We think about cyberattacks as being direct hits on our databases, but that is so 2010. Today, sophisticated criminal attacks rarely come through the front door.
Learn more about how GRC processes and technologies support a more mature and effective business continuity management (BCM) capability.
Poor GRC information waste resources and time — and may be increasing risk to your business. The answer is a four step structured approach to identifying, sharing and analyzing GRC information.
Three leading business continuity planning (BCM) experts discuss how to prepare for different levels of disaster in this pre-recorded event.
What’s at the core of GRC technology? According to Joe DeVita, Partner & GRC Technology Leader, PwC, successful GRC technology must align, automate and integrate business processes.
Huge anti-corruption fines. A focus on corporate conduct. Globalization. Each of these trends has put a lot of pressure on third party management programs. In the OCEG Tech Talk, “Anti-Corruption and Technology,” Ken Kurtz, Dennis Haist, and Tony Charles from STEELE CIS share insight and advice on managing anti-corruption in third party relationships.
“It’s common to see billion dollar fines instead of million dollar fines.” A scary but real fact in regulatory compliance enforcement. Andrew Neblett, SVP, Thomson Reuters discusses these issues in the Tech Talk video interview “Regulatory Monitoring and Intelligence.”
Big data is transforming the world of governance, risk management, and compliance (GRC). In the Tech Talk video interview Big Data and GRC, Bruce McCauig, Director of Solution Marketing for SAP, shares thoughtful stories from his experience as a chief auditor, global consultant, and board member. He also talks about exciting big data technology solutions from SAP.
Governance, risk management, and compliance (GRC) technology can provide big benefits to your organization. What can you expect and where do you start?
Hackers finding victims in social networking sites is nothing new. We’ve been warned about increased risk to corporate data from malware attacks via social media sites such as Twitter, Facebook, and LinkedIn for years now.