SearchCompliance

New & Notable

Manage

Q&A: Building corporate infosec and privacy culture

Human error remains a threat to data, but privacy advocate Grace Buckler says setting the tone with company culture can offset enterprise information security and privacy risks.

Manage

Is big data-anonymization possible?

Data anonymization techniques are designed to preserve privacy of shared data, but do they work with high-dimensional data? Here's what experts have to say.

Get Started

The consumer device influence on cyber laws, regulation

Calls are growing louder for information security regulations to target consumer-centric technology such as the IoT and drones, but legislating their use could prove difficult.

Manage

IoT cybersecurity questions and answers

In this webcast, CISO Demetrios Lazarikos answers questions about IoT cybersecurity strategies and best practices.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Compliance Management challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Compliance Management Basics

  • Get Started

    cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives. Cyborg anthropology as a discipline originated at the 1993 annual meeting of the American ...

  • Get Started

    RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of regulatory compliance.

  • Get Started

    The consumer device influence on cyber laws, regulation

    Calls are growing louder for information security regulations to target consumer-centric technology such as the IoT and drones, but legislating their use could prove difficult.

View All Get Started

Blog: IT Compliance Advisor

Sections from across SearchCompliance

  • News

    View All
  • Managing governance and compliance

    Top 10 GRC stories of 2015

    We've rounded up the top 10 governance, risk and compliance stories of the year, with timely advice about GRC strategy, 2015 compliance challenges and best practices for overcoming data security issues.

  • Managing compliance teams

    GRC professionals remain in demand

    As organizations' data threats and regulatory demands increase, GRC professionals are seeing their IT compliance management skill sets become highly prized across industries.

  • Risk management and compliance

    Data privacy protection lacking in cybersecurity legislation

    #GRCChat participants discuss how cybersecurity legislation could hurt data privacy and what personal information protections should be included in the new rules.

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close