Compliance Banking Non-employee identity management - Customer story See how one company adopted a solution that supports onboarding of third party and federated third party identities for their identity security program. eBook How-to guide: Identity security & compliance - eBook eBook The NIS2 Directive: Ensure compliance Article Gramm-Leach-Bliley Act - Article Article What is compliance risk? - Article Article Regulatory risk - Article See how understanding regulatory risk helps minimize potential negative impacts by assuring ongoing compliance with the evolving regulatory landscape. Article What is SaaS management? - Article See how SaaS management can help organizations leverage the power of cloud-based software as well as manage costs, improve security, and enable compliance. Article Regulatory compliance in Europe, the Middle East, and Asia See how regulatory compliance enables organisations to conform to acceptable practices and help ensure the safety and security of both people and entities. Market View Foot to the floor ahead of 2024: what NIS2 means for your business Authored by Steve Bradford, SVP, EMEA In December 2022, the European Union’s updated Network and Information Security Directive, more commonly known as NIS2, came into force. This means that EU Member States will have until 17 October 2024 to put this new law into their national legislation. With just one year [...] Article What is personally identifiable information (PII)? Learn about laws around the world governing personally identifiable information and how organizations can protect it during collection and maintenance. eBook Aligning to the NIST Cybersecurity Framework - eBook See how SailPoint helps agencies and mission partners meet NIST CSF controls to increase their overall cybersecurity posture and compliance management. Article Compliance audit guide: Definition, types, and processes See how a compliance audit helps organizations avoid fines and other penalties as well as identify gaps that could result in security breaches. Article What is risk mitigation? - Article See how organizations can craft risk mitigation into models that fit their specific needs by taking best practices and principles into consideration. Article Cybersecurity threats - Article See why organizations that establish effective defenses against cybersecurity threats are those that invest in detecting, assessing, and managing risks. 123Next ›»