Provided by
CyberGRX2021-02-03T06:07:00
The results show that while digital transformation is widely accepted as critical, the rapid adoption of it is creating significant vulnerabilities for most organizations — and these are only exacerbated by misalignment between IT security professionals and the C-suite. All 883 respondents are involved in managing digital transformation and cybersecurity activities within their organizations.
Our white papers are prepared by our sponsors and are free to view.
You need to register for this site and agree to the sponsor’s conditions to be granted access.
2026-01-30T18:33:00Z By Shruti Mukherjee CW guest columnist
Over recent years, cybersecurity executives have been tasked with an almost impossible Challenge: reduce headcount, accelerate transformation, integrate artificial intelligence, meet regulatory obligations, and still maintain resilience.
2026-01-06T13:16:00Z By Ruth Prickett
While companies focus on the risks, opportunities, and regulations emerging around AI, the next tech challenge is already on the horizon. Quantum computers are here – and so are the associated crime risks, plus some encryption protections.
2026-01-06T13:15:00Z By Ruth Prickett
What will be the critical tech issues for compliance in 2026? We asked experts what tech, digital, and cyber issues they believe compliance teams should be focusing on in the year ahead.
2025-11-11T19:24:00Z Provided by Sayari
This report quantifies, analyzes, and visualizes the impact of typological regulations on compliance so that teams can more efficiently and effectively protect against non-obvious sources of regulatory risk.
2024-11-06T17:05:00Z Provided by ServiceNow
The individual requirements for your security and risk operations are increasingly complex—and interconnected. Yet despite this increased interconnectivity, many organizations still manage their security operations (SecOps) and integrated risk management (IRM) functions in silos.
2024-08-07T05:54:00Z Provided by Theta Lake
The message from the regulators is clear - having an off-channel policy for mobile communications is not good enough.
Site powered by Webvision Cloud