You've requested...

How remote work affects information governance

If a new window did not open, click here to view this asset.

Download this next:

CW APAC, June 2020: Trend Watch - data protection

Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

These are also closely related to: "How remote work affects information governance"

  • Secure your identities with a blueprint for CISOs

    Building an effective identity security program is crucial in today's remote work and cloud-centric environment, as poor identity security can leave organizations vulnerable to cyberattacks. This white paper from Cisco Duo offers guidance on aligning goals, building capabilities, and focusing on key outcomes to secure workforce identities.

    Read the full white paper to learn more.

  • Meet the GRC challenges of the cloud head-on

    The winds of change are blowing, and everyone seems to be moving their data to the cloud. While this is an overall boon to your business, it’s important to think about how it may affect your ability to evaluate governance, risk, and compliance (GRC).

    Go inside the world of cloud security with this expert guide and learn about the new challenges put upon enterprises with the loss of visibility, lack of standards, and increase of compliance audits in the cloud-age.

    Read about how Sabre, a travel-technology company, has adapted to this new landscape and offers their insights to help you better prepare to meet your GRC needs. In addition, get some of your questions answered about the impact of compliance audits on your IT operations.

Find more content like what you just read:

  • Effective ransomware prevention strategies for modern businesses

    Ransomware is a growing threat, with attacks costing millions. This guide provides practical tips to protect your business, including using zero-trust network access and secure web gateways. Learn how to build a secure corporate network and prevent ransomware attacks. Read the white paper to learn more.

    Download

  • Infographic: 6 information governance best practices

    Information governance can streamline an organization's data management, cut storage costs and ensure compliance, which are all critical for content management. Best practices, such as forming a committee, accounting for collaboration tools and creating reports, can guide the way.

    Download

  • Five Steps to Effective Third-Party Access Governance

    Attracting and retaining employees has become more complicated. Most organizations don't know how many third-party relationships they have. Saviynt Identity Cloud combines multiple identity management capabilities into a single cohesive platform to unify controls and risk management for every identity, app, and cloud across your business.

    Download

  • Explore artificial intelligence in ITSM and the tool options

    Artificial intelligence in ITSM is the way of the future. Dive into this comprehensive buyer's guide to discover if you have the right conditions in place to introduce this multifaceted technology, and learn guidelines to help you choose the most suitable suite of products.

    Download

  • 5 Key Differences between SASE and SD-WAN

    SASE or SD-WAN? Before your business can determine which to use to support your distributed workforce, first, you need to understand the ways in which the technologies differ. Read on to consider 5 key differences between SASE and SD-WAN.

    Download

  • Global Risks Report 2017

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

    Download

  • Preparing for the Digital Operational Resilience Act (DORA)

    This white paper provides an overview of the Digital Operational Resilience Act (DORA) and outlines the key challenges and steps organizations must take to achieve compliance by 2025. Learn how to prepare your organization for DORA through this comprehensive guide.

    Download

  • Unpacking AWS re:Invent 2024: Your Guide to Data Lakes, AI, and Cybersecurity

    This eGuide delves into AWS's most recent advancements, designed to help organizations maximize efficiency and innovation. Unveiled during AWS re:Invent 2024, these empower businesses to unlock new possibilities across data, AI, and cybersecurity.

    Download

  • CW APAC: Buyer’s guide to SASE

    Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.

    Download

  • Cybersecurity resilience in an era of identity sprawl

    As a CISO, your concerns expressed to the board of directors about cybersecurity have been largely drowned out by macroeconomic challenges, pipeline complexity and a need to enable a drastic increase in remote access.

    Download

  • Risk management is the beating heart of your cyber strategy

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

    Download

  • Seven Key Questions Defining COE Best Practices In Automation

    This Forrester white paper examines seven key questions defining best practices for automation centers of excellence (COEs). It explores how generative AI, reporting structures, and COE integration impact enterprise automation success. Read the full paper to learn how to build an effective, business-aligned COE.

    Download

  • Data governance more important now than ever

    As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.

    Download

  • A comprehensive guide for your workforce identity maturity journey

    Identity security was once simply a means of managing passwords and login credentials, but today, with identity at the heart of digital business, identity security is critical for protecting your organization. Download this white paper to unlock a comprehensive guide for your workforce identity maturity journey.

    Download

  • Controlling and Managing Privileged Access

    Download this report and learn the risks associated with privileged access, and explains how solutions from One Identity mitigate those risks with granular access control and accountability.

    Download

  • Transforming financial services - Insights for the industry

    Explore how financial services organizations can overcome industry challenges like cybersecurity threats, compliance, and customer experience by transforming their digital infrastructure and workflows. Download the white paper to learn more.

    Download

  • Transforming financial services: Change is more than just spare pennies

    Explore how Xerox can help financial services organizations overcome key challenges - from future-proofing investments to improving productivity, security, and customer experience. Download the white paper to learn more.

    Download

  • CW ASEAN: European data law - be aware and prepare

    Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.

    Download

  • CW APAC: Expert Advice on data management

    In this handbook, Computer Weekly looks at how companies and data management experts are tackling data challenges, and finds out how organisations are augmenting data management through artificial intelligence and machine learning.

    Download

  • How to manage SAP user accounts and access rights with Identity Manager

    Learn how Identity Manager can streamline user administration for the SAP ecosystem, including on-premises and cloud offerings. Manage user identities, privileges and security across the enterprise with integrated IAM. Read this white paper to see the benefits.

    Download

  • Secure your open-source software supply chain with best practices

    Open-source software offers many benefits, but also introduces new security risks. This guide covers best practices for managing open-source packages, dependencies, and vulnerabilities to secure your Python and R software supply chain. Access the e-book now to learn more.

    Download

  • CW APAC – Trend Watch: Modernising security operations

    Organisations everywhere know the risks of cyber security complacency. In this handbook, focused on modernising security operations in the Asia-Pacific region, Computer Weekly looks at how Australia is bolstering its defences, Splunk and Cisco’s integration, and Palo Alto Networks’ “precision AI”.

    Download

  • CISSP Exam Guide Chapter 1 sample download

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

    Download

  • The Definitive Guide to Cost-Effective AI

    To succeed in this AI-centric business world, it is important to not only leverage the power of AI but to do so responsibly and cost-effectively. In this e-book, you will discover the importance of a data science and AI platform’s role in optimizing ROI. Read on to learn how you can build trust and reputation with customers and stakeholders.

    Download

  • New report: Europe's Cyber Threat Landscape. 2024 study from Cloudflare

    In this 2024 research report by Cloudflare, “Shielding the Future: Europe’s CyberThreat Landscape,” learn how organizations are coping with the rising volumes of cybersecurity incidents, their levels of readiness and the outcomes they experience.

    Download

  • Risk in the World of Identity Governance

    As the network perimeter expands, identity is the new enterprise security frontier. This white paper explores how identity governance and administration (IGA) can mitigate identity-based risks through prevention, detection, remediation, and prediction. Learn how IGA secures the dynamic enterprise perimeter.

    Download

  • NTT data workplace transformation perspective

    Explore NTT DATA's view on workplace transformation, driven by the need to enhance employee experience and use emerging technologies. Discover how an integrated tech strategy, collaboration tools, network modernization, and security can enable successful transformation. Read the full white paper to learn more.

    Download

  • Digital identity strategies to enhance data privacy and protect networks

    The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.

    Download

  • A Chaos of Connectivity is Putting Businesses At Risk

    Businesses face a "Chaos of Connectivity" as they rapidly expand their technology stacks without integration plans, leading to security, compliance, and productivity risks. Learn how to overcome these challenges and manage the chaos in this white paper.

    Download

  • Data quality emerges from Covid-19 more critical than ever

    In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.

    Download

  • Data Protection Tips and Expert Insights: 36-page Guide

    Unlock a 36-page ultimate guide to data protection in this e-book, which explores how data protection differs from data privacy and data security, provides experts' thoughts on the impact of the GDPR, and presents a template for data protection policies.

    Download

  • Accelerating Zero Trust Capabilities eBook

    The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.

    Download

  • Building a Cyber-Resilient Data Recovery Strategy

    Building a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk. Read this new white paper and learn how.

    Download

  • 2024 Security State of the Union

    This white paper examines the evolving cybersecurity landscape, including AI-powered attacks, supply chain vulnerabilities, and IoT security challenges. It outlines key trends, best practices, and industry-specific concerns. Read on to gain insights into the future of cybersecurity and learn how you can strengthen your security posture.

    Download

  • CW Benelux - November 2021-January 2022: Dutch IT company rips up the HR rule book for better work-life balance

    One Dutch tech firm has used learnings from the pandemic to rip up its HR rule book and implement an official work-from-home policy. In fact, Infolearn has gone further than hybrid working, with a personal mobility budget for staff and a four-day working week.

    Download

  • How Remote Connectivity Platforms Enable Secure Business Operations

    Download this IDC report for your roadmap on establishing secure remote connectivity for both agile and productive business operations. Inside the data-rich report, learn how to obtain a 360-degree security posture, to get the most from your connectivity platform, and to view essential guidance to get you started.

    Download

  • CW APAC, July 2020: Trend Watch: Security

    In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.

    Download

  • Key questions to set your automation goals

    Read this e-book to learn how to overcome practical barriers to holistic automation adoption within your organization. Coverage includes automation goal setting, common myths, how to unite teams and training, and scaling automation across the business.

    Download

  • Computer Weekly – 21 May 2024: Can AI supercharge human creativity?

    In this week's Computer Weekly, we talk to Getty Images about the challenges of balancing human creativity with the risks and opportunities of GenAI. Our latest buyer's guide examines the best desktop IT management practices in a world of flexible working. And we review the benefits of open source software in the enterprise. Read the issue now.

    Download

  • The Automation Architect’s Handbook: Leading the Automation Journey

    In this automation architect’s guiding e-book, discover a walkthrough map of the steps required to lead your organization beyond task-centric automation toward an enterprise-wide strategy.

    Download

  • A new wave: AI compliance

    Preparing for new AI regulations is crucial. This e-book explores 5 key pillars of AI regulatory readiness, including understanding requirements, leadership, responsibilities, governance, and technical foundations. Read on now to ensure your organization is ready for future regulations.

    Download

  • CW ASEAN, November 2018: Blockchain is no 'magic wand' for security

    Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.

    Download

  • Making the Move to Modern IGA

    This guide shares expert advice on preparing for, executing, and measuring a modernization campaign’s success. Insights surround building consensus, evaluating platforms, managing migration, and measuring success. Importantly, it also features real-world examples from practitioners on the other side of successful transitions. Read the guide today!

    Download

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

    Download

  • Data Fabric For Dummies

    In this digital edition of the popular For Dummies series of reference books, step into the world of data fabrics: inside, learn what a data fabric is and how to realize its benefits, how to effectively build and deploy a data fabric, best practices for optimizing and modernizing data access, and more.

    Download

  • NIS2 and European boards: 2024 analyst report by ESG

    In this 2024 report, TechTarget's Enterprise Strategy Group (ESG) unpacks what makes the Network and Information Systems 2 (NIS2) novel, its impacts in the EU and beyond, and more. Tap into the 10-page report to access those insights and ESG research findings.

    Download