Governance, Risk, Compliance (GRC) Research
-
How to Keep up with Governance, Risk, and Compliance in the face of Faster App Development
Sponsored by: TechTarget App ArchitectureThis handbook explores how to implement holistic governance, risk, and compliance (GRC) for SOA and microservices by leveraging ALM, APIs, and Web Services Security. Learn more about microservices and how they're changing the world of app security.
-
Cybersecurity skills shortage demands new workforce strategies
Sponsored by: IBMThe race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles. This e-guide discusses organizations' want for better qualified candidates and reveals what skills exactly most security professionals are currently lacking.
-
Office 365: Cloud Data Security Considerations to Explore Before Adopting
Sponsored by: ProofpointIT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
-
Third-Party Risk Management: Evaluating and Contracting with Vendors
Sponsored by: BitSightThis expert e-guide describes how to use standardized documentation for third-party risk assessment in order to minimize risk before deciding on a vendor. Access this resource now for advice on the security-related clauses that financial institutions need to include in their vendor contracts in order to comply with regulatory requirements.
-
Yield Insight into Your Business Info with Data-Aware Storage
Sponsored by: DataGravityThis expert guide discusses advanced "data-aware" storage infrastructure with big data processing capabilities and efficient metadata management. Learn how this infrastructure can provide your enterprise with intelligent, fast, and highly efficient data services that enables greater insight into your stored data.
-
Compliance Standards for Data Governance
Sponsored by: SmarshThis e-guide teaches you about data governance and how to best comply with data quality assurance policies put in place by industry consortia. Learn about the framework for ensuring the fidelity of data used in business processes.
-
How to Tackle Hybrid Cloud Challenges and Construct a Solid Governance Strategy
Sponsored by: PresidioThis e-guide highlights expert tips on tackling hybrid cloud challenges surrounding security and compliance, account management and billing, and resource provisioning. Read on to learn how your enterprise can take advantage of public cloud by implementing a reliable, compliant hybrid cloud strategy.
-
Top 3 Cloud Security Developments
Sponsored by: TechTarget SecurityThis Insider Edition supplement to Information Security magazine covers three cloud safety issues in the enterprise: cloud containers; cloud compliance; and shadow cloud.
-
Effective Data Discovery Points Way to Bigger BI Benefits
Sponsored by: TechTarget Business AnalyticsHow can you reach a middle ground between control for business users and centralized management from IT and BI managers? Discover why self-service software doesn't have to sideline IT or BI teams.
-
Data Governance Strategies for the Digital Age
Sponsored by: TechTarget SecurityThe digital age has forced many companies to alter - and sometimes completely revamp - data governance processes. In this handbook, learn about big data governance complications and the latest information management strategies for adapting to increased storage needs, data-specific compliance mandates and security vulnerabilities in the digital age.
-
Four steps to ensure IT investments benefit regulatory compliance
Sponsored by: Hewlett Packard EnterpriseIn this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
-
Security for a Faster World
Sponsored by: Hewlett Packard EnterpriseThis eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
-
Managed file transfer: Minimizing risk and strengthening compliance in data exchange
Sponsored by: IBMIn this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
-
How to Create the Most Effective Compliance Program at Your Organization
Sponsored by: IntraLinks, IncIn this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
-
Information Visibility: Reducing Business Risk with The Clearswift Aneesya Platform
Sponsored by: ClearswiftIn this white paper, discover an information governance platform that offers real-time insight to improve threat detection and enhance governance and compliance reporting.
-
Maintaining Continuous Compliance: A New Best-Practice Approach
Sponsored by: IBMThis resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
-
Preventing Dangerous File-Sharing
Sponsored by: GlobalscapeThis resource offers 4 steps to help prevent employees from using unsecured consumer-grade file-sharing solutions.
-
Expert Outlook on Cloud GRC
Sponsored by: TechTarget SecurityCloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.
-
Sharing Sensitive Corporate Documents without Compromising Security and Governance
Sponsored by: IntraLinks, IncThis informative resource discusses how your organization can utilize an IP security system built on a strong inter-enterprise document-sharing foundation to share sensitive documents without compromising security and governance.
-
E-Discovery Cross-Border Data Compliance
Sponsored by: ExterroThis white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
-
Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
Sponsored by: IBMAccess this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
-
Decoding Predictive Technologies in E-Discovery
Sponsored by: ExterroThis informative guide addresses common questions legal teams have about predictive technologies, and showcases how real-world users are taking advantage of these new capabilities.
-
Executive Guide to SYSPRO Security for Auditing Assurance and Control
Sponsored by: SysproThis white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
-
Breaking Through the GRC Value Ceiling
Sponsored by: EMC CorporationThis paper uses the RSA Archer GRC Reference Architecture to illustrate the value of operational technologies while acknowledging there is a ―Value Ceiling‖ for some niche operational tools, highlighting the missed opportunity for broader value.
-
Clearswift Government Communications 2.0
Sponsored by: ClearswiftIn this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.