<
×
Home
About
Contact
Join The Winners
Join The Winners
Uno.ai - GRC Glossary
Explore the most sophisticated Gen AI GRC Autonomous Agent Platform.
A
B
C
D
E
F
G
I
K
L
M
N
O
P
Q
R
S
T
V
W
Z
A
Audit Trail
Audit Evidence
Audit Scope
Audit Program
Audit Universe
Audit Committee
Audit Findings
Anonymization
Advanced Persistent Threat (APT)
Alternate Site Strategy
Accountability Framework
Anti-Corruption Measures
Awareness Campaign
Audit Management Software
Advisory Groups
Alignment Framework
B
Board Governance
Business Impact Analysis
Business Impact Analysis
Business Continuity Plan
Benchmarking
Balanced Scorecard
Behavioral Norms
Benchmarking
Business Process Management Software
Business Strategy Integration
Balanced Scorecard
C
Corporate Governance
Compliance Framework
Compliance Audit
Compliance Risk
Compliance Monitoring
Compliance Program
Compliance Assessment
Compliance Culture
Compliance Reporting
Compliance Officer
Compliance Training
Compliance Checklist
Compliance Management System
Compliance Violations
Compliance Documentation
Compliance Metrics
Compliance Requirements
Compliance Framework
Compliance Mapping
Control Environment
Control Activities
Control Objectives
Corrective Controls
Compliance Controls
Control Framework
Control Testing
Control Deficiencies
Continuous Monitoring
Control Testing
Continuous Auditing
Consent Management
Cross-Border Data Transfer
California Consumer Privacy Act (CCPA)
Contractual Risk Clauses
Continuity of Operations Plan
Crisis Management
Continuity Strategy
Critical Function Identification
Communication Plan
Continuous Improvement
Code of Conduct
Conflict of Interest
Corporate Social Responsibility
Control Assessment
Competency Framework
Cultural Awareness Training
Compliance Training
Compliance Reporting
Compliance Management Tool
Cloud Compliance Solutions
Continuous Monitoring Solutions
Communication Plan
Collaboration Framework
Crisis Communication
Change Management
D
Detective Controls
Documentation Standards
Data Subject
Data Processing
Data Controller
Data Processor
Data Minimization
Data Breach Notification
Data Protection Officer
Data Retention Policy
Data Breach Response
Due Diligence Checklist
Disaster Recovery Plan
Data Visualization
Data Analytics
Data Integrity
Data Governance Tools
Data Loss Prevention Tools
E
Executive Governance
Emerging Risks
Evidence Collection
Encryption Standards
Endpoint Protection
Emergency Response Plan
Ethical Standards
Ethics Training
Ethical Decision-Making
E-Learning
Executive Reporting
Engagement Strategy
Engagement Metrics
Engagement Reporting
F
Financial Controls
Fieldwork
Findings Report
Follow-Up Audit
Firewall Management
Fair Trade Practices
Feedback Mechanism
G
Governance Framework
Governance Structure
Governance Policies
Governance Risk
Governance Maturity Model
Governance Roles and Responsibilities
Governance Oversight
Governance Best Practices
Governance Metrics
Governance Processes
Governance Committees
Governance Models
Governance Review
Governance Accountability
Governance Compliance
Governance Strategy
General Data Protection Regulation (GDPR)
GRC Platform
I
Inherent Risk
Industry Standards
Internal Control Systems
Incident Response Plan
Intrusion Detection System (IDS)
Identity and Access Management (IAM)
Incident Response Plan
Incident Classification
Incident Escalation
Incident Resolution
Incident Lifecycle
Incident Record
Incident Prioritization
Incident Communication
Incident Tracking
Incident Management System
Incident Reporting
Incident Documentation
Incident Investigation
Incident Coordination
Incident Response Team
Incident Response Team
Integrity Management
Inherent Risk
Impact Analysis
Interactive Workshops
Incident Reporting Metrics
Integrated Risk Management Software
Incident Response Tools
Identity and Access Management Systems
Influence Mapping
K
Key Risk Indicators (KRIs)
Key Performance Indicators (KPIs)
Knowledge Assessment
KPI (Key Performance Indicator)
L
Loss Event
Legal Obligations
Legislative Framework
Likelihood Assessment
Learning Management System (LMS)
M
Management Override
Monitoring Controls
Materiality
Management Letter
Malware Analysis
Moral Philosophy in Business
Microlearning
Metric Dashboard
N
Network Segmentation
O
Operational Controls
Outsourcing Risk
Operational Efficiency
Outcome Measurement
Onboarding Training
Operational Metrics
Organizational Objectives
P
Preventive Controls
Policy Compliance Checks
Post-Audit Review
Personal Data
Privacy by Design
Privacy Impact Assessment
Pseudonymization
Privacy Shield
Penetration Testing
Phishing Simulation
Policy Lifecycle
Policy Ownership
Policy Framework
Policy Review Process
Policy Distribution
Policy Version Control
Policy Compliance Monitoring
Policy Exception Management
Policy Awareness Campaigns
Policy Approval Workflow
Policy Alignment
Policy Document Management
Policy Communication Strategy
Policy Implementation Plan
Policy Audit Trail
Post-Incident Review
Plan Testing and Exercises
Plan Maintenance and Review
Performance Metrics
Performance Appraisal
Performance Optimization
Performance Review Cycle
Performance Dashboard
Performance Analytics
Performance Goals
Performance Framework
Process Improvement
Performance Evaluation
Performance Reporting
Professional Conduct
Performance Reporting
Performance Scorecard
Policy Automation Tool
Public Engagement
Participatory Governance
Performance Alignment
Portfolio Management
Performance Metrics
Q
Quantitative Risk Assessment
Qualitative Risk Assessment
Qualitative Risk Assessment
Quantitative Risk Assessment
Quantitative Metrics
Qualitative Metrics
R
Risk Appetite
Risk Tolerance
Risk Mitigation
Residual Risk
Risk Identification
Risk Analysis
Risk Response
Risk Monitoring
Risk Framework
Risk Register
Risk Scenario
Risk Triage
Risk Tolerance Statement
Risk Tolerance Threshold
Regulatory Compliance
Regulatory Compliance Framework
Regulatory Landscape
Regulatory Guidance
Regulatory Oversight
Regulatory Reporting
Regulatory Authority
Regulatory Change Management
Regulatory Updates
Regulatory Alignment
Regulatory Risk Assessment
Regulatory Impact Analysis
Regulatory Audit
Regulatory Enforcement
Risk Mitigation Controls
Remediation Plans
Risk-Based Audit
Right to Access
Right to Erasure
Risk Mitigation Strategies
Risk Mitigation Strategies
Risk Scoring System
Risk Tolerance Levels
Root Cause Analysis
Recovery Time Objective
Recovery Point Objective
Resource Requirements
Resilience Planning
Risk Appetite
Risk Tolerance
Residual Risk
Risk Mitigation
Risk Scoring
Risk Register
Risk Heat Map
Risk Evaluation
Risk Prioritization
Risk Treatment Plan
Risk Indicators
Refresher Course
Role-Specific Training
Reporting Frequency
Report Generation
Regulatory Reporting
Risk Assessment Software
Regulatory Change Management Software
Risk Analytics Tools
Resource Allocation
S
Stakeholder Governance
Statutory Regulations
Segregation of Duties
Self-Assessment
Substantive Testing
Sampling Techniques
Security Information and Event Management (SIEM)
Security Operations Center (SOC)
Security Incident
Security Awareness Training
Service Level Agreement (SLA) Management
Supply Chain Risk Management
Subcontractor Risk Assessment
Stakeholder Communication
Supply Chain Continuity
Scenario Planning
Strategic Performance Management
Scenario Analysis
Simulation Training
Scenario-Based Learning
Scorecard Reporting
Statistical Reporting
Security Information and Event Management (SIEM)
Stakeholder Mapping
Stakeholder Analysis
Stakeholder Satisfaction Survey
Stakeholder Relationship Management
Stakeholder Forum
Social License to Operate
Stakeholder Advocacy
Stakeholder Prioritization
Strategic Goals
Strategic Initiatives
Strategic Roadmap
Strategic Planning Process
T
Threat Intelligence
Third-Party Due Diligence
Third-Party Monitoring
Third-Party Risk Framework
Third-Party Relationship Management
Third-Party Risk Register
Threat Intelligence
Target Setting
Transparency Principles
Threat Modeling
Training Module
Trend Analysis
Threat Intelligence Platform
Third-Party Risk Assessment Tools
Two-Way Communication
V
Vulnerability Management
Vendor Risk Assessment
Value Creation
Vulnerability Assessment
Variance Analysis
Vulnerability Management Tools
Value Creation
Vision and Mission Alignment
W
Workpapers
Whistleblower Policy
Workflow Automation for GRC
Z
Zero Trust Architecture