SearchCompliance spacer spacer
spacer

Managing compliance operations

New & Notable

  • spacer

    The steps to effective cybersecurity incident response

  • spacer

    Reduce information security costs with smart strategy, personnel

Managing compliance

RELATED TOPICS

  • Automating compliance
  • BC
  • Business records management
  • Enterprise cloud compliance
  • Information technology governance
  • Compliance teams

Looking for something else?

  • New York proposes banking rules to block terrorism funding
  • Privacy vs. public safety remains central to encryption debate
  • Beyond BYOD: How new tech is driving digital information governance
+ Show More

Managing compliance operations News

  • December 29, 2015 29 Dec'15

    Top 2015 compliance stories: Data challenges and security issues

    We've rounded up the top 10 governance, risk and compliance stories of the year, with timely advice about GRC strategy, 2015 compliance challenges and best practices for overcoming data security issues.

  • December 09, 2015 09 Dec'15

    New York proposes banking rules to block terrorism funding

    The governor of New York has introduced new state banking rules designed to curb money laundering and block terrorism funding. Also in recent GRC news: Most healthcare organizations lack ...

  • December 03, 2015 03 Dec'15

    As threats to data spread, security info sharing debate heats up

    New laws encourage cybersecurity information sharing between the public and private sector, but will the data protection measures infringe on privacy?

  • December 02, 2015 02 Dec'15

    IT compliance management skills remain in high demand

    As organizations' data threats and regulatory demands increase, GRC professionals are seeing their skill sets become highly prized across industries.

View All News

Managing compliance operations Get Started

Bring yourself up to speed with our introductory content

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's administrators and employees. Continue Reading

  • What happens if you ignore information security compliance?

    If an enterprise decides to ignore its information security compliance obligations, what happens? Expert Mike Chapple explains what willful noncompliance means. Continue Reading

  • Data protection requirements start with firm grasp of GRC needs

    Corporate data protection requirements are complex, but determining a company's unique GRC needs is an essential first step to information security. Continue Reading

View All Get Started

Evaluate Managing compliance operations Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Reduce information security costs with smart strategy, personnel

    Facing online threats can be expensive, but embedding data protection into corporate strategy and training can help reduce information security costs. Continue Reading

  • GDPR: How will the EU data protection law impact U.S. industry?

    Three years in the making, European Union officials finally agreed on a draft of the General Data Protection Regulation. The EU-wide legal framework sets standards for data collection, sharing and ... Continue Reading

  • Information governance 2015: The year of digital evidence as truth

    Businesses saw major shifts to their information governance 2015 processes as legal and compliance rules more heavily relied on digital evidence as truth. Continue Reading

View All Evaluate

Manage Managing compliance operations

Learn to apply best practices and optimize your operations.

  • The steps to effective cybersecurity incident response

    Planning and foresight are essential to any cybersecurity incident response plan. Follow these steps to make sure you're ready for a data breach. Continue Reading

  • Training, legal input key to information security and privacy balance

    Businesses often struggle with balancing security and privacy, but building PII management mandates into data protection efforts is a good place to start. Continue Reading

  • Cybersecurity and privacy compliance: The delicate balance

    As information has transformed into a huge business asset for modern companies, it has come at a price: Data is now a target for hackers seeking sensitive information about enterprises and their customers. This new online data security focus has ... Continue Reading

View All Manage

Problem Solve Managing compliance operations Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • 'Going dark': Weighing the public safety costs of end-to-end encryption

    'Going dark' -- or the FBI's inability to access data because of encryption -- could put public safety at risk, intelligence officials say. But tech companies argue that strong encryption is needed to protect corporate and customer data. Continue Reading

  • Cloud risk management: Governance strategies to protect digital assets

    As the digital age continues to strain information governance budgets, many companies have turned to the cloud to reduce data storage costs: Market analyst firm IDC predicts spending on public cloud services will exceed $127 billion in 2018, ... Continue Reading

  • Mobile data security creates big governance challenges

    As devices are used for increasingly complex processes, data becomes more vulnerable to loss. To keep pace, IT and security executives are developing comprehensive mobile data security plans and implementing stronger technology solutions. Continue Reading

View All Problem Solve

-ADS BY GOOGLE

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.