SearchCompliance

New & Notable

News

What's on the horizon for active cyberdefense?

Cyberthreats are becoming more advanced, with more companies turning to offensive security tactics to combat them. #GRCChat-ters predict how companies can navigate the unclear waters of active cyberdefense.

Manage

User empowerment key to cybersecurity strategy

As the line between business and personal data continues to blur, user empowerment could prove to be the key to an effective cybersecurity strategy.

#GRCChat: Compliance trends in 2015

Join SearchCompliance for our year-end Twitter chat on 2015 compliance, governance and risk management trends Thursday, Dec. 18, at 12 p.m. EST.

Problem Solve

Advanced threats require new look at security processes

Modern companies constantly seek improved data protection, and a great place to start is a reexamination of internal security governance processes.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Compliance Management challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Compliance Management Basics

  • Get Started

    Chief Risk Officer (CRO)

    The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological risks across the enterprise.

  • Get Started

    Communication, fundamentals key to cybersecurity

    Data protection expert Winn Schwartau discusses information security and why companies should remember the past when developing cybersecurity strategy.

  • Get Started

    autoclassification

    Autoclassification is an intelligent technology found in some content management systems (CMS) wherein documents are scanned and automatically assigned categories and keywords based on the content within the documents.

View All Get Started

Blog: IT Compliance Advisor

Sections from across SearchCompliance

  • News

    View All
  • Vulnerability assessment for compliance

    What's on the horizon for active cyberdefense?

    Cyberthreats are becoming more advanced, with more companies turning to offensive security tactics to combat them. #GRCChat-ters predict how companies can navigate the unclear waters of active cyberdefense.

  • Risk management and compliance

    #GRCChat: Compliance trends in 2015

    Join SearchCompliance for our year-end Twitter chat on 2015 compliance, governance and risk management trends Thursday, Dec. 18, at 12 p.m. EST.

  • Vulnerability assessment for compliance

    Going on the offensive? Security advice to consider

    In IT, offensive security can involve methods other than 'hacking back.' In this #GRCChat recap, participants offer examples of active defense tactics, as well as advice on when to go on the offensive.

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close