Provided by erwin2020-10-14T07:50:00
Without the ability to harvest metadata schemas and business terms; analyze data attributes and connections; impose structure on definitions; and view all data in one place according to each user’s role within the enterprise, businesses will be hard pressed to stay in step with governance standards and best practices around security and privacy.
Find out how to connect the dots across the data trinity – governance, security and privacy.
Our white papers are prepared by our sponsors and are free to view.
You need to register for this site and agree to the sponsor’s conditions to be granted access.
2025-09-09T21:29:00Z By Adrianne Appel
Google allegedly collected personal data from mobile devices without permission, violating California privacy laws, a jury ruled in awarding more than $425.6 million to class-action plaintiffs.
2025-09-08T16:49:00Z By Jaclyn Jaeger
Cyber threats, climate-related catastrophes, and disruptive technologies remain top risks reshaping the U.S. insurance industry. The question is how chief risk officers at the nation’s largest insurers are confronting them.
2025-09-04T18:49:00Z By Ruth Prickett
The EU has one, the U.K. is getting one, many U.S. states are working with Google and Apple to provide one, and now industry sectors are developing their own digital wallet.
2024-11-06T17:05:00Z Provided by ServiceNow
The individual requirements for your security and risk operations are increasingly complex—and interconnected. Yet despite this increased interconnectivity, many organizations still manage their security operations (SecOps) and integrated risk management (IRM) functions in silos.
2024-08-07T05:54:00Z Provided by Theta Lake
The message from the regulators is clear - having an off-channel policy for mobile communications is not good enough.
2024-05-05T17:30:00Z Provided by ServiceNow and KPMG
To help investors gain a better understanding of cyber risk, the US Securities and Exchange Commission (SEC) has created sweeping new rules—forcing companies to take a more proactive approach to cybersecurity.
Site powered by Webvision Cloud