Security, Risk and Compliance

Security, risk, and compliance combines the disciplines of governance and oversight for managing risk, while optimizing security processes and technologies for your organization's future flexibility.

Refine your results

Role

Methodology

Analyst

Topics

Region

5 results in Reports

  • Security, Risk and Compliance
  • Past 7 days
  • For CIO Professionals

    Report:Top Technologies For Your BT Agenda

    Tools And Technology: The Business Technology Agenda Playbook

    In today's competitive environment, investing in business technologies is central to companies' ability to win, serve, and retain customers. Business execs know this, but they don't think that their...

    • Downloads: 13
  • For Customer Insights Professionals

    Report:Evolving Consumer Attitudes On Privacy

    A Technographics® 360 Report: Using Survey, Qualitative, And Social Listening Data

    The tide of privacy is turning. For the past decade, brands have become increasingly dependent on the collection, analysis, and use of consumer data. With many consumer services now subsidized by...

    • Downloads: 50
  • For Security & Risk Professionals

    Report:Targeted-Attack Hierarchy Of Needs, Part 2

    Multiple Technologies Are Required For Breach Detection

    In part 1 of our research series, we detailed the foundational requirements for building the necessary resiliency to targeted cyberattacks. With the foundational requirements in place, security and...

    • Downloads: 94
  • For Security & Risk Professionals

    Report:What You Need To Know About The FIDO Alliance And Its Impact On User Authentication

    This Heavyweight Standards Body Is In A Race Against Time And Market Innovation For Enterprise Success

    The model for user authentication most online services have relied on heavily for decades — passwords, often with security questions for account recovery — is breaking down. Now a new...

    • Downloads: 71
  • For Security & Risk Professionals

    Report:Executive Spotlight: The CISO's Guide To Understanding The Chief Privacy Officer

    Join Forces To Enable The Business And Uphold Customer Privacy

    Chief privacy officers (CPOs), data protection officers (DPOs), privacy analysts, and other designated privacy professionals are a growing presence within the enterprise today as organizations seek...

    • Downloads: 60