Log in
 Username:  
 Password:  
Home
Sign up
Channels
Networks
Events
Web Presentations
White Papers
About
Contact Us

Log in now to watch this video

Not a Mash Networks subscriber yet? Join for free!

Sign up here!

What are the Key Compliance-Related Technologies Companies Should be Looking at?

Consul risk management

Consul risk management
Kristin Gallina Lovejoy, CTO

Runtime: 4:50

Key Takeaways:

  1. Look at common IT control deficiencies and make sure you have technologies to mitigate them.
  2. Number one IT control deficiency: Improper change management policies.
  3. Companies should be Looking at:
    • Identity Management Technologies: Help ensure individuals have the appropriate access for their roles and responsibilities.
    • Monitoring Technologies: Help ensure individuals do the right thing under the right conditions and alerts you when they don’t.
    • Change Management Technologies: Help ensure code changes are authorized before they are enacted.

Web Presentations Events Calendar White Papers
Networks Things You Can Do
Copyright © Mash Networks, LLC. All rights reserved.
Privacy Policy    Terms of Service