ComputerWeekly.com Research Library

Powered by Bitpipe.com

Regulations Research

  • E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa

    Sponsored by: TechTarget Security

    Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.

  • Information Security Magazine - February 2010: Under Control

    Sponsored by: Information Security Magazine

    Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more.

  • Presentation Transcript: Getting Set for e-Discovery

    Sponsored by: Symantec Corporation

    In this presentation transcript, expert Michael A. Clark, Managing Director for EDDix LLC, highlights eDiscovery and offers insight for preparing your company for litigation.

  • NERC: What You Need to Know

    Sponsored by: TechTarget Security

    The North American Electric Reliability Corporation's regulations aim to protect the nation's vulnerable critical infrastructure. Read this E-Book to find out what responsible entities need to do to comply with the NERC.

  • Essential Guide to PCI DSS

    Sponsored by: Information Security Magazine

    This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.

  • The Path to IFRS Conversion: Considerations for the banking and capital markets industry

    Sponsored by: Deloitte

    As acceptance of IFRS in the United States becomes imminent, more banks and capital markets institutions are asking key questions: How does IFRS affect my institution? What events would influence my institution's pace of IFRS adoption? What obstacles might we need to consider? Read this paper to learn the answers to these questions and more.

  • PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution

    Sponsored by: Tripwire, Inc.

    What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.

  • SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution

    Sponsored by: Tripwire, Inc.

    SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements.

  • The Massachusetts Data Protection Law

    Sponsored by: TechTarget Security

    Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.

  • Meeting Compliance Objectives in SharePoint®

    Sponsored by: AvePoint, Inc.

    This document is intended to aid IT administrators and other stakeholders responsible for managing SharePoint deployments, in planning and implementing a comprehensive, reliable, and efficient compliance strategy appropriate to their organizational needs.

  • eBook: Compliance for the Midmarket: Governance, Risk and Technology

    Sponsored by: TechTarget CIO

    Read this E-book to learn about how you can take a proactive approach to regulatory compliance. Rather than waste time and resources tackling one regulation at a time, find out how companies are looking at the big picture and forming security strategies based on their needs. Sponsored By: Imperva and StoredIQ

  • Laws, regulations and compliance: Top tips for keeping your data under your control

    Sponsored by: Sophos

    This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.

  • The Top 12 Most Difficult Active Directory Management Tasks

    Sponsored by: Dell Software

    This paper explains the top 12 Most Difficult Active Directory Management Tasks and provides solution for making them easier.

  • Expert Ebook: Mastering PCI

    Sponsored by: Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

    This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.

  • Becoming Value-driven: Focusing on What Matters Most

    Sponsored by: IBM

    This white paper provides insight into the six key areas essential for becoming a value-driven organization. Discover how to gain the visibility and control essential to meet and exceed customer needs.

  • Total Economic Impact Of Oracle Enterprise Content Management Suite

    Sponsored by: Oracle Corporation

    This whitepaper examines the financial impact and potential ROI on companies who use OracleEnterprise Content Management Suite. It provides companies with the ability to easily manage, reuse, and retain content and to streamline related business processes

  • Assuring Asset Documentation Integrity

    Sponsored by: McLaren Software

    In this whitepaper, we will discuss best practices for assuring the integrity of your asset documentation.

  • Pervasive Data Profiler v4

    Sponsored by: Pervasive Integration

    Pervasive Data Profiler™ ensures data quality. Proactively audit all types of data; automate testing against changing business data quality needs and compliance regulations. Get hyper-fast, multithreaded processing of large data sets or sample data

  • Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them

    Sponsored by: VeriSign, Inc

    The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.