Important Update: Community URLs redirect issues are partially resolved. Learn More. .

cancel
Showing results for 
Search instead for 
Did you mean: 
Archer Blogs
Learn about the latest news for the Archer Suite

Forum Posts

RSA Archer PCI Management

What are the basics of PCI-DSS Compliance?The Payment Card Industry Data Security Standard (PCI-DSS) defines a consolidated set of security best practices endorsed by major card brands, which are designed to reduce fraud risk associated with credit c...

Integrated Risk Management and Digital Risk

In their ongoing effort to clarify the concepts of integrated risk management (IRM) and digital risk management (DRM), Gartner has begun to discuss the interconnection of IRM and DRM with enterprise risk management (ERM). Source: https://blogs.gartne...

Wheeler IRM ERM Image.JPG COSO ERM Public Exposure.JPG

CIBR/SecOps - Splunk Integration

SecOps has been able to integrate with Splunk OOTB since SecOps 1.1 via the RCF, however, the method for integrating with Splunk has not changed. To be more specific, the current integration files used for sending Splunk alerts in CEF format to SecOp...

RSA Archer Third Party Catalog

What is a Third Party Catalog?The RSA Archer Third Party Catalog provides organizations the capability to inventory all of the third parties with whom they do business and to document their third parties in accordance with their organizational struct...

RSA Archer Crisis Management

What is crisis management?Crisis management is preparing for and handling larger and more complicated disruptive events from start to finish. Crisis management is aligned with business continuity and disaster recovery planning and execution, allowing...

RSA Archer Incident Management

What is Incident Management?Incident management is tracking, treating and resolving incidents that are more common and operational in nature, ranging from cyber and physical events, to minor social media outbreaks or others. Incident management inclu...

Making Great Features Even Better In 6.5

One of my favorite things about the RSA community and the idea exchange is the ability to gather feedback and insight from the community on how RSA Archer could make great features even more useful. In this topic, I am going to cover several feature ...

Set Values List To No Selection.jpg BCS History Log.jpg calc operator for bulk create.jpg Group As Configuration.jpg

RSA Archer Audit Engagements & Workpapers

What are audit engagements and workpapers?Audit engagements are the mechanism that internal audit teams use to scope, plan and execute their evaluations of risks and associated internal controls, and related areas of their organization. Audit workpap...

RSA Archer Audit Planning & Quality

What is audit planning? Audit planning is the practice where internal audit functions assess the risk across their audit universe and determines the audit engagements they need to perform in the months and quarters ahead. They plan their audits based...

RSA Archer Cyber Incident & Breach Response

What is a cyber incident / breach response program?Cyber and security breaches continue dominating front page headlines all over the world. It’s not enough to hope it doesn’t happen to you or assume you’ll be able to respond effectively if it does. C...

RSA Archer Technology Updates That You Need to Know - Update

Updated March 21, 2019As part of our ongoing effort to update strategic technical components, I wanted to highlight some of the changes surrounding this effort. The impact to you will depend on your infrastructure, configuration and features used. Mo...

Anonymous by Not applicable
  • 1624 Views
  • 0 comments
  • 11 kudos