-
Organizational development vital to e-discovery process
Contributor John Weathington explains the importance of organizational culture and structure when developing an e-discovery process.
-
Book excerpt: Network forensic best practices
Sherri Davidoff, co-author of 'Network Forensics: Tracking Hackers through Cyberspace,' discusses how network forensics can assist IT security.
-
Adopting a BYOD policy, one phone at a time
A community reinvestment trust fund CIO sets a prudent BYOD policy, but with an eye to the future.
-
Harsh realities of information security and compliance
Following information security and compliance regulations can hinder your everyday business processes. Here's why you need to strike a proper balance.
-
Free GRC tools you should know about
The compliance transformation process can use expensive, specialized GRC tools. But what about organizations on a budget? Find out what tools to use.
Email Alerts
Product Spotlight
-
Unified Compliance Framework designed to organize GRC
Our latest product spotlight examines the Unified Compliance Framework, an online tool designed to identify and reduce redundant GRC processes.
-
- New MetricStream, RSA tools target regulatory compliance management
- Aruvio unveils new cloud GRC tool
- More Product Spotlights
- Compliance and GRC management tools
-
FAQ
How did Wal-Mart trigger FCPA violations?
Allegations that Wal-Mart bribed Mexican officials to advance business not only gave the retail giant a black eye, but also brought FCPA violation charges.
-
Upcoming Conferences
The can't-miss GRC conferences for IT officers
In the need for some IT training? Check out our list of GRC conferences designed to help your enterprise stay current with the latest compliance regulations and GRC strategy trends.
-
Prepare for the inevitable: Developing a data breach response plan
Are you prepared for the inevitable? Odds are it’s merely a matter of time before your business experiences a computer security-related breach and you need a solid data breach response plan. How are you going to handle the situation? Especially if you’re a smaller business, your IT resources pr...
Powered by ITKnowledgeExchange.com
-
More blog posts
- Planning, foresight needed to address long-term compliance strategy
- Five corporate compliance program traits you need to prevent breaches
- A bit late: Wal-Mart to name new global compliance officer
-
Recommended White Papers
- Mobile Security Imperatives 2012
- Case Study: Fast, reliable Payment Card Industry compliance
- McAfee Deep Defender video
- See All White Papers
-
Featured Dinner Event
SearchCIO360 Dinner Forum
Join us for an evening of networking and dinner where technology leaders share knowledge about managing the demand of today’s IT departments at their companies.
-
On-Demand Sessions
Sessions on Mobile Security Available for a Limited Time
Sessions from our virtual seminar “Mobile Security Imperatives 2012” are now on-demand until August 19.
Gain knowledge on mobile security and BYOD from industry experts.