Manage
Learn to apply best practices and optimize your operations.
Data retention and compliance software
SEC's iXBRL requirements met with optimism -- and trepidation
Compliance with the SEC's new Inline XBRL requirements will change financial reporting processes. The benefits are there, but not everyone is optimistic about the change. Continue Reading
4 steps to remain compliant with SOX data retention policies
Data retention policy is inherent to Sarbanes-Oxley Act compliance. In this tip, learn SOX data retention best practices to remain regulatory compliant. Continue Reading
Governance needs shift as digital evidence in court becomes common
Digital, computer-generated records have been used as evidence in recent court cases, and the trend could cause major changes for corporate data governance. Continue Reading
-
For reliable digital evidence, information governance strategy required
Computers are increasingly called as witnesses in court cases, forcing companies to ensure information governance processes are able to produce reliable digital evidence. Continue Reading
Key management and distribution vital to encryption system
In part four of this webcast, Securosis founder Rich Mogull examines the various key management and distribution options for effective cloud encryption. Continue Reading
The business case for cloud-based governance and e-discovery services
There are many questions to consider when moving data management to the cloud, including the cost implications of cloud-based e-discovery services.Continue Reading
Privacy laws create obstacles for e-discovery in the cloud
Information governance expert Jeffrey Ritter discusses how privacy laws create barriers to cloud-based e-discovery, and strategies to manage these complications.Continue Reading
Technology tools, policies for a corporate compliance program
At many organizations, departments operate in silos, with a lack of communication leading to redundant or inefficient processes. But business leaders are increasingly looking to link disparate departments from an information governance, risk ...Continue Reading
The modern myths of information governance training, storage costs
In the second part of this Q&A, Jeffrey Ritter concludes his discussion on data management myths by explaining common misconceptions about storage costs and information governance training.Continue Reading
Twitter chat: Develop a risk profile for better breach prevention
In this #GRCchat recap, a former Federal Communications Commission CIO discusses how a quantitative risk profile can mitigate financial risk.Continue Reading
-
Digital information age informs GRC management
In this #GRCchat recap, participants discuss how governance challenges in the digital information age influence companies' GRC management strategy.Continue Reading
Revamp your information lifecycle management strategy for endless data
More data, more problems? #GRCchat participants discuss new governance challenges and how to revamp an information lifecycle management strategy.Continue Reading
Cloud computing issues and challenges: The GRC factor
In our latest #GRCchat, tweet jammers discussed cloud computing issues and challenges and explained how governance, risk and compliance factor in.Continue Reading
Device management: Enabling hardware-rooted mobile data security
Many mobile devices lack built-in, secure hardware roots of trust. Here are steps IT can take to enable this hardware-rooted mobile data security.Continue Reading
Human- vs. machine-generated data: A cautionary tale
In this ISSA video interview, security architect Evan Davison warns about some snags when analyzing both human- and machine-generated compliance data.Continue Reading