ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance (Finance) Research

  • Facilitating “sound practices” in risk management with IBM OpenPages ORM

    Sponsored by: IBM

    This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.

  • Fast Delivery of Complex Financial Reports - How Leading CFOs Do It

    Sponsored by: IBM

    Reporting speed and accuracy are vital today. But it would be wrong to assume that you have to spend more to go faster and do a competent job. This white paper illustrates how some organizations achieved top-tier results in financial reporting and why some did not.

  • Networking Compliance

    Sponsored by: DellEMC and Intel®

    This paper presents a broad overview of the major types of compliance required today. In addition, it considers an approach to compliance based on the network as a whole, rather than on specific devices or areas.

  • IBM Rational and the Financial Services Sector

    Sponsored by: IBM

    Financial services institutions (FSIs) are under tight pressure to reduce cost and risk in the business while improving profitability and enhancing customer satisfaction. But achieving these goals can be a daunting task.  View this paper to explore a systematic approach and key recommendations that FSI should invest in to help tackle these goals.

  • Collab Net Success Story

    Sponsored by: CollabNet

    Discover how a large investment banking firm with locations in 35 countries rolled out a quick, repeatable and flexible agile development process that is consistent across the organization and in compliance with CMMI.

  • Fraud Prevention and Detection for Credit and Debit Card Transactions

    Sponsored by: IBM

    Over the past 20 years, financial institutions, governments, insurers and retailers have seen an explosion in the amount and types of fraud perpetrated against them.

  • Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization

    Sponsored by: Intel

    Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns.

  • Information security and compliance services overview

    Sponsored by: DellEMC and Intel®

    With new threats emerging and the pressures the meet compliance, your organization is forced to focus more on security and less on strategic projects that drive your business. Access this paper for an overview of security and compliance solutions available to help handle your security issues, freeing your time to focus on growing your business.

  • Oracle Fusion Governance, Risk, and Compliance Reduces Fraud and Errors to Improve Performance

    Sponsored by: Oracle Corporation

    Oracle Fusion GRC Applications improve bottom-line performance by continuously monitoring transactions and applying advanced forensic analysis and embedded application controls across business processes. Learn how you can detect more incidents and respond faster, preventing problems before they escalate or even occur.

  • ISACA PCI Compliance Symposium

    Sponsored by: Intel

    As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.

  • E-Guide: GARP and How it Helps you Achieve Better Information Governance

    Sponsored by: IBM

    This e-guide answers the most frequently asked questions about information governance and GARP. Continue reading to get a firm introduction to GARP and information governance as a whole.

  • E-Guide: Assessment Success: PCI DSS Standards and Secure Data Storage

    Sponsored by: IBM

    In this e-guide, our expert will share some tactical advice to help organizations simplify the assessment process by streamlining their data storage practices and reducing PCI DSS assessment scope. Continue reading this e-guide to learn more about how to simplify the assessment process of PCI DSS standards and secure data storage.

  • E-Guide: Risk Management and Compliance Enforcement for the Financial Industry

    Sponsored by: IBM

    This e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models.

  • Managing the Transition to IFRS

    Sponsored by: Oracle Corporation

    Listen to this podcast with David Jones, Director at PWC, who has worked with multi-national companies across Europe helping them to make the transition to adopting IFRS and to improve their financial reporting in the process.

  • Presentation Transcript: Introduction to Complex Event Processing (CEP) in Capital Markets

    Sponsored by: Sybase, an SAP company

    CEP is an emerging paradigm of computing based on an Event Driven Architecture (EDA) that offers the ability to analyze extremely large amounts of event (and other) data from disparate sources with very low latency and high throughput. There are numerous business benefits to CEP. Check out this presentation transcript to learn more.

  • Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence, and Automation

    Sponsored by: Tripwire, Inc.

    This paper provides IT security and compliance professionals a roadmap and practical advice for implementing an approach to compliance that helps overcome IT security issues.

  • Five Challenges to Continuous PCI DSS Compliance

    Sponsored by: Tripwire, Inc.

    As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape.

  • The Future of Financial Reporting: A Market Perspective

    Sponsored by: Oracle Corporation

    Following on the heels of corporate scandals at Enron, WorldCom, and others, global investors are demanding stricter corporate governance and compliance requirements for publicly held companies. Read this whitepaper to learn more about the issues, principles, and technologies underlying new requirements in corporate governance.

  • Revamping and optimizing your SAP GRC strategy

    Sponsored by: Security Weaver

    GRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy.

  • Case Study: Fortune 100 Insurance Company and Security Weaver

    Sponsored by: Security Weaver

    For the VP of Financial Systems for a Fortune 100 Insurance Company, the decision to implement an SAP compliance and reporting solution was initiated as a result of SOX. Now that the Security Weaver solution has been in place for about two years, the VP is convinced that the decision to go with this solution was the best choice for his company.

  • Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver

    Sponsored by: Security Weaver

    In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.

  • SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation

    Sponsored by: BWise

    This E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization.

  • PCI DSS: Next-Generation Data Security, Storage and Integrity

    Sponsored by: TechTarget Security

    SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.

  • The Future of Address Validation: Going Beyond Move Update to Cut Costs and Connect with Customers

    Sponsored by: Pitney Bowes Business Insight

    Today, the need to connect with customers efficiently and effectively is more important than ever. The foundation of these communications is a complete and accurate customer record. This paper describes the validation requirements, opportunities and best practices to increase organizational efficiencies relative to enterprise address validation.

  • Cost Basis Basics: Preparing for the New Reporting Requirement

    Sponsored by: Advent Software, Inc

    January 1, 2011 may have seemed very far away when the Emergency Economic Stabilization Act was signed into law in October 2008. As the date gets closer, however, many investment managers are still looking for guidance on the bill’s cost basis reporting provision—the first phase of which kicks in on that date. Read this paper to find out more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.