Provided by True Office Learning2018-07-25T14:30:00
Who’s watching the machines? People. With many organizations using automation and artificial intelligence as their primary options for mitigating risks and protecting their businesses and customers, it’s increasingly important to have a better understanding of the people who are in the driver seat of those machines and controls.
Our white papers are prepared by expert partners and are free to view.
You need to register for this site and agree to the sponsor’s conditions to be granted access.
2025-10-14T20:40:00Z By Neil Hodge
Companies may face significant financial and legal risks if they fail to vet suppliers and third parties over their use of unauthorized AI and how the technology may use and share their corporate data.
2025-10-14T19:44:00Z By Anna Grover, CW guest columnist
Most compliance professionals have faced it: a regulator or client requests a policy, and several slightly different “final” versions appear. The issue often stems from reactive, siloed work without a unified governance framework.
2025-10-09T18:11:00Z By Jaclyn Jaeger
On-again-off-again tariffs, a down economy, and a long list of global supply chain disruptions are challenging U.S. food and beverage companies to adjust their supply chain operations in a variety of ways.
2024-11-06T17:05:00Z Provided by ServiceNow
The individual requirements for your security and risk operations are increasingly complex—and interconnected. Yet despite this increased interconnectivity, many organizations still manage their security operations (SecOps) and integrated risk management (IRM) functions in silos.
2024-08-07T05:54:00Z Provided by Theta Lake
The message from the regulators is clear - having an off-channel policy for mobile communications is not good enough.
2024-05-05T17:30:00Z Provided by ServiceNow and KPMG
To help investors gain a better understanding of cyber risk, the US Securities and Exchange Commission (SEC) has created sweeping new rules—forcing companies to take a more proactive approach to cybersecurity.
Site powered by Webvision Cloud