SearchCompliance

New & Notable

Evaluate

Technology tools, policies for a corporate compliance program

At many organizations, departments operate in silos, with a lack of communication leading to redundant or inefficient processes. But business leaders are increasingly looking to link disparate departments from an information governance, risk ...

Get Started

Three tips for building an effective cybersecurity strategy

Corporate compliance and risk management expert Jeff Jenkins outlines three invaluable -- but often overlooked -- strategies that companies should incorporate during cybersecurity program development.

#GRCchat: Discuss big data and e-discovery management

Join SearchCompliance Thursday, Aug. 21, to discuss how big data has complicated e-discovery management and best practices to avoid legal complications around digital information governance.

Evaluate

Target executives held accountable in breach fallout

Target Corp. has made major executive changes in the months following its massive 2013 data breach as the company strives to reassure customers and rework digital information security processes.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Compliance Management challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Compliance Downloads

View All

Compliance Management Basics

  • Get Started

    Three tips for building an effective cybersecurity strategy

    Corporate compliance and risk management expert Jeff Jenkins outlines three invaluable -- but often overlooked -- strategies that companies should incorporate during cybersecurity program development.

  • Get Started

    records management

    Records management (RM) is the administration of records and documented information for the entirety of its lifecycle, which includes creation, maintenance, use, storage, retrieval and disposal.

  • Get Started

    unknowable risk

    An unknowable risk is a potential threat to an organization's processes that is not known and cannot be quantified or controlled.

View All Get Started

Multimedia

Videos, Podcasts and Photo Stories

Blog: IT Compliance Advisor

Sections from across SearchCompliance

  • News

    View All
  • E-discovery and compliance

    #GRCchat: Discuss big data and e-discovery management

    Join SearchCompliance Thursday, Aug. 21, to discuss how big data has complicated e-discovery management and best practices to avoid legal complications around digital information governance.

  • Compliance policy management software

    Automated compliance will force GRC pros to adapt

    As companies increasingly automate compliance data management, GRC professionals may be wary about job security. Our #GRCchat participants say that GRC pros will have to develop new skills in order to avoid being rendered obsolete.

  • Compliance reporting software

    The risks and rewards of automating regulatory compliance

    Increasingly complicated compliance mandates have led some businesses to implement automated processes to save resources. Participants in July's #GRCChat said compliance automation can assist data management, but also warned of unintended ...

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close