complaince
Feb. 22 2016
According to Gemalto, a leader in digital security, more than one billion data records were breached in 2014, and 60 Minutes correspondent Bill Whitaker went so far as to deem 2014 “the year of the... View More
rules
Feb. 2 2016
On April 29, 2015, Chief Justice John Roberts sent Congress a package amending 11 rules to the Federal Rules of Civil Procedure (FRCP)—rules that dictate trial procedures in federal district courts... View More
art
Dec. 14 2015
As I mentioned last time, the increasingly complex and evolving regulatory landscape is pressuring chief executive officers (CEOs) to increase the scrutiny on their own compliance and risk management strategies.... View More
Nov. 16 2015
Novitex, the leading provider of cloud-based solutions in the document outsourcing industry, today announced the next generation of Healthcare Connect, a communications management solution that combines... View More
ExecTop
Oct. 12 2015
Cybersecurity is top of mind, from the boardroom and C-suite to information technology (IT), legal, finance and more, but does that translate to effective policies and actions?... View More
VendorRisk_small
Sept. 14 2015
The results of Protiviti’s 2015 “Vendor Risk Management Benchmark Study,” conducted in partnership with the Shared Assessments Program, can be viewed as cause for optimism—or concern,... View More
Aug. 13 2015
Zapproved, a pioneer in developing cloud-hosted software for corporate legal departments, today published the Legal Hold and Data Preservation Benchmark Survey 2015, the latest edition of the industry’s... View More
BYOD_2015_small
Aug. 10 2015
For information technology (IT) security managers, bring your own device (BYOD) is a four-letter acronym guaranteed to strike fear into their hearts by conjuring up visions of a data proliferation... View More
buildinfo_V2_SMALL
July 15 2015
Many of the comments I hear from executives regarding information governance planning include: "We don’t want to boil the ocean." "There are too many conflicting definitions." "No one follows it
ROI_small
July 7 2015
Everyone is talking about information governance (IG) and how it can be used to manage the rapid pace of electronic information growth. IG is defined by Gartner as, “The specification of decision
July 6 2015
Videk, Inc. a leading provider of document integrity assurance systems has signed a significant distribution and sales agreement with Canon Japan, it was announced today. Videk will develop an integrated... View More
Platformchoice_small
June 25 2015
Governance, risk and compliance (GRC) technology that integrates multi-stakeholder requirements on a single platform is often held out as the holy grail of GRC—especially by GRC vendors. Nevertheless,... View More
businessrisk_small
April 1 2015
Most organizations are critically dependent on technology to operate in the modern world. For these organizations, technology risk management often becomes a one-dimensional exercise: an obsession with... View More
steps_2015_small
March 5 2015
What is top of mind for senior executives and directors this year? Regulatory changes and heightened regulatory scrutiny, succession challenges, economic conditions and cyber threats, according to the... View More
risk_2015_small
Feb. 11 2015
Protiviti partnered with North Carolina State University’s Enterprise Risk Management Initiative to conduct our third annual "Executive Perspectives on Top Risks" survey and obtained the views of... View More
looking2015_small
Jan. 27 2015
Cybercrime targeting of commercial enterprises and organizations is rampant. Increasingly sophisticated, organized crime groups are gaining improper access to point-of-sale systems and corporate networks... View More
hacker_small
Jan. 13 2015
What do JPMorgan Chase, Home Depot, Target, Adobe, TJX and Sony all have in common? They have all been hacked and have given up tens of thousands or millions of records containing credit/debit cards, email... View More
shadow_small
Oct. 30 2014
Here we are in October already, a month known for tricks, treats and scary things lurking about waiting to frighten you. While it is a time for fun and social interactions, it is not a time you want to... View More
lost_small
Oct. 29 2014
Thinking about mobile security keeps me up at night. It probably keeps you up too. On a recent evening, I was browsing the findings of a study by McAfee and Ponemon Institute titled “The Lost Smartphone... View More
Oct. 29 2014
kloudtrack®and Formtree today announced a collaborative effort to integrate Formtree mobile data collection solutions with kloudtrack cloud-based data management and workflow systems. The integrated... View More
 

SPONSOR