Close

Are you in compliance?

Don't miss out! Sign up today for our weekly newsletters and stay abreast of important GRC-related information and news.

×

Status message

Start your free, no obligation 5-day trial to continue exploring with full access.

Applying the Three Lines to Cyber-Security

Jose Tabuena | April 28, 2015

New and innovative practices of exchanging data at ever-increasing speeds are resulting in the collection of personal information that may expose companies to novel types of risk. Information from customers and employees that businesses took for granted just a few years ago is collectively becoming the foundation for consumer privacy complaints, data breaches, and penalties from government agencies.

In other words, more data means more privacy concerns and the potential for a major data breach.

The challenge is for organizations to overcome the different sources for security breaches and to install the right...

Read this single article for $49, or click the subscribe button below to review subscription options.

Enjoy unlimited access to thousands of articles, browse five years of digital magazines, qualify for reduced admission to events, and more.