Business continuity management and compliance
New & Notable



Download: Top FAQs regarding the impact of 4 common compliance regulations
IT operations are sometimes unexpectedly affected by major audit regulations – is your IT team prepared? Explore the critical role your IT team plays in ensuring compliance and review the penalties for non-compliance by downloading this FREE e-guide, which covers any questions you might have regarding 4 major legislative regulations.
Business continuity management and compliance News
-
June 11, 2014
11
Jun'14
Does the net neutrality ruling threaten performance and innovation?
Join @ITCompliance June 19 at noon EDT to discuss the FCC's net neutrality ruling and its potential effect on enterprise services, innovation and GRC.
-
May 20, 2014
20
May'14
Twitter chat: How compromised data creates financial loss, insecurity
Data breaches lead to more than consumer dissatisfaction. #GRCChat-ters discuss why they also create financial loss and lack of customer confidence.
-
February 18, 2013
18
Feb'13
Product Spotlight: DR/BC offerings for the enterprise
In this Product Spotlight, learn how new DR/BC offerings from RSA and Continuum could benefit business priorities and compliance managers' strategies.
-
December 14, 2012
14
Dec'12
Thorough preparation necessary to offset cloud security risks
Moving at least some data to the cloud provides numerous benefits, but organizations need to do their homework to alleviate any cloud security risks.
Business continuity management and compliance Get Started
Bring yourself up to speed with our introductory content
-
What is a short business continuity history?
From mainframes to the cloud, the business continuity profession has seen a lot over the decades. How did we get to the business continuity process of today? Continue Reading
-
risk management
Risk management is a company's process for identifying and controlling threats to its assets, including proprietary corporate data, customers' PII and intellectual property. Continue Reading
-
OPSEC (operational security)
OPSEC (operational security) is an analytical process that identifies assets such as sensitive corporate information or trade secrets, and determines the controls required to protect these assets. Continue Reading
Evaluate Business continuity management and compliance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Merge big data governance with data validation to create new revenue
Information governance expert Jeffrey Ritter explains how big data governance and effective data validation can create new streams of revenue for businesses. Continue Reading
-
Data velocity: Why increased transparency saves time and money
Information governance expert Jeffrey Ritter explains how information transparency is proportional to data velocity, and why increased velocity can save businesses time and money. Continue Reading
-
Big data mining: Using information governance to create new wealth
Information governance expert Jeffrey Ritter explains how big data mining can be used by businesses to create new wealth by uncovering readily available, valuable intelligence. Continue Reading
Manage Business continuity management and compliance
Learn to apply best practices and optimize your operations.
-
Create your best GRC program with business continuity and DR
Any governance, risk management and compliance program should work with an organization's business continuity process. There are challenges to consider, though. Continue Reading
-
Nine skills business continuity managers need to succeed
If you're looking to become a business continuity manager, having a range of areas of expertise can improve your standing in the constantly evolving profession. Continue Reading
-
How can standards for business continuity aid compliance?
Working with the right business continuity and disaster recovery standards should get your organization on the path to compliance. Reviewing and updating plans is also important. Continue Reading
Problem Solve Business continuity management and compliance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Can gamification techniques help build cybersecurity skills?
Interactive gamification techniques provide a fun, practical way to train employees and help them improve cybersecurity skills, says Cybrary COO Kathie Miley. Continue Reading
-
Ransomware mitigation strategies include paying up
Ransomware mitigation strategies should be a top business priority as the malware becomes increasingly common. But sometimes, paying up might be the only option. Continue Reading
-
Why is security important? Tweet jammers talk IT protection priorities
Why is security important? Where should companies focus IT protection efforts? Tweet jam participants discussed cybersecurity in our recent #CIOChat. Continue Reading