SearchCompliance
New & Notable
News
BIOS compliance standards to prevent exploitation
Cybersecurity vulnerabilities associated with PCs often overlook BIOS. Read for strategies to offset these threats and for preventing unauthorized BIOS modifications.
News
Infosec North America panelists: Due diligence decreases risk
Panelists at Infosec North America advised those charged with third-party vendor management to perform due diligence and assess the innate risk vendors create for business processes.
Evaluate
Risk mitigation strategies for OSI layers
Each layer of the Open Systems Interconnection presents unique vulnerabilities that could move to other layers if not properly monitored. Here's how to establish risk mitigation strategies for OSI layer security in Layers 4 through 7.
Evaluate
OSI security, compliance strategies to reduce risk
Each layer of the Open Systems Interconnection presents unique -- but connected -- vulnerabilities. Here's how to establish OSI security and compliance best practices.



Download: Top FAQs regarding the impact of 4 common compliance regulations
IT operations are sometimes unexpectedly affected by major audit regulations – is your IT team prepared? Explore the critical role your IT team plays in ensuring compliance and review the penalties for non-compliance by downloading this FREE e-guide, which covers any questions you might have regarding 4 major legislative regulations.
Trending Topics
-
E-discovery and compliance Manage
Governance tide shifts as courts allow digital evidence
Digital, computer-generated records have been used as evidence in recent court cases, and the trend could cause major changes for corporate data governance.
-
Information technology governance Evaluate
The implications of poor data management
The business fallout of poor data management processes goes well beyond security and privacy implications. Evident IT CEO David Thomas explains in this SearchCompliance Q&A.
-
SOX Get Started
Privacy Shield enforcement: Does it go far enough?
The FTC has issued its first enforcement actions for companies found in violation of the EU-U.S. Privacy Shield Framework, but are the rules doing enough to protect consumer data?
-
Risk management Evaluate
Risk mitigation strategies for OSI layers
Each layer of the Open Systems Interconnection presents unique vulnerabilities that could move to other layers if not properly monitored. Here's how to establish risk mitigation strategies for OSI layer security in Layers 4 through 7.
-
Content management software Evaluate
Is cloud-based data warehousing worth the risk?
Cloud services have become a popular cost-saving option for businesses, but they must be careful to protect against constantly evolving data risk.
-
Business records management Get Started
The new money: More businesses turn to data as currency
In this tip, learn digital information management strategies to take advantage of the growing data as currency movement.
Topics Covered
-
Assessing your regulatory compliance needs (7) +
-
Evaluating compliance software and solutions (12) +
- Compliance framework software
- Compliance policy management software
- Compliance reporting software
- Compliance services
- Content management software and compliance
- Data retention and compliance software
- Disaster recovery and compliance
- Document management software and compliance
- Encryption software solutions
- Financial and accounting software for compliance
- ID and access management for compliance
- Log management software solutions
-
Managing compliance operations (11) +
- Automating compliance processes
- Business continuity management and compliance
- Business records management
- Enterprise cloud compliance
- Information technology governance
- Managing compliance teams
- Managing governance and compliance
- Regulatory compliance audits
- Regulatory compliance reporting
- Regulatory compliance training
- Risk management and compliance
Have a question for an expert?
Please add a title for your question
Get answers from your peers on your most technical Compliance Management challenges.
Meet all of our Compliance Management experts
Find Solutions For Your Project
-
Evaluate
Risk mitigation strategies for OSI layers
Each layer of the Open Systems Interconnection presents unique vulnerabilities that could move to other layers if not properly monitored. Here's how to establish risk mitigation strategies for OSI layer security in Layers 4 through 7.
-
OSI security, compliance strategies to reduce risk
-
Data tracking a target for social engineering hacks, privacy risk
-
The implications of poor data management
-
-
Problem Solve
ITSM innovation: Align new tech with regulations in mind
In this Ask the Expert, IT governance expert Jeffrey Ritter discusses his formula to successfully align new technology with ITSM compliance standards -- all while minimizing risk.
-
GDPR compliance: Tips to bring tech, processes on board
-
AI and GDPR: Keeping AI algorithms compliant
-
'Gen V' attacks: The next cybersecurity problem?
-
-
Manage
Ask the expert: Build consumer trust through data protection
Privacy compliance strategy can help build consumer trust and improve security if companies stop looking at the regulations as an obstacle and more as a business opportunity.
-
Cybersecurity vulnerabilities: Filling the gaps
-
Metrics key to insider threat detection efforts
-
Evolving threats still challenge cyber-risk management
-
-
E-Handbook | August 2016
Digital governance and compliance tactics for the regulated business
Download -
E-Handbook | June 2016
Blockchain GRC: The innovation and regulatory balance
Download -
E-Handbook | April 2016
Drawing business value from GRC analytics
Download -
E-Handbook | February 2016
Beyond BYOD: How IoT and new tech are changing modern GRC
Download -
E-Handbook | December 2015
Data protection and security incident response when all information is a target
Download
Compliance Management Basics
-
Get Started
Data mapping the first step to CCPA compliance
In this SearchCIO Q&A, multiple experts sound off on major questions businesses have about CCPA compliance ahead of its January 2020 enforcement date.
-
Get Started
compliance audit
A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.
-
Get Started
regulatory compliance
Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes.
Multimedia
-
Get Started
Preparing your company for GDPR compliance
-
-
Vendor Resources
- CyberGRX Risk Assessment Methodology –White Paper
- ServiceNow Vendor Risk Management –White Paper
- Compliance Made Simple: Simplify Your Compliance with 7 Key Requirements –White Paper
Blog: IT Compliance Advisor
-
'Gen V' attacks: The next cybersecurity problem?
In a recent online presentation, Check Point Software Technologies founder and CEO Gil Shwed stated that "we are at an inflection point" when it comes to cybersecurity. Shwed's statement came on ...Continue Reading
-
SheHacks hackathon at BU promotes female tech advancement
For 36 hours during the last weekend in January, more than 1,000 attended one of the largest women's hackathons ever at SheHacks Boston. SheHacks Boston organizer Natalie Pienkowska said that the ...Continue Reading
-
More IT Compliance Advisor Posts
Being Cyber Essentials certified will help prep for GDPR
Alphabet unveils Chronicle cybersecurity business unit
Cybersecurity professionals struggle to make their job a priority
-
News
View All -
Vulnerability assessment for compliance
Infosec North America panelists: Due diligence decreases risk
Panelists at Infosec North America advised those charged with third-party vendor management to perform due diligence and assess the innate risk vendors create for business processes.
-
Risk management and compliance
Security a priority when designing smart cities, venues
With sustainability being a huge driver of modern business development, protecting consumers' cyber- and physical security is an essential element when designing smart cities and venues.
-
Risk management and compliance
How to boost the cybersecurity workforce
At the 2017 ISSA International Conference, experts urged companies to recruit from existing IT staff to confront the looming cybersecurity talent shortage.