Provided by IdentityMind2018-01-05T11:15:00
Read this white paper to learn more about why it is crucial to develop digital identities which look at more than static data, and how introducing digital attributes such as online behavior and transactional history creates a much more robust system where trusted identities and suspicious identities evolve differently, making ...
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2026-04-06T18:40:00Z By Ruth Prickett
AI and sustainability reporting are rapidly developing themes globally. Both are escalating in importance and complexity. How can one support the other, and how do you keep up with the compliance requirements of both – while ensuring you do not fall victim to AI mistakes?
2026-04-06T18:07:00Z By Gustavo Aguiar, CW guest columnist
Global corporate compliance has reached an inflection point. For years, multinational corporations have based their Third-Party Risk Management programs in Latin America on standardized questionnaires and certificates issued by local governments.
2026-04-02T19:12:00Z By Neil Hodge
The European Union’s key data privacy regulators have said that they support streamlining compliance and reporting requirements under plans to beef up cybersecurity across the 27-nation bloc.
2026-03-30T20:57:00Z Provided by ECI
The Journey of Giving Voice to Values: A Roadmap for Organizations white paper is a practical guide for ethics and compliance leaders looking to strengthen speak-up culture and support values-based decision-making in the workplace.
2025-11-11T19:24:00Z Provided by Sayari
This report quantifies, analyzes, and visualizes the impact of typological regulations on compliance so that teams can more efficiently and effectively protect against non-obvious sources of regulatory risk.
2024-11-06T17:05:00Z Provided by ServiceNow
The individual requirements for your security and risk operations are increasingly complex—and interconnected. Yet despite this increased interconnectivity, many organizations still manage their security operations (SecOps) and integrated risk management (IRM) functions in silos.
Site powered by Webvision Cloud