DIY GRC – Using Archer to Build Your Organization

By Eric Noonan • August 9, 2016

Wouldn’t it be great if there were an “easy” button for developing your organization’s governance, risk, and compliance departments? There are several aspects to consider when building out each sector, such as, what kind of control assessments should we have and how often? What kind of approval chain should our policy documents be following? How should we conduct our business impact analyses? Where should we house our asset inventory? How do we tie all of these aspects together? Why is GRC even important?

As the result of several notable cyber-attacks throughout the years, governance, risk, and compliance are factors in the corporate environment that no organization, either big or small, can escape from. The concept of focusing on growth without considering risks is not only impractical but also unsustainable. Too often we see common themes among the victims of cyber-attacks: failures to link development strategy with risk, the lack of oversight for risk management, and the lackadaisical viewpoint on a day-to-day risk. A major problem with most corporations is that their processes involving GRC are spread out amongst several different groups. These groups often fail to share information and wind up having a multiplicity of frameworks and processes. This results in inefficiency and greater exposure to risk across the entire organization. For all these reasons, it is imperative organizations of all sizes recognize the importance of GRC convergence and collaborate across all lines of business to reduce risk and enforce compliance. One of the best ways to achieve this mentality and efficiency is by employing a comprehensive risk management tool such as RSA Archer.

The RSA Archer GRC platform offers users a simple yet comprehensive way to design, build, and manage solutions that can grow right along with your business. Customers can configure enterprise-class, security-assured applications and deploy them in a way that enables and prepares their organization to maintain compliance and prevent risk. In addition to providing customers with a foundation for compliance through content bundles for the Policies, Control Standards, Control Procedures, Authoritative Sources, and other applications; Archer also comes complete with pre-configured reports and dashboards to utilize as building blocks for your reporting metrics. Furthermore, Archer provides users with assessment content such as built-in business impact analysis, quarterly risk, control self-assessment, device, and facility questionnaires. These pre-configured questionnaires allow users to automatically score questionnaires and generate findings for incorrect answers, they can even be issued automatically via campaigns. When it comes to governance, risk and compliance functionality, the possibilities are endless with Archer.

CyberSheath’s team of experienced Archer security consultants have years of experience in both private and public environments implementing and deploying both custom and prepackaged solutions. Having worked with and successfully deployed all use cases provided by RSA, we are your “easy” button to developing your GRC sector of your organization.

CyberSheath Blog

Dr. Robert Spalding to Address Nation-State Attacks at CMMC Con 2021

Since the inaugural CMMC Con, we’ve seen some of the most malicious attacks on American infrastructure ever executed. The SolarWinds attack reverberated across the entire government as agencies scrambled to discover what nation-state attackers had accessed and stolen. The Colonial Pipeline, shut down by a ransomware attack, led to fuel…

CMMCEnclave: Add Versatility with a More Flexible Approach

The enclave approach to CMMC compliance is one of the most cost effective and least disruptive ways to safeguard CUI. You can maintain high-value custodial security of CUI without upending your existing processes, procedures, and people. That way, you can maintain the proper level of CMMC compliance and remain eligible…

CMMC Con 2021 Opens Registration, Reveals Theme and Speakers

CMMC compliance stands in the way of revenue for every defense contractor in the supply chain. Now that CMMC is a reality for the Defense Industrial Base (DIB), learn how contractors — primes and subs, large and small, foreign-owned — are handling the standards and requirements, as well as the…

Our Trusted Partners

Cyberark McAfee Thycotic RSA Tenable Alien Vault Alert Logic Microsoft

CMMC Con 2021 is here! Save your spot to hear the latest on CMMC from our expert speakers across the government and Defense Industrial Base.