Risk and compliance strategies and best practices
Enterprise risk and compliance processes are a vital component of successful businesses in the digital age as companies struggle with constantly evolving data threats and regulatory mandates. Read news and tips to assist with risk and compliance strategies, including advice to streamline data governance efforts to help keep business information compliant and secure.
Risk and compliance strategies and best practices News
-
July 16, 2019
16
Jul'19
SEC's iXBRL requirements met with optimism -- and trepidation
Compliance with the SEC's new Inline XBRL requirements will change financial reporting processes. The benefits are there, but not everyone is optimistic about the change.
-
June 28, 2019
28
Jun'19
Law firm CIO says RPA investment delivering 'material benefits'
CIO Vince DiMascio describes how investment in RPA is optimizing legal processes and serving as the glue for integrating business systems at Berry Appelman & Leiden.
-
June 28, 2019
28
Jun'19
Law firm CIO successfully deploys RPA and AI to improve client service
Vince DiMascio, CIO at Berry Appleman & Leiden, details how his team is using natural language processing, machine learning and RPA to help deliver top-notch legal services.
-
May 21, 2019
21
May'19
Surveillance technology under fire, amid growing societal concerns
As San Francisco halts city use of facial recognition technology, CIOs could see more regulatory actions against surveillance technology -- and more limits on their use of data.
Risk and compliance strategies and best practices Get Started
Bring yourself up to speed with our introductory content
-
Sarbanes-Oxley Act
The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies. Continue Reading
-
ICIP IoT training: Get started with IoT risk management
Organizations must assess and prioritize risk management in their IoT investment to ensure their data and information assets are protected without overspending. Continue Reading
-
Risk management vs. risk assessment vs. risk analysis
Understanding risk is the first step to making informed budget and security decisions. Explore the differences between risk management vs. risk assessment vs. risk analysis. Continue Reading
Evaluate Risk and compliance strategies and best practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Trump's dangerous US TikTok ban
President Trump's U.S. TikTok ban over national security is resting on a vague foundation. The concern can be applied to multiple industries and products. Continue Reading
-
Cyberinsurance coverage reflects a changing threat landscape
A constant deluge of data breach disclosures has prompted an increase in cybersecurity insurance coverage adoption. Learn how a policy can enhance an enterprise risk management program. Continue Reading
-
Challenges vs. benefits of edge computing security
Organizations moving more compute to the edges of their networks must adjust how they protect and govern their data and devices. But what should you expect along the way? Continue Reading
Manage Risk and compliance strategies and best practices
Learn to apply best practices and optimize your operations.
-
Key SOC metrics and KPIs: How to define and use them
Enterprises struggle to get the most out of their security operation centers. Using the proper SOC metrics and KPIs can help. Learn how to define and benefit from them here. Continue Reading
-
MSP roles and responsibilities are undergoing rapid change -- here's why
It's a new era for managed service providers and CIOs. MSPs increasingly act as strategic partners, helping IT teams fulfill the outsized role technology plays in business success. Continue Reading
-
How to ensure cybersecurity and business continuity plans align
We're diving into how and why organizations should have a collection of emergency-focused plans in place that can interact with each other if a cybersecurity attack occurs. Continue Reading
Problem Solve Risk and compliance strategies and best practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
How to maintain cybersecurity remotely during the pandemic
In the second 2020 MIT Sloan CIO Digital Learning Series, a panel of IT security leaders discussed how they are keeping their organizations secure in a COVID-19 environment. Continue Reading
-
Tackle ICS IoT security challenges with 6 processes
With more cyberattacks targeting industrial systems with IIoT, vendors, developers and manufacturers must incorporate ICS security processes before, during and after development. Continue Reading
-
Navigate PII data protection and GDPR to meet privacy mandates
Know the commonalities surrounding personally identifiable information to better navigate and comply with the regulations and penalties IT managers must contend with today. Continue Reading