Vulnerability assessment for compliance

Email Alerts

Register now to receive SearchCompliance.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Center for Internet Security (CIS)

    The Center for Internet Security (CIS) is a nonprofit organization focused on improving public- and private-sector cybersecurity readiness and response. 

  • risk exposure

    Risk exposure is a quantified loss potential of business actions, and is usually calculated based on the probability of the incident occurring multiplied by its potential losses. 

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a device or software application that alerts an administrator of a security breach, policy violation or other compromise that may adversely affect the administrator's information technology (IT) network.  

  • ISO 27002 (International Organization for Standardization 27002)

    The ISO 27002 standard is a collection of information security guidelines that are intended to help an organization implement, maintain, and improve its information security management. 

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings. 

  • risk intelligence (RQ)

    Risk intelligence (RQ) is a term used to describe predictions made around uncertainties and future threat probabilities. 

  • U.S. Department of Homeland Security (DHS)

    The U.S. Department of Homeland Security (DHS) is a federal agency designed to protect the United States against threats. 

  • internal control

    An internal control is a business practice, policy or procedure that is established within an organization to create value or minimize risk. 

About Vulnerability assessment for compliance

Organizations must effectively use technology to share data while protecting personal information from identity theft. Learn how to assess vulnerabilities, including how to analyze data security and privacy issues, with the latest news, advice, commentary and best practices for regulatory compliance professionals.