Regulatory Compliance Research
-
Information Security Threats: Building Risk Resilience
Sponsored by: TechTarget SecurityEnterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
-
Secure Web Gateway Overview: Implementation Best Practices
Sponsored by: TechTarget SecurityThis E-Guide from SearchSecurity.com unveils a number of best practices for implementing a web security gateway to help you get the most out of your investment. View now to learn more!
-
After Antimalware: Moving Toward Endpoint Antivirus Alternatives
Sponsored by: TechTarget SecurityThis E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.
-
PCI Council issues mobile application rules for software developers
Sponsored by: TechTarget SecurityThe Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
-
Detecting Security Breaches and APTs with Big Data Security Analytics
Sponsored by: LogRhythm, Inc.This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
-
CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
Sponsored by: LogRhythm, Inc.This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
-
eBook: Data Security in the E-discovery Process
Sponsored by: Dell and VMwareIn this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
-
Handbook: Medical Image Archiving
Sponsored by: TechTarget Health ITAs more and more information heads online, healthcare providers are struggling to secure and store necessary electronic data. Consult this expert handbook to learn cutting-edge archiving strategies that will help you successfully migrate to the next generation of health IT data systems.
-
Hitting the Information Governance and Compliance Sweet Spot
Sponsored by: IBMIn this expert e-guide from SearchCompliance.com, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.
-
Tackling the Data Security Challenge
Sponsored by: IBMIn this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
-
Information Governance for Business Value
Sponsored by: IBMIn this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.
-
New standards for certified EHRs drive industry toward coordination
Sponsored by: HP & Intel®This E-guide from SearchHealthIT.com discusses the changing requirements of the new EHR certification standards. Read now to learn about the challenges and ways this new criteria will affect both health care providers and EHR vendors.
-
BlueCross BlueShield of Tennessee Cuts Litigation Costs With Value-based Archiving
Sponsored by: IBMThis featured case study outlines the portfolio of solutions BlueCross BlueShield of Tennessee, Inc. put in place to bring discovery operations back in-house – helping them save up to $1 million in third-party vendor fees. View now to learn more!
-
The Great Firewall of China? How to address the specific challenges of reaching China with your website
Sponsored by: CDNetworksThis valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.
-
Creating the Ultimate Security Platform
Sponsored by: IBMThis whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
-
Data Security and Privacy Concerns Pushed into the Spotlight
Sponsored by: GeoTrust, Inc.In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
-
Quick Dirty Dozen PCI Compliance Simplified
Sponsored by: AT&T CybersecurityMaintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
-
Using EHRs to Achieve Meaningful Use
Sponsored by: TechTarget Health ITAs stage 2 implementation dates loom, providers and industry stakeholders are assessing how well they've integrated certified electronic health records, technology standards and meaningful use stage 1 requirements into healthcare delivery.
-
Healthcare Networking Classroom
Sponsored by: TechTarget Health ITBuilding wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
-
Understanding the Data Management Challenges of Dodd-Frank
Sponsored by: BloombergJoin industry expert Harald Collet in this presentation transcript to learn about new information governance, recordkeeping, and compliance complexities in the age of Dodd-Frank, and find guidance and advice to help you overcome these challenges.
-
How Web Security Improves Productivity and Compliance
Sponsored by: OpenText Security SolutionsThis resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
-
How Web Security Improves Productivity and Compliance
Sponsored by: OpenText Security SolutionsThis resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
-
Identity and Access Management Security Live Chat Transcript
Sponsored by: SailPoint TechnologiesIn this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.
-
May Information Security Magazine
Sponsored by: TechTarget SecurityThis month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
-
Build Your Identity And Access Management Strategy
Sponsored by: SymplifiedThis Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.