Compliance Management information, news and tips - SearchCompliance.com
  • Organizational development vital to e-discovery process

    Contributor John Weathington explains the importance of organizational culture and structure when developing an e-discovery process.

  • Book excerpt: Network forensic best practices

    Sherri Davidoff, co-author of 'Network Forensics: Tracking Hackers through Cyberspace,' discusses how network forensics can assist IT security.

  • Adopting a BYOD policy, one phone at a time

    A community reinvestment trust fund CIO sets a prudent BYOD policy, but with an eye to the future.

  • Harsh realities of information security and compliance

    Following information security and compliance regulations can hinder your everyday business processes. Here's why you need to strike a proper balance.

  • Free GRC tools you should know about

    The compliance transformation process can use expensive, specialized GRC tools. But what about organizations on a budget? Find out what tools to use.

Email Alerts

Register now to receive SearchCompliance.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Product Spotlight

  • Unified Compliance Framework designed to organize GRC

    Our latest product spotlight examines the Unified Compliance Framework, an online tool designed to identify and reduce redundant GRC processes.

    • New MetricStream, RSA tools target regulatory compliance management
    • Aruvio unveils new cloud GRC tool
    • More Product Spotlights
    • Compliance and GRC management tools
  • FAQ

    How did Wal-Mart trigger FCPA violations?

    Allegations that Wal-Mart bribed Mexican officials to advance business not only gave the retail giant a black eye, but also brought FCPA violation charges.

  • Upcoming Conferences

    The can't-miss GRC conferences for IT officers

    In the need for some IT training? Check out our list of GRC conferences designed to help your enterprise stay current with the latest compliance regulations and GRC strategy trends.

  • Prepare for the inevitable: Developing a data breach response plan

    Are you prepared for the inevitable? Odds are it’s merely a matter of time before your business experiences a computer security-related breach and you need a solid data breach response plan. How are you going to handle the situation? Especially if you’re a smaller business, your IT resources pr...

    Powered by ITKnowledgeExchange.com

  • More blog posts
    • Planning, foresight needed to address long-term compliance strategy
    • Five corporate compliance program traits you need to prevent breaches
    • A bit late: Wal-Mart to name new global compliance officer
  • Recommended White Papers

    • Mobile Security Imperatives 2012
    • Case Study: Fast, reliable Payment Card Industry compliance
    • McAfee Deep Defender video
    • See All White Papers
  • Featured Dinner Event

    SearchCIO360 Dinner Forum

    Join us for an evening of networking and dinner where technology leaders share knowledge about managing the demand of today’s IT departments at their companies.

  • On-Demand Sessions

    Sessions on Mobile Security Available for a Limited Time

    Sessions from our virtual seminar “Mobile Security Imperatives 2012” are now on-demand until August 19.

    Gain knowledge on mobile security and BYOD from industry experts.

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.