Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
Data governance for legal and regulatory compliance
Digitization is forcing companies to make big changes to information governance processes to ensure data maintains legal and regulatory compliance. Continue Reading
Compliance culture: FINRA shifts regulatory focus
Finance industry regulators have shifted gears in 2016, moving away from checkbox-style regulations and focusing on companies' compliance culture. Continue Reading
Managing cybersecurity and supply chain risks: The board's role
Cybersecurity and supply chain risks are drawing more attention from senior management and board members, but many companies fall short with accountability. Continue Reading
-
Book excerpt: Achieving digital trust in the information age
In this book excerpt, Jeffrey Ritter explains the essential attributes of digital trust and why it's so important to business success in the information age. Continue Reading
Information security monitoring, analytics for the digital age
In this webcast, learn automated information security monitoring and analytic techniques to protect data in the face of rapidly evolving cyberthreats. Continue Reading
FTC: Analyzing big data creates discrimination risk
Big data analytics provides several business benefits but could also discriminate against certain individuals and violate consumer data protection rules.Continue Reading
Negligence, accidents put insider threat protection at risk
Malicious employees are usually the focus of insider threat protection efforts, but accidents and negligence are often overlooked data security threats.Continue Reading
End-user security awareness first line of data protection defense
As data threats continue to proliferate in scope and number, end-user security awareness is essential to corporate information protection.Continue Reading
Making the business case for cybersecurity spending
Cybersecurity has become essential to protect data assets, but it is also helping businesses ensure corporate information is accurate and reliable.Continue Reading
New data classifications vital to information governance and security
Businesses have invested heavily in information governance and security, and embracing three new data classifications could prove beneficial in 2016.Continue Reading
-
The steps to effective cybersecurity incident response
Planning and foresight are essential to any cybersecurity incident response plan. Follow these steps to make sure you're ready for a data breach.Continue Reading
Data protection and security incident response when all information is a target
Data breaches have become increasingly commonplace for businesses, and every company that has an online presence is a potential target for hackers: High-profile hacks of Target Corp. and Anthem Inc., to name a few, show how valuable personal data ...Continue Reading
Information governance 2015: The year of digital evidence as truth
Businesses saw major shifts to their information governance 2015 processes as legal and compliance rules more heavily relied on digital evidence as truth.Continue Reading
Training, legal input key to information security and privacy balance
Businesses often struggle with balancing security and privacy, but building PII management mandates into data protection efforts is a good place to start.Continue Reading
Data protection requirements start with firm grasp of GRC needs
Corporate data protection requirements are complex, but determining a company's unique GRC needs is an essential first step to information security.Continue Reading