e1bp89\" data-unid=\"103cbb83a7dcebe675e5ad7af93ceb8f\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-2d80d7cq6i\">#pt-cv-view-63f1e1bp89 .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-title a, #pt-cv-view-63f1e1bp89  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89  .pt-cv-title a:hover, #pt-cv-view-63f1e1bp89  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-content , #pt-cv-view-63f1e1bp89  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='63f1e1bp89'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='63f1e1bp89'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Governance, Risk and Compliance<\/p>\n","protected":false},"author":6042,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1585447","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Governance, Risk and Compliance - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Governance, Risk and Compliance\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/governance-risk-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Governance, Risk and Compliance\" \/>\n<meta property=\"og:description\" content=\"Governance, Risk and Compliance\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/governance-risk-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-11T07:07:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1524\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/governance-risk-compliance\/\",\"url\":\"https:\/\/securityboulevard.com\/governance-risk-compliance\/\",\"name\":\"Governance, Risk and Compliance - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"datePublished\":\"2017-08-23T19:54:03+00:00\",\"dateModified\":\"2018-01-11T07:07:49+00:00\",\"description\":\"Governance, Risk and Compliance\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/governance-risk-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/governance-risk-compliance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/governance-risk-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Governance, Risk and Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Governance, Risk and Compliance - Security Boulevard","description":"Governance, Risk and Compliance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/governance-risk-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Governance, Risk and Compliance","og_description":"Governance, Risk and Compliance","og_url":"https:\/\/securityboulevard.com\/governance-risk-compliance\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2018-01-11T07:07:49+00:00","og_image":[{"width":1524,"height":512,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/governance-risk-compliance\/","url":"https:\/\/securityboulevard.com\/governance-risk-compliance\/","name":"Governance, Risk and Compliance - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"datePublished":"2017-08-23T19:54:03+00:00","dateModified":"2018-01-11T07:07:49+00:00","description":"Governance, Risk and Compliance","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/governance-risk-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/governance-risk-compliance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/governance-risk-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Governance, Risk and Compliance"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-6ErJ","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1585447","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1585447"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1585447\/revisions"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1585447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}