Provided by
erwin2020-10-14T07:50:00
Without the ability to harvest metadata schemas and business terms; analyze data attributes and connections; impose structure on definitions; and view all data in one place according to each user’s role within the enterprise, businesses will be hard pressed to stay in step with governance standards and best practices around security and privacy.
Find out how to connect the dots across the data trinity – governance, security and privacy.
Our white papers are prepared by our sponsors and are free to view.
You need to register for this site and agree to the sponsor’s conditions to be granted access.
2026-02-02T12:32:00Z By Ashwathama Rajendran CW guest columnist
Generative AI (GenAI) has moved rapidly from experimentation into day-to-day use across many organizations. Over the past year, teams have shifted from exploratory pilots to relying on these tools for core activities such as contract analysis, research, and software development.
2026-01-30T18:33:00Z By Shruti Mukherjee CW guest columnist
Over recent years, cybersecurity executives have been tasked with an almost impossible Challenge: reduce headcount, accelerate transformation, integrate artificial intelligence, meet regulatory obligations, and still maintain resilience.
2026-01-24T00:09:00Z By Adrianne Appel
More than 83 percent of respondents to a new Compliance Week and konaAI survey report using artificial intelligence (AI) but only about 25 percent say their organizations have implemented a strong governance framework.
2025-11-11T19:24:00Z Provided by Sayari
This report quantifies, analyzes, and visualizes the impact of typological regulations on compliance so that teams can more efficiently and effectively protect against non-obvious sources of regulatory risk.
2024-11-06T17:05:00Z Provided by ServiceNow
The individual requirements for your security and risk operations are increasingly complex—and interconnected. Yet despite this increased interconnectivity, many organizations still manage their security operations (SecOps) and integrated risk management (IRM) functions in silos.
2024-08-07T05:54:00Z Provided by Theta Lake
The message from the regulators is clear - having an off-channel policy for mobile communications is not good enough.
Site powered by Webvision Cloud