New & Notable


Best practices to offset mobile security threats

Security expert Georgia Weidman explains how enterprise mobility and the IoT are fueling enterprise security threats and offers pointers on fortifying cybersecurity strategies.


Enterprise security in the hyperconnected world

Security expert Georgia Weidman explains the assumptions versus the realities of corporate network security, and highlights the biggest risk factors facing modern enterprises.


Enterprise cybersecurity: IoT, mobile gaps persist

In this webcast, data security expert Georgia Weidman discusses how changing network perimeters create numerous complications for enterprise cybersecurity strategies.


Addressing a cybersecurity skills shortage

Recent studies show that as cyber threats evolve, CISOs will face a cybersecurity talent shortage and an increasingly integral role in company processes.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Compliance Management challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Compliance Management Basics

  • Get Started

    Non-traditional endpoints complicating cybersecurity

    In this webcast, learn how non-traditional mobile endpoints are forcing organizations to re-examine their data protection techniques, including cybersecurity awareness training.

  • Get Started

    PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public companies in the United States to protect investors' interests.

  • Get Started

    cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives. Cyborg anthropology as a discipline originated at the 1993 annual meeting of the American ...

View All Get Started

Blog: IT Compliance Advisor

Sections from across SearchCompliance

  • News

    View All
  • Managing governance and compliance

    Top 10 GRC stories of 2015

    We've rounded up the top 10 governance, risk and compliance stories of the year, with timely advice about GRC strategy, 2015 compliance challenges and best practices for overcoming data security issues.

  • Managing compliance teams

    GRC professionals remain in demand

    As organizations' data threats and regulatory demands increase, GRC professionals are seeing their IT compliance management skill sets become highly prized across industries.

  • Risk management and compliance

    Data privacy protection lacking in cybersecurity legislation

    #GRCChat participants discuss how cybersecurity legislation could hurt data privacy and what personal information protections should be included in the new rules.