Features
Features
Managing compliance operations
-
SEC's Regulation SCI: A visual timeline
The SEC adopted Regulation SCI to bolster the technological infrastructure of the U.S. securities market. Take a look at the milestones in the history of Reg SCI, including when it was first proposed, the tech failures that inspired it and more. Continue Reading
-
Data governance due diligence key to GRC automation success
Information governance expert Jeffrey Ritter discusses how companies can successfully align GRC automation with existing data governance processes. Continue Reading
-
New tactics for improving critical infrastructure cybersecurity pushed by MIT consortium
The MIT Sloan School of Management has launched a consortium that touts interdisciplinary research and cooperation as keys to improving cybersecurity. Continue Reading
-
Fresh look at governance required to maximize information as an asset
IGI founder Barclay T. Blair discusses lacking efforts to make information a business asset, and the initial steps required to maximize data value. Continue Reading
-
New risk management needs challenge information governance processes
Risk management requirements have complicated information governance, but with the right strategy the two disciplines could be mutually beneficial. Continue Reading
-
Why your mobile device management policy must include wearables
Wearable technology has started to creep into the business world, but companies must overcome the data governance complications to reap any benefits. Continue Reading
-
RIM likely to lead strategy as privacy compliance becomes a priority
Records and information management professionals should expect to play a big role as businesses increasingly make privacy compliance a priority. Continue Reading
-
Governance and analytics reduce big data risk, boost information value
In this Q&A, ARMA 2014 Conference presenter Barclay T. Blair discusses how information governance strategies can help with big data risk management. Continue Reading
-
ISSA International Conference to explore security pros' expanding roles
ISSA International Chair Stefano Zanero discusses how expanding threats force security pros to take a more proactive approach to data protection. Continue Reading
-
Study reveals legal obstacles created by data protection laws
A new study has that found data protection laws and state secrecy rules have created legal obstacles for businesses conducting operations in Asia. Continue Reading
-
Privacy laws create obstacles for e-discovery in the cloud
Information governance expert Jeffrey Ritter discusses how privacy laws create barriers to cloud-based e-discovery, and strategies to manage these complications. Continue Reading
-
The modern myths of information governance training, storage costs
In the second part of this Q&A, Jeffrey Ritter concludes his discussion on data management myths by explaining common misconceptions about storage costs and information governance training. Continue Reading
-
Q&A: Common myths of modern data management processes debunked
In this two-part Q&A, Jeffrey Ritter identifies five common, persistent 21st century information governance myths and explains why adapting data management processes to the digital age is not as radical as some think. Continue Reading
-
Can automated segregation of duties benefit regulatory compliance?
In this feature, Michael Rasmussen explains why automated SoD reduces compliance costs as well as the potential for fraud and lawsuits. Continue Reading
-
GRC programs on the rise with data management complexity tides
Organizations have turned to GRC programs to avoid regulatory issues and keep data secure. But can these programs also benefit the bottom line? Continue Reading