Compliance Audits Research
-
SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation
Sponsored by: BWiseThis E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization.
-
Prepare for Vendor Audits and Improve Software Asset Management with Integrated IBM Solutions
Sponsored by: IBMRead how effective software asset management supports both cost effectiveness and cost efficiency by matching inventory with actual deployments, thereby helping to reduce over- and under-licensing.
-
E-Book: Data Protection Plans for Complying with Privacy Laws
Sponsored by: TechTarget SecurityThis e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more!
-
Data Loss Prevention for IBM i
Sponsored by: Innovatum, Inc.Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
-
Five Challenges to Continuous PCI DSS Compliance
Sponsored by: Tripwire, Inc.As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them.
-
Center for Charter Schools at Central Michigan University Uses DocAve to Migrate Mission-Critical SharePoint Data
Sponsored by: AvePoint, Inc.The Center for Charters at CMU needed a unified platform upon which to collaborate effectively, store digital assets efficiently, and maintain industry compliant audit histories. Read this case study to learn how they used DocAve SharePoint Migrator for a hassle-free migration into MOSS with no metadata loss.
-
Governance, Risk, Compliance: Policy Management Methods and Tools
Sponsored by: Symantec CorporationIT managers are looking to governance structures and the discipline of risk management to help them make decisions and create sustainable processes around regulatory compliance. Read this E-book to learn more about risk management and evaluating GRC solutions.
-
Presentation Transcript: Getting Set for e-Discovery
Sponsored by: Symantec CorporationIn this presentation transcript, expert Michael A. Clark, Managing Director for EDDix LLC, highlights eDiscovery and offers insight for preparing your company for litigation.
-
Seven Practical Steps for Federal Cyber Security and FISMA Compliance
Sponsored by: Tripwire, Inc.This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.
-
Essential Guide to PCI DSS
Sponsored by: Information Security MagazineThis E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
-
Automating IT Configuration Controls with Oracle Enterprise Manager Configuration Change Console
Sponsored by: Oracle CorporationThis whitepaper discusses how to define, track and enforce IT policies; automate IT compliance processes; and reduce the effort and cost of managing business applications.
-
LogRhythm 3-Minute Product Demo
Sponsored by: LogRhythm, Inc.This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
-
The Path to IFRS Conversion: Considerations for the banking and capital markets industry
Sponsored by: DeloitteAs acceptance of IFRS in the United States becomes imminent, more banks and capital markets institutions are asking key questions: How does IFRS affect my institution? What events would influence my institution's pace of IFRS adoption? What obstacles might we need to consider? Read this paper to learn the answers to these questions and more.
-
IFRS in the Life Sciences: Broad implications
Sponsored by: DeloitteThis paper provides practical industry insights on IFRS for life science executives and includes useful sections on: IFRS challenges and opportunities in life sciences; Implications of IFRS for financial reporting, tax, human resources, mergers and acquisitions, IT, and treasury and much more.
-
Leveraging a Maturity Model to Achieve “Proactive Compliance”
Sponsored by: Symantec CorporationRead this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model.
-
PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
Sponsored by: Tripwire, Inc.What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.
-
SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
Sponsored by: Tripwire, Inc.SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements.
-
The Best PCI Audit of Your Life
Sponsored by: LumensionThis white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.
-
Buckle Up (On the Road to IFRS) Straight Talk Book Series
Sponsored by: DeloitteThe 11th book in our Straight Talk series helps executives understand the implications of IFRS and their role in addressing the associated changes. The publication also offers practical suggestions to help companies navigate through pressing issues and developing your own conversion road map.
-
Technology Implications of IFRS adoption for U.S. Companies: More than a technical accounting change
Sponsored by: DeloitteIn this publication, we explore the technology implications associated with IFRS conversion and discuss: Evaluating the potential technology impact; how companies can prepare technology and systems changes related to IFRS adoption; Major differences between U.S. Generally Accepted Accounting Principles (GAAP) and IFRS and much more.
-
Top Five Ways to Improve E-Discovery with Archiving
Sponsored by: Symantec CorporationOrganizations are increasingly being ordered to produce email messages and other files relevant to electronic discovery - and the penalties for noncompliance with a court's discovery order can be severe. Thus it is vital that every organization manage its electronic data for fast, easy, accurate retrieval when required.
-
The Massachusetts Data Protection Law
Sponsored by: TechTarget SecurityMassachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
-
Meeting Compliance Objectives in SharePoint®
Sponsored by: AvePoint, Inc.This document is intended to aid IT administrators and other stakeholders responsible for managing SharePoint deployments, in planning and implementing a comprehensive, reliable, and efficient compliance strategy appropriate to their organizational needs.
-
Web Application Security Trends Report Q3-Q4, 2008
Sponsored by: CenzicRead this white paper to learn how to protect web applications through application security assessment and penetration testing managed services (SaaS) that identify vulnerabilities and allow organizations to stay ahead of hackers.
-
Closing the Gaps in Root Access Control
Sponsored by: BeyondTrust CorporationRead this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards.