You've requested...

Computer Weekly special report: Mobile device management and the importance of absolute compliance

If a new window did not open, click here to view this asset.

Download this next:

Data protection in the age of Brexit and GDPR

Discussions around data protection continue to be dominated by Brexit and the GDPR. And even as the GDPR is driving data protection maturity internationally, many companies are still playing catch-up.  

This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity, with insight into why many firms still stuck in the GDPR prep phase after its initiation.

Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation. 

These are also closely related to: "Computer Weekly special report: Mobile device management and the importance of absolute compliance"

  • Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change

    In this week’s Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – but the government won’t change the law. We examine the need for reform. Is the datacentre industry going nuclear? We assess the nuclear option for sustainable IT. And we find out how IT experts can improve their soft skills, and boost their career prospects as a result. Read the issue now.

  • Risk management is the beating heart of your cyber strategy

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022. Download our exclusive e-Guide and read more about:

    • How 2022’s most significant data privacy trends affect your organisation
    • Vulnerabilities to fraud are increasing across the board
    • Managing cyber risk through integrated supply chains
    • Recruitment risks: Avoiding the dangers of fraudulent candidates

Find more content like what you just read:

  • Your GDPR guide

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

    Download

  • Essential Guide: What the EU Data Protection Regulation changes mean to you

    This Essential Guide offers you news, tips and features on how the new regulations may affect you and your organisation.

    Download

  • Guiding Your Leadership Team Through the Zero Trust Mindset

    Zero trust identifies users and entities and grants them just the right amount of access as needed. In this e-book, LATAM Field Technology Director at CyberArk, Cláudio Neiva, leverages his 24 years of experience to break down the essential elements of zero trust. Read on to learn more.

    Download

  • Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief

    In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.

    Download

  • Top 10 IT in the Nordics stories of 2019

    The Nordic region punches above its weight in IT terms, with a rich tech ecosystem that ranges from clusters of tech startups creating the latest apps to large in-house IT teams transforming traditional industries. Here are Computer Weekly's top 10 Nordic enterprise IT stories of 2019.

    Download

  • Desktop auditing: Key considerations

    This expert e-guide highlights the importance of well-planned desktop auditing and several key considerations to keep in mind to maximize the effectiveness of your next desktop audit. Access now and you'll also learn what's causing some IT professionals to resort to lying to get their audits passed.

    Download

  • Infographic: Gartner AI and compliance spending forecast

    More than 60 jurisdictions around the world have proposed or are drafting postmodern privacy and data protection laws as a result. This infographic shows Gartner AI and compliance spending forecast.

    Download

  • HardenStance: Preparing for New Incident Reporting Requirements

    More stringent incident reporting rules, with wider scopes and broadening coverage, are becoming increasingly adopted by governments worldwide. To make these new measures as frictionless as possible, it’s important to engage proactively with local agencies and define a material incident for your organization. Download this paper to learn more.

    Download

  • How Dignity Used Risk Cloud® to Adapt to an Evolving Regulatory Environment

    When new regulatory requirements were imposed in the U.K., the Dignity team had a significant challenge on their hands: They had to launch an entire risk and compliance program from scratch. Find out how Risk Cloud made the process easy

    Download

  • Don’t make medical device product labeling an afterthought

    This webinar discusses how the recent EU MDR compliance deadline extension provides medical device manufacturers an opportunity to properly implement labeling and artwork solutions to mitigate risk of shortages and recalls. Tune in now to learn how to mitigate risk during the extension, ensure compliance, and avoid recalls.

    Download

  • Security audits: How to prep for a more successful experience

    In this expert e-guide, we explore how you can prepare for and participate in a security audit. Find out what you should do in advance to get ready for the auditor's visit and how to address gaps once they've been identified.

    Download

  • Meet the GRC challenges of the cloud head-on

    Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.

    Download

  • 10 benefits of AI-powered identity compliance

    Meeting and maintaining compliance entails high volumes of work, often comprised of tedious, repetitive and redundant tasks. With AI you can meet compliance, secure identities, and save resources by automating these tasks. Read this e-book to learn more.

    Download

  • Identity security: Transforming how organizations meet regulatory compliance

    Meeting regulatory compliance is a complex challenge that can introduce further challenges into already difficult business. SailPoint AI-driven identity security ensures authorized access to sensitive data, allowing for an easier compliance process through the following benefits. Read on to learn more.

    Download

  • 7 free GRC tools for compliance professionals

    All organisations need to meet a variety of regulatory compliance requirements, such as General Data Protection Regulation (GDPR), but they don't all have the budget for GRC software. In this e-guide, learn about the free, open source options.

    Download