Search for content, post, videos
0 COMMENT
4410 Views
Passion in Every Step: Joshua Rey Albarina

My journey with PECB started when I became a certified trainer and a Risk Manager. Prior to this, I was engaged in management best practices on non-government-funded projects as a trainer and consultant for both; manufacturing and service industries. Since I joined SAS Management as a Senior Consultant, I was…

0 COMMENT
3443 Views
Supply Chain Cybersecurity Trends – Staying Resilient

Supply chain security activities aim to amplify the security of supply chains, transport, and logistic systems for the world’s cargo and to facilitate legitimate trading. Their objective is combining traditional practices of supply chain management with the security requirements driven by threats, such as; terrorism, piracy, and theft. Digital supply…

0 COMMENT
3263 Views
Differentiating Between CMMC 1.0 and CMMC 2.0

“If you see hackers, you see Usi,” someone once suggested I use this line to introduce myself. Perhaps they presumed that people who do not know me would easily remember how to pronounce my name and possibly remember who I am. Throughout my life; teachers, teammates, college professors, coworkers, and…

0 COMMENT
3907 Views
Improving Investor Confidence With ISO Standards

A recent International Standard is helping bring new clarity to the complex world of finance and investment. ISO 4914 provides a new way of identifying and understanding specific types of financial products known as OTC derivatives, and brings much-needed clarity to the sector. Finance expert Emma Kalliomaki explains. In the…

0 COMMENT
2834 Views
Understanding the Digital World

As the technology that surrounds us keeps evolving rapidly, the level of its complexity is increasing as well, leading to potential misuse. Prioritizing data protection is becoming very prominent. Not everyone can study the field and understand all details, however, reading a book to learn portions of it will do…

0 COMMENT
3456 Views
IT Security Act 2.0: What Obligations It Imposes?

In April 2021, the IT Security Act 2.0 was passed by the German Federal Ministry of the Interior. Among other things, the regulation provides for changes in connection with the protection of critical infrastructures (KRITIS). For example, KRITIS companies are confronted with the expansion of their reporting obligations. CARMAO GmbH…