• June 29, 2015 29 Jun'15

    New tactics for improving critical infrastructure cybersecurity pushed by MIT consortium

    The MIT Sloan School of Management has launched a consortium that touts interdisciplinary research and cooperation as keys to improving cybersecurity.

  • May 14, 2015 14 May'15

    Go beyond compliance checkboxes to avoid information security breaches

    In this #GRCChat, participants discuss the causes behind information security breaches and how enterprises can protect against them.

  • May 12, 2015 12 May'15

    Changes in technology create new difficulties for GRC processes

    In this #GRCChat, participants discuss how changes in technology affect GRC management and consider who should be responsible for that management.

  • April 30, 2015 30 Apr'15

    Will cybersecurity legislation's data sharing measures hurt privacy?

    Information sharing plays a big role in proposed cybersecurity legislation, but will the new measures hurt data privacy? Discuss with us during #GRChat May 7 at 12 p.m. EST.

  • April 28, 2015 28 Apr'15

    Records management strategies to maintain regulatory compliance

    Companies operating in the digital age generate more data than ever before. Storage costs also remain relatively cheap, so many businesses keep data "just in case" it is needed for business purposes or to settle a compliance issue. With so much data...

  • Sponsored News

    • June 03, 2015 03 Jun'15

      5 Steps You Should Take in Conducting an Information Governance Audit

      Chances are your organization may conduct a periodic information audit in order to assess the status, location, risk, visibility and ownership of essential data. It may be a formal, documented process designed to address issues such as governance, risk and compliance, or it may be a less structured approach that is driven by unforeseen events such as service interruptions, data breaches or some form of data loss. Or it may simply be a check-off item on a senior executive’s annual performance review.

    • June 03, 2015 03 Jun'15

      Using Metadata Wisely to Mitigate Risk and Uncover Opportunities

      The role of metadata has become increasingly prominent in how everyone from data scientists and business leaders to compliance officers and financial auditors look at data as a strategic asset. Metadata—literally, “information about information”—is an invaluable element in organizations’ strategies to gain critical visibility into the status, location and ownership of corporate data.

    • June 03, 2015 03 Jun'15

      The Challenge of Information Fragmentation—Where Is That Data?

      As data grows at a breakneck pace, it may be easy for organizations to overlook a fundamental requirement of information governance: locating the data. And finding a given piece of information is no picnic, especially when data no longer consistently and solely resides in well-known, on-premises data repositories managed by DBAs with intimate knowledge of the data.

    • June 03, 2015 03 Jun'15

      Why “Store Everything” Isn’t a Strategy for Information Governance

      A tidal wave of information growth is adding complexity, cost and risk for most organizations. Multiple analyst firms indicate that data is growing by more than 40% annually—and will likely continue doing so for the foreseeable future. In fact, one estimate indicates that 90% of the world’s data has been generated in just the past two years. Now, many analysts are wondering about the implications of this, including Ase Dragland of Sintef. “Internet-based companies are awash with data that can be grouped and utilized,” he noted. “Is this a good thing?”

  • March 20, 2015 20 Mar'15

    How can business balance GRC management with consumer risk protection?

    What GRC management best practices can keep business data compliant while reducing consumer risk? Discuss with us during #GRCChat March 26 at 12 p.m. EST.

  • March 17, 2015 17 Mar'15

    SEC oversight reaches new levels under Regulation SCI

    Regulation SCI marks a new era for SEC oversight of companies' IT compliance processes, and information governance expert Jeffrey Ritter discusses how in this Q&A.

  • March 17, 2015 17 Mar'15

    Will new net neutrality regulations spur investment and innovation?

    The FCC gave new net neutrality regulations the go-ahead, but the battle for an open Internet is hardly over. In this #GRCChat recap, find out whether the new regulations mean good news for innovation and consumer privacy.

  • February 05, 2015 05 Feb'15

    Wearables in the workplace strain existing GRC policies

    Have you considered the GRC implications of wearables in the workplace? In this #GRCChat recap, participants consider the impact of wearables on established policies and how businesses can ensure data security and privacy.

  • January 29, 2015 29 Jan'15

    Enforce GRC essentials for a strong BYOD security policy

    In this #GRCChat, find out what GRC features to keep top of mind when designing a BYOD security policy -- and how to ensure employees are on board.

  • January 20, 2015 20 Jan'15

    Enterprise GRC jargon you're abandoning in 2015

    There are many nebulous enterprise GRC and security terms that need to be scrapped. In this #GRCChat recap, SearchCompliance followers share the lingo they can't wait to jettison this year.

  • January 19, 2015 19 Jan'15

    2015 might be a big year for these GRC technologies

    This could be a big year for GRC technologies. #GRCChat-ters predict which tools and processes will continue their upward trend in 2015 and which will wane.

  • January 13, 2015 13 Jan'15

    Top enterprise GRC and security predictions for 2015

    Can we leave the "year of the breach" title to 2014? In this #GRCChat recap, participants shared their enterprise GRC and security predictions for 2015.

  • January 07, 2015 07 Jan'15

    GRC 2015: What do you hope to achieve this year?

    A new year means a fresh start. In this #GRCChat recap, participants assess their current IT challenges and share their GRC 2015 resolutions.

  • January 06, 2015 06 Jan'15

    What were your top IT GRC regrets from 2014?

    Information security is moving up the priority list at many organizations. In this #GRCChat recap, participants look back at 2014 to discuss their top IT GRC regrets.