Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Reciprocity

Founded in 2009, Reciprocity has reimagined bulky legacy GRC software to meet the demands of today's dynamic data-driven ecosystem. The company is recognized for its forward-thinking cloud platform, ZenGRC, that elevates risk, compliance, and audit from a burdensome expense to a strategic advantage. Reciprocity has U.S. headquarters in San Francisco and global offices in Ljubljana, Slovenia, and Argentina.

Our Website: https://reciprocitylabs.com/


Latest Content From Reciprocity

Whitepaper: Customer Case Study: Omada Health and ZenGRC

by ReciprocityJul 02, 2020

Omada Health, one of the largest digital healthcare companies in the world, needed to meet stringent personal health information (PHI) standards that spreadsheets just couldn't keep up with.

Download this case study to learn how Omada Health:

• Became the first digital health company to achieve certification with a number of security frameworks (including SOC 2)
• Manages the risks and vulnerabilities associated with vendors
• Stays compliant with the most sensitive information people have


Whitepaper: Vendor Risk Management: Why Your Business Needs It

by ReciprocityJul 01, 2020

While the risks of vendors are not new to most CISOs, our current business environment has expanded those risks dramatically.

This e-book will explore:

• First, why are vendor risks proliferating--why now, and where do they come from?
• Second, what steps are necessary to manage vendor risks?
• Third, how can CISOs and compliance officers implement those steps in a practical way, so you don't spend all your time chasing vendors with risk management protocols?


Whitepaper: Case Study: Netskope and Reciprocity

by ReciprocityJun 24, 2020

Netskope, a leading security cloud company with offices in six countries, needed a compliance management solution that was able to:

• Simplify and centralize risk and compliance
• Formalize monitoring and reporting
• Provide out of the box integrations with leading business and infosec applications


Whitepaper: Case Study: Global Pharma and Reciprocity

by ReciprocityJun 24, 2020

A global pharmaceutical distributor had a very confusing and time-consuming risk management process. They struggled with manual tracking and management calling the process "awkward, confusing, and time-consuming."

Discover how the pharmaceutical distributor attained:
• Streamlined vendor risk management
• A central system of record
• Workflow automation

"We wouldn't be anywhere near where we are in our risk management program without ZenGRC."
- Cyber Risk Manager


Whitepaper: Simplify InfoSec Risk and Compliance

by ReciprocityApr 30, 2020

Managing risk, compliance, and audit processes is complex and resource intensive. Without a centralized platform, audit cycles are longer, visibility into overall risk posture is lacking, and reporting is inefficient. Many companies delay implementing a GRC solution, fearing it to be too costly or challenging--but it doesn't have to be.

Download this whitepaper to learn how you can:
• Automate evidence collection
• Reduce manual effort and shorten audit cycles
• Increase visibility with dashboards and real-time reports
• Get a holistic view of organizational risk


Whitepaper: Strengthen Your Risk Posture

by ReciprocityApr 30, 2020

Keeping up with the evolving risk landscape can be challenging. In addition to the evolving landscape, many companies have out-of-date processes, disconnected systems, and lack the visibility to understand their true risk posture.

Download this report to discover how to:
• Strengthen your organizational risk posture
• Automatically monitor risk and streamline remediation
• Enable faster decision making
• Provide custom reporting dashboards


E-Book: The Art of Risk Management: Six Steps to Maturity

by ReciprocityApr 30, 2020

There are typically four ways to handle risk. You can accept, mitigate, transfer, or avoid it. When it comes to risk management, remediating and controlling vulnerabilities proactively is a great way to reduce the likelihood that risks will occur in the first place.

In this e-book, discover the six easy steps to better risk management:
• Understand the real meaning of risk
• Take a big picture view of risk
• Know your weaknesses
• Start small, then scale up
• Learn from your mistakes
• Attain full program maturity


Whitepaper: Where is Your Security Program in Relation to the Negligence Threshold?

by ReciprocityApr 30, 2020

Do you have the right tools in place to assess your security program? More importantly, will the tools you have today shed light on your organization's "negligence threshold"? Generalized risk management methods struggle to address emerging threats and fail to prevent negligent activities. With the right tools and software, you can leverage maturity models and dedicated frameworks to bring meaning to your practices, prove your intent to protect, and achieve operational efficiency.

Read this whitepaper to learn the importance of maturity models, with insightful information on:
• Benefits of information security frameworks
• NIST CSF
• Secure controls frameworks with the security and privacy capability maturity model
• Roadmap for continuous improvement