Featured content
The Governance, Risk, And Compliance Playbook For 2021
Take On More Business Risk Using A World-Class GRC Program
Governance, risk, and compliance (GRC) programs give organizations the confidence to take the business risks that drive innovation and competitive advantage. Yet too many organizations lack...
Search Results
-
Report Predictions 2019: Cybersecurity
The US-China Trade War Will Revive Corporate Espionage Attacks Around The World
The race to improve customer engagement compels companies to collect volumes of personal data, and this puts enormous pressure on security teams to protect customers from fraud, privacy abuses, and...
-
Report Predictions 2018: Cybersecurity
In 2018, consumers and businesses will face challenges brought on by four primary forces: 1) rising tensions in international relations; 2) ubiquitous connectivity; 3) digital transformation...
-
Webinar Develop Your Customer-Facing Breach Notification And Response Strategy
October 13, 2015 | Heidi SheyIf you wait until after a breach event to figure out how to communicate with and notify your customers, you're doing it wrong. A botched customer-facing response to a breach fails to inspire...
-
Report Predictions 2015: Data Security And Privacy Are Competitive Differentiators
Governments, Criminals, Tech Giants, Customers, And Enterprises Spar Over Protections And Rights
Love him or hate him, Edward Snowden's revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the...
-
Report Brief: FTC Vs. Wyndham Ruling Further Solidifies The FTC's Role In US Data Security
Firms Find Themselves In The FTC's Crosshairs By Violating Basic Security Principles
Security and risk (S&R) professionals: If the US Federal Trade Commission (FTC) was not on your radar before, it should be now. Protecting consumers and consumer privacy is one of several mandates...
-
Report Simplify Cybersecurity With PCI
Policy And Procedures US Government Spotlight: The Security Architecture And Operations Playbook
October 11, 2012 | Heidi Shey, John KindervagUS federal law, specifically the Federal Information Security Management Act (FISMA), requires US federal government agencies to adhere to National Institute of Standards and Technology (NIST)...
Content Type
ApplyFilters
Topics
- Regulations & Legislation (2)
- Fraud Management (1)
- Risk Management (1)
Methodology
- Predictions (2)
Region
- North America (2)