Security, Risk and Compliance

Security, risk, and compliance combines the disciplines of governance and oversight for managing risk, while optimizing security processes and technologies for your organization's future flexibility.

Refine your results

Role

Analyst

Topics

Region

5 results in Reports

  • Security, Risk and Compliance
  • Past 7 days
  • For Security & Risk Professionals

    Report:Evolve To Become The 2018 CISO Or Face Extinction

    Vision: The Security & Risk Practice Playbook

    As the role of technology leadership in the enterprise becomes more about managing third parties, battling complexity, controlling costs, supporting the business technology (BT) agenda, and aligning...

    • Downloads: 396
  • For CIO Professionals

    Report:Customer Privacy Is A European CIO Priority

    Companies Across Europe Will Differentiate On The Way They Handle Privacy Issues

    The ruling by the European Court of Justice in May 2014 that an individual can demand that "irrelevant or outdated" information is deleted from search results should remind chief information officers...

    • Downloads: 32
  • For Customer Insights Professionals

    Report:Safeguard Your Social Intelligence Strategy

    Managing Privacy, Risk, And Compliance Challenges When Listening To And Leveraging Social Data

    The more granular you get when collecting and analyzing social data, the more value you can extract with meaningful customer segmentation, affinity mapping, and other valuable customer insights. The...

    • Downloads: 40
  • For Security & Risk Professionals

    Report:Evolve Your Identity Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook

    The rapid adoption of mobile devices and cloud services, together with a multitude of new partnerships and customer-facing applications, has "extended" the identity boundary of today's digital...

    • Downloads: 767
  • For Security & Risk Professionals

    Report:Use Actionable Threat Intelligence To Protect Your Digital Business

    Threat Intel Must Have Business Alignment, Relevance, And Integration To Be Effective

    Threat intelligence is one of the most over-hyped capabilities within information security today. Ask five different security vendors what actionable threat intelligence means and you will...

    • Downloads: 77