New & Notable
Managing compliance operations News
August 08, 2019
Odaseva's Full Sandbox Anonymization app ensures GDPR and CCPA compliance for Salesforce users by masking personal data in testing and training environments.
July 22, 2019
Under the settlement with the FTC and state attorneys general, Equifax will fork over at least $575 million in civil penalties and provide credit monitoring services to consumers.
July 16, 2019
Compliance with the SEC's new Inline XBRL requirements will change financial reporting processes. The benefits are there, but not everyone is optimistic about the change.
March 25, 2019
FEMA's data exposure is another high-profile example of accidental data disclosures -- a trend that has some security experts calling for more focus on failed security controls.
Managing compliance operations Get Started
Bring yourself up to speed with our introductory content
Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (MSP) will help an organization meet its regulatory compliance mandates. Continue Reading
The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government. Continue Reading
A holistic approach to cybersecurity can provide continuous monitoring -- or create holes a hacker can breach. What makes the difference? It comes down to implementation. Continue Reading
Evaluate Managing compliance operations Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Attorney and IT security expert Scott Giordano discusses how the growing number of state data privacy laws are changing CISOs' information management role. Continue Reading
Tufin Technical Director Joe Schreiber highlights how automating security operations can benefit an organization and discusses best practices for effective implementation. Continue Reading
Each layer of the Open Systems Interconnection presents unique vulnerabilities that could move to other layers if not properly monitored. Here's how to establish risk mitigation strategies for OSI layer security in Layers 4 through 7. Continue Reading
Manage Managing compliance operations
Learn to apply best practices and optimize your operations.
Most organizations have compliance policies for PCs and laptops, but oftentimes they neglect or don't pay enough attention to compliance on mobile devices. Continue Reading
Our step-by-step business continuity plan for small businesses enables an organization to restore mission-critical operations during an unforeseen event. Continue Reading
Daniel Allen explains how a lack of U.S. cryptocurrency regulation increases exploitation vulnerabilities, and shares his ideas for implementing regulatory oversight. Continue Reading
Problem Solve Managing compliance operations Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
All organizations need to meet a variety of regulatory compliance requirements, but they don't all have the budget for GRC software. Learn about the free, open source options. Continue Reading
A customer's deletion request continues to be a sticking point regarding backup and GDPR compliance. Learn guidance about this issue and others, following GDPR's first birthday. Continue Reading
In this Ask the Expert, IT governance expert Jeffrey Ritter discusses his formula to successfully align new technology with ITSM compliance standards -- all while minimizing risk. Continue Reading