Risk management and compliance
New & Notable



Download: Top FAQs regarding the impact of 4 common compliance regulations
IT operations are sometimes unexpectedly affected by major audit regulations – is your IT team prepared? Explore the critical role your IT team plays in ensuring compliance and review the penalties for non-compliance by downloading this FREE e-guide, which covers any questions you might have regarding 4 major legislative regulations.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Risk management and compliance News
-
January 31, 2018
31
Jan'18
Alphabet unveils cybersecurity company, Chronicle
There is a new moonshot in cybersecurity, and Google's parent company is calling it Chronicle. Alphabet's cybersecurity business unit launched last week and plans on selling cybersecurity services ...
-
December 15, 2017
15
Dec'17
Cybersecurity professionals struggle to make their job a priority
Despite recent high profile data security incidents, it seems business leaders still are not acknowledging their IT vulnerabilities: In a recent cybersecurity study, 20% of survey respondents cited ...
-
November 30, 2017
30
Nov'17
Cybersecurity insurance only a piece of data protection strategy
Cybersecurity incidents remain a growing risk for the enterprise in today's digital world. As a result, an organization's cybersecurity strategy usually isn't just about prevention anymore, but ...
-
November 16, 2017
16
Nov'17
Push for public, private sector cybersecurity cooperation continues
Efforts to establish public and private sector cybersecurity cooperation have stalled in recent years, but high-profile incidents could be turning the tide.
Risk management and compliance Get Started
Bring yourself up to speed with our introductory content
-
How can the CISO become a business enabler?
For a cybersecurity program to be effective, CISOs must be viewed as business enablers. Kudelski Security's John Hellickson offers tips on how CISOs can make the transformation. Continue Reading
-
risk map (risk heat map)
A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A risk map helps companies identify and prioritize the risks associated with their business. Continue Reading
-
internal audit (IA)
An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine how well it conforms to a set of specific criteria. Continue Reading
Evaluate Risk management and compliance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Cybersecurity trend forecast: Streamlined, simplified security
In this SearchCIO Q&A, Javvad Malik discusses why streamlining infosec processes is becoming a top cybersecurity trend and how new tech influences the infosec industry. Continue Reading
-
Tech, growing data sets complicate enterprise cybersecurity strategy
Emerging tech has grown companies' data sets and made IT environments increasingly complex. As IT capabilities evolve, enterprise cybersecurity strategy is struggling to keep up. Continue Reading
-
Cybersecurity professionals: Lack of training leaves skills behind
Cybersecurity professionals' increased workloads leave little time for training, leaving their skill sets -- and their companies' data security -- vulnerable to outside threats. Continue Reading
Manage Risk management and compliance
Learn to apply best practices and optimize your operations.
-
Cybersecurity's shortage of skills leaves IT projects vulnerable
A recent study found that as IT projects proliferate, cybersecurity's shortage of skills is leaving tech vulnerable. Analyst and study author Jon Oltsik explains in this Q&A. Continue Reading
-
How to prep for the GDPR breach notification rule
As companies prep for GDPR compliance, its breach notification rule is making waves. Csaba Krasznay, security evangelist at Balabit, discusses how to prep for Article 33 of GDPR. Continue Reading
-
Metrics vital to insider threat prevention and mitigation
Insider threat prevention has become inherent to cybersecurity strategy, but companies must use the right metrics to determine whether their efforts are working. Continue Reading
Problem Solve Risk management and compliance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Cybersecurity skills gap: Get creative about cyber hiring
Hiring candidates from disciplines beyond infosec can go a long way to address the widening cybersecurity skills gap, says industry veteran Javvad Malik. Continue Reading
-
Tech vs. training: Where should business focus cybersecurity spending?
As information security budgets grow, cybersecurity spending needs to be focused on employee-centric areas like training to be effective. ISSA's Candy Alexander explains why. Continue Reading
-
RM principles should guide compliance management system development
Regulatory agencies offer broad guidance for compliance management system development, but companies may be best served by referring to widely accepted risk management principles. Continue Reading