HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Grc News & Analysis

Bracing for the E-Discovery Dangers of BYOD

E-Discovery Dangers of BYODIn today’s fast-paced business environment, companies are increasingly permitting their employees to use their own devices, such as smart phones and iPads, to perform business functions. Known as Bring Your Own Device (BYOD), this trend has revolutionized employee work habits. 

Qualifying a Director as a Risk Expert

Qualifying a Director as a Risk ExpertBoards have generally identified experience and insight into risk management as areas where they need to improve. As risk management is integral to any organization’s success, helping it to identify and address risks to the achievement of its objectives, regulators and others expect boards to beef up their ability to provide effective oversight.


Actiance Enhances Social Compliance Platform Support for Lync, Jive

Actiance Enhances Vantage Compliance Platform.png

For some regulated industries like finance, social business can become a social headache. To lessen that headache, Actiance’s Vantage flagship product for compliance management of all social business channels provides audits, content inspection and archiving, and now the company is out with its 2013 version. 

What Does Counsel Really Think About Predictive Coding?

Predictive coding for e-discoveryWhile the promise of predictive coding is alluring, many questions remain for corporations and law firms: Where does the software end and the importance of workflow begin? Are companies using it successfully? Is the technology well-suited for all types of legal matters?

Four Ways to Build Confidence in Your SharePoint Governance Strategy

4 ways to build SharePoint Governance ConfidenceIn a series of surveys last year of more than 1,000 SharePoint administrators and business professionals, much was learned about how people "perceived" their organizations to be handling their SharePoint governance strategy. The data showed a large gap between those perceptions and what governance actually looked like inside businesses. 

Poor Data Access, Management, Security Cost Millions in Lost Sales for Enterprises

Research carried out recently by Voltage Security at the RSA conference in San Francisco has confirmed what most of us know, but many enterprises still have to take action on: the inability to access data is costing enterprises money, and specifically, according to this research, sales.

How to Develop and Implement Your Discovery Readiness Program

It all starts with a “discovery program framework” -- which is just a glorified checklist. But it’s proven to be one heck of a useful checklist for those organizations who are addressing litigation readiness, compliance and e-Discovery.

The Path to Excellence for Internal Audit

If internal audit is to remain relevant, it needs to move beyond the services currently performed to provide assurance to the main stakeholders.

Seven Steps to a Successful SharePoint Governance Plan

As a SharePoint MVP, active member of the global SharePoint community, an experienced project manager with knowledge of SharePoint business user topics, I am often asked "What are the best practices for SharePoint governance?"

Outsourcing Security to the Cloud: As Safe as Burying Treasure Near a Pirate

Welcome! Yea, though a scurvy pirate or two has occasioned to dare set foot within our establishment, they were swiftly dealt with and ne’ery a one have been eyed since. Aaargh …’tis no safer place to bury yer treasure. Thar treasure chests are sturdy and their locks sure. We afford ye yer own shovel for buryin’ and the watchmen step lively to thwart the ne’er-do-wells. Would ye care for a copy of our SSAE-16? Did I mention that we’re PCI compliant?

AIIM Research Shows Shortcomings in Records Management, Risk, Information Governance Practices

The paperless office appears further away than ever before. According to recent research from AIIM we are using more paper records than ever before, there are still significant problems capturing and storing information for records and, even worse, senior management is sticking its head in the sand and ignoring the inherent risks in these practices.

How to Maintain a Governance Strategy in the Cloud

A lot of thought goes into the decision to move part or all of a company's resources to the cloud, but one thing often goes ignored: governance.

Why I Worry About Uncertainty First, Then About Risk

Uncertainty is inherent in any plan. But there are actions that can be taken to increase the likelihood of positive outcomes and to reduce risk.

E-Discovery Is Risk Management

e-Discovery is normally thought of as a legal process related to the identification, gathering, analysis and transfer of data (e.g., documents and email) for lawsuits and other legal matters but though that is true, e-Discovery is at its core, a risk management issue.

Got a Case of SIEM? The Only Remedy is More Control

Got a case of the SIEM? Could be if your Security and Information Event Management (SIEM) strategy is taking longer to deploy or you're struggling with managing its complexity. A new report from eIQnetworks, which offers simplified security, risk and compliance solutions, reflects responses from 191 IT decision makers and shows that 44 percent said that it took a few weeks to more than a month to deploy their latest SIEM product.

Displaying 76-90 of 359 results

< Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next >