By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Managing compliance operations News
June 22, 2017
Regulatory compliance initiatives remain at the top of GRC professionals' lists of priorities this year, according to TechTarget's annual IT Priorities survey.
March 31, 2017
InfoSec should start talking to the business in the language of security risk,Tom Kartanowicz, head of information security at Natixis, North America, told the audience at the recent CDM Media CISO ...
December 01, 2016
The future of regulatory compliance is under scrutiny as President-elect Donald Trump's administration continues the transition process. Also in recent GRC news: Hackers demanded ransom after ...
November 30, 2016
In today's threat-filled environment, money is not always a hacker's prime motivation. They could be driven by political reasons or just want to embarrass organizations. But irrespective of their ...
Managing compliance operations Get Started
Bring yourself up to speed with our introductory content
Companies still struggle to adapt risk management strategies to face modern threats, but maturing their cybersecurity governance processes is a step in the right direction. Continue Reading
The General Data Protection Regulation is set to affect many, and not just those in the EU. If your organization collects data online, you may soon have to make some tough choices. Continue Reading
Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business. Continue Reading
Evaluate Managing compliance operations Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In this SearchCompliance FAQ, learn how members of the technology industry are working together to voice opposition to President Trump's travel ban executive order. Continue Reading
The private sector operates much of U.S. critical infrastructure, but is it doing enough to further national cybersecurity strategy efforts designed to protect these assets? Continue Reading
As ransomware attacks continue to escalate, should organizations make employees an integral part of their ransomware detection and prevention strategy? Continue Reading
Manage Managing compliance operations
Learn to apply best practices and optimize your operations.
The fraud investigation process remains complicated for companies, but graph databases' information management techniques can help collect and manage valuable evidentiary data. Continue Reading
As companies struggle to protect constantly expanding attack surfaces, virtual containers could quickly become essential to companies' endpoint security strategy. Continue Reading
Security expert Georgia Weidman explains how enterprise mobility and the IoT are fueling enterprise security threats and offers pointers on fortifying cybersecurity strategies. Continue Reading
Problem Solve Managing compliance operations Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this webcast, learn how non-traditional mobile endpoints are forcing organizations to re-examine their data protection techniques, including cybersecurity awareness training. Continue Reading
Ransomware mitigation strategies should be a top business priority as the malware becomes increasingly common. But sometimes, paying up might be the only option. Continue Reading
Verizon's 2016 Data Breach Investigations Report found human vulnerabilities and errors continue to be among companies' top data security threats. Continue Reading