Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...

CCPA: Time for Compliance is Now

The CCPA requires organizations not only to know exactly what data they possess on individual consumers, but also be able to report on and delete information in a timely manner should consumers request it. Especially since the CCPA’s specific regulations are still undergoing changes, and with other states poised to pass their own consumer privacy laws, it’s critical that organizations get the latest information on how to make compliance a part of their privacy strategy.

White Paper | Presented by Illumio

Three Steps to Effectively Segment Your PCI Environment

Continuous visibility and host-based segmentation helps you reduce your PCI scope, secure your CDE, and demonstrate compliance to your auditors and supply chain partners.

How to Build an Effective Insider Threat Risk Management Program

When assessing risk within your organization, it’s essential to address insider threat risk. Today, many organizations don’t have insider threat risk management programs in place--but in this digital era, every company needs to implement the appropriate mitigation processes and controls. Join us as Todd Thorsen, Director, Information Security, Risk Management and Compliance at Code42, explores how to get started on developing an insider threat risk strategy, including identifying key stakeholders, adopting the right tools and technology, and more.

Research/Infographic | Presented by ALTR

Intro to DSaaS

Get powerful data security and compliance capabilities without slowing down the SDLC. Find out how Data Security as a Service can help eliminate risk and accelerate innovation.

Video/Webcast | Presented by Smarsh

Beauty and the Bane: Digital Transformation & Cloud Risk Mitigation

Digital transformation and cloud technologies are reshaping businesses from the inside out, enabling companies to be more flexible, collaborative, and fast to market.

White Paper | Presented by Panda Security

Cyber-Security Compliance: Guide to Data Protection Regulatory Compliance

Over the last few years, new governmental, and sometimes industry-specific regulations and acts have been passed aimed at ensuring that companies and organizations store and process customers’ personal and sensitive data in an appropriate and lawful manner.

White Paper | Presented by OpenText

eInvoicing For Dummies

This is an educational piece that explains einvoicing and options for automation. It positions B2B integration as a more complete solution that includes eInvoicing. The ebook introduces audience to eInvoicing, its benefits and how to be successful with an eInvoicing program. It also talks about eInvoicing regulation and the importance of compliance.

Top modern analytics use cases by industry

In the digital era, innovators in every industry are becoming analytics-driven organizations. They are using interactive analytics at scale to deliver actionable insights that improve customer experience, products and services, operational efficiency, fraud detection and prevention, and governance, risk management and compliance (GRC) – and create new revenue streams. This white paper includes real-world analytics use cases and customer success stories.