What the WEF 2024 Global Risks Report Means for Governance, Risk and Compliance Professionals
Analyzing the Trends in Misinformation, Technological Advances, Cyber Insecurity, and I...
Compliance Down Under: Understanding Australian Regulation CPS 230
There are nuances to the Australian Prudential Regulation Authority (APRA)'s Prudential...
Happy birthday, ChatGPT! Celebrating 1 year with the top 10 milestones in AI governance
A year in review for the ChatGPT (chatbot generative pre-trained transformer) — and a l...
4 Legal Hold Tips We’re Grateful for This November
Dive into the do’s and don’ts of data preservation, custodianship, legal hold release e...
4 types of end-user computing (EUC) risk to have on your radar
How to define and categorize end-user computing (EUC) risks based on organizational imp...
Shadow IT, phishing, malware, oh my! The risks secretly haunting your organization
There’s more to be on the lookout for than cobwebs, bats, and ghouls this October.
Understanding the 7 stages of the policy lifecycle (and how it relates to your technology)
The best way to think about your policy management technology? Through the lens of the ...
Aligning your cyber risk management program with your company’s bottom line
The key to gaining buy-in for your cyber risk management roadmap under tightening budge...
Local, state, and federal regulation changes that could impact your policy management (and how to keep up with them)
From labor codes and workplace safety regulations to cyber security reporting requireme...
Empowering EUC Management and Governance: Inside the 2023 Bloor InBrief Report
Explore the key features that earned Mitratech’s award-winning Shadow IT manager, Clust...
We’re here to help
Contact us and we’ll answer any questions about how Mitratech supports your success.