• From compliance to confidence: a practical guide to a proactive always on data privacy program

    From compliance to confidence: a practical guide to a proactive always on data privacy program

    Most large organizations say they have privacy covered. And on paper, they do. In practice, privacy often lives as disconnected work: documents, templates, and one-off reviews that prove something happened once, not a system that controls what happens next. That gap matters because privacy risk is created by change. A new analytics use case. A…

  • DORA just got a UK handshake: the EU – UK ICT oversight pact is a warning shot for third-party risk

    DORA just got a UK handshake: the EU – UK ICT oversight pact is a warning shot for third-party risk

    If your business depends on a small set of shared providers like cloud, identity, payments, or data platforms, your operational resilience risk is no longer just a “your firm” issue. It’s a system wide dependency. Regulators are now shifting supervision to where that risk sits: at the provider level, not just inside each regulated company.…

  • Beyond the checkbox: A value‑based guide to enterprise conflict of interest management

    Beyond the checkbox: A value‑based guide to enterprise conflict of interest management

    The conflict-of-interest wake-up call Most organizations do have a conflict of interest (COI) policy.  What they actually have, in practice, is this:  Legacy GRC will tell you that’s “good coverage.” It isn’t. It’s paperwork.  Conflicts of interest rarely blow up because they were hidden. They blow up because they were normalized, misunderstood, or never escalated until after a decision was made and challenged.  If you’re trying to run effective value-based…

  • Saudi sports law sets a new benchmark for governance, risk, and compliance in the Middle East

    Saudi sports law sets a new benchmark for governance, risk, and compliance in the Middle East

    Across the Middle East, governance, risk, and compliance are undergoing a quiet but consequential shift. What was once treated as a supporting function is increasingly becoming a core driver of credibility, investment, and long-term resilience.  This change is not being led by speeches, slogans or strategy documents. It is showing up in how regulation is…

  • CoreStream GRC 3.3 Release Notes

    CoreStream GRC 3.3 Release Notes

    1.0 Document Purpose This document provides a summary of the highlights of the CoreStream GRC Release 3.3 release. Major Platform releases are finalized every 2-3 months, depending on client and strategic priorities. These release notes are part of CoreStream GRC’s approach to keeping clients and partners informed of the improvements we are delivering. This document…

  • The latest cyber shocks and impact every business leader needs to know

    The latest cyber shocks and impact every business leader needs to know

    Over the past year, cyber-attacks have stopped looking like technical failures and started behaving like prolonged business crises.  Retailers, airlines, manufacturers, healthcare providers and media organizations have all been headline news for their cyber incidents. In many cases, the initial breach was only the beginning. We witnessed; operations were disrupted, supply chains stalled, customer services faltered and leadership teams were forced into crisis mode long after systems…