SearchCompliance

New & Notable

News

What does it take to build a strong BYOD policy?

In this #GRCChat, find out what GRC features to keep top of mind when designing a BYOD security policy -- and how to ensure employees are on board.

Evaluate

Data threats put spotlight on info security pros

Information security professionals can continue to expect more responsibilities as online data protection evolves into a top business priority.

News

What enterprise GRC terms are you ditching in 2015?

There are many nebulous enterprise GRC and security terms that need to be scrapped. In this #GRCChat recap, SearchCompliance followers share the lingo they can't wait to jettison this year.

News

GRC technologies to watch in 2015

This could be a big year for GRC technologies. #GRCChat-ters predict which tools and processes will continue their upward trend in 2015 and which will wane.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Compliance Management challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Compliance Management Basics

  • Get Started

    Employee wearable tech use forces data governance changes

    Wearable technology has started to creep into the business world, but companies must overcome the data governance complications to reap any benefits.

  • Get Started

    privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or legislation.

  • Get Started

    COMSEC (communications security)

    Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic, or to any information that is transmitted or transferred.

View All Get Started

Blog: IT Compliance Advisor

Sections from across SearchCompliance

  • News

    View All
  • Managing governance and compliance

    What does it take to build a strong BYOD policy?

    In this #GRCChat, find out what GRC features to keep top of mind when designing a BYOD security policy -- and how to ensure employees are on board.

  • Managing governance and compliance

    What enterprise GRC terms are you ditching in 2015?

    There are many nebulous enterprise GRC and security terms that need to be scrapped. In this #GRCChat recap, SearchCompliance followers share the lingo they can't wait to jettison this year.

  • Managing governance and compliance

    GRC technologies to watch in 2015

    This could be a big year for GRC technologies. #GRCChat-ters predict which tools and processes will continue their upward trend in 2015 and which will wane.

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close