Regulatory Compliance Research
-
E-Guide: Evaluating cloud security concerns
Sponsored by: TechTarget SecurityThe benefits of cloud computing such as reduced costs and greater efficiency are widely understood by today’s organisations, but security still remains a top concern. This expert tip provides advice on how to evaluate cloud computing providers and highlights some of the risks that must be considered when evaluating cloud solutions.
-
Internal Controls Checklist for Corporate Data Protection and Compliance
Sponsored by: TechTarget SecurityIn this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
-
Iron Mountain EMR Scanning Survey Report
Sponsored by: Iron Mountain70% of hospitals expect to meet EHR meaningful use guidelines this year. Yet, 78% expect to continue to treat patients using paper records for up to 5 more years despite the financial incentive for meeting these requirements. Inside this white paper, learn how your peers are transitioning to an EHR system.
-
Best practices for utilising SharePoint e-discovery capabilities
Sponsored by: Dell SoftwareIn this expert e-guide, discover how SharePoint 2010 can simplify e-discovery for your organisation. Plus, learn how to sell a governance plan to management by reminding them of the benefits.
-
SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools
Sponsored by: IBMAuditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.
-
SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program
Sponsored by: IBMThis expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.
-
SearchSecurity.com E-Guide: Defining an acceptable level of risk for the organization
Sponsored by: IBMDefining an acceptable level of risk for the organization is no easy task. Learn how threat profiles and business drivers can be used to determine an appropriate level of risk for the organization in this expert tip. In addition, find out how to perform an accurate enterprise security risk analysis.
-
SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes
Sponsored by: IBMThis expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.
-
Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector
Sponsored by: Dell SecureWorksDell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.
-
Presentation Transcript: Has Your QSA Thrown You Under a Bus?
Sponsored by: Dell SecureWorksAfter working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.
-
Presentation Transcript: Vulnerability Scanning and Compliance
Sponsored by: Dell SecureWorksIn this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.
-
Leveraging XBRL for Value in Organizations
Sponsored by: ISACAThis white paper was developed jointly by ISACA and IFAC, providing guidance on how to leverage value from XBRL initiatives and compliance requirements, with examples and case studies included.
-
Technical Guide on SIM
Sponsored by: TechTarget SecuritySecurity information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance.
-
August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders
Sponsored by: Information Security MagazineThis month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market.
-
Minimize your financial institution’s risk with solutions from IBM
Sponsored by: IBMOrganisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.
-
Electronic Health Records: From Evaluation to Implementation
Sponsored by: DellEMC and Intel®With the enactment of the American Recovery & Reinvestment Act (ARRA), healthcare facilities can receive reimbursement for early adoption of Electronic Health Records (EHRs). However, late EHR adopters will be penalized through decreased Medicare and Medicaid reimbursements. Learn how ARRA could impact your healthcare facility.
-
E-Guide: 10+ Tips on Building a Strong Records Management/Data Retention Policy
Sponsored by: StoredIQIs your company in line with e-discovery requests? This expert E-Guide provides a crash course on everything e-discovery by outlining 10 steps to building a records retention management system and also discusses three main objectives in developing an electronic data retention policy.
-
Choosing a Cloud Provider with Confidence
Sponsored by: GeoTrust, Inc.In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.
-
Enabling Continuous Compliance Across the Enterprise
Sponsored by: IBMToday's innovative enterprises are transforming compliance into a continuous action that is woven into the fabric of both their IT security and business environments. Learn how this transformation can significantly improve compliance results with fewer resources, while providing valuable insights to drive strategic business decisions.
-
U.S. Army Relies on GlobalSCAPE® Secure Information Exchange Solutions to Protect Critical Data
Sponsored by: GlobalscapeNow you can get a file sharing solution that the U.S. Army uses and eliminate any worries you have about transferring sensitive business data. This case study will show you how this solution has been very successful for the Army and will teach you how your business could benefit a great deal as well.
-
Tivoli Endpoint Manager: Continuous Compliance in a Distributed World
Sponsored by: Mainline Information SystemsThis presentation transcript will teach you about the downfalls of endpoint management including, complexity, compliance and cost. You will also learn how to mitigate these downfalls and find a product where these are non issues.
-
Oracle Identity Analytics- A Business Perspective
Sponsored by: Oracle CorporationThis white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals.
-
Expert advice on dynamic case management best practices
Sponsored by: IBMThis mini-eBook describes exactly how dynamic case management (DCM) can benefit financial services firms and offers expert advice on both the best practices to apply and pitfalls to avoid in DCM adoption.
-
Data Security in the E-discovery Process
Sponsored by: TechTarget SecurityIn this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
-
Oracle Fusion Governance, Risk, and Compliance: The New Standard for Risk Management and Compliance
Sponsored by: Oracle CorporationWhen organizations fail to comply with regulations, they can face costly fines. It is no surprise, then, that organizations rank achieving compliance as a top priority in order to avoid the overwhelming cost of noncompliance. Learn about an approach that helps effectively manage compliance activities.