Best Practices in Performance Measurement and Reporting: Understanding the Global Investment Performance Standards®
By: Advent Software, Inc View more from Advent Software, Inc >>
Download this next:
Scaling compliance as your organization grows
By: Vanta
Type: Webcast
As organizations continue to grow and expand, they accumulate more assets, platforms, employees, and more. With all of these additions comes additional risk, and with this risk comes a need to continually reevaluate compliance.
In this webcast industry experts discuss how organizations are improving and scaling their compliance programs during periods of hyper-growth.
Watch now to gain insights into navigating compliance in an ever-changing landscape of growing headcount, product expansion, and new legal requirements.
These are also closely related to: "Best Practices in Performance Measurement and Reporting: Understanding the Global Investment Performance Standards®"
-
Desktop auditing: Key considerations
By: Dell Software
Type: eGuide
When was the last time you audited your Windows desktop environment to ensure that the proper policies and standards are being met? If you're like many network managers, you're lucky to have a standard desktop image that gets rolled out as needed. And a formal audit of what's what on all desktops may seem to be out of the question.
This expert e-guide highlights the importance of well-planned desktop auditing and several key considerations to keep in mind to maximize the effectiveness of your next desktop audit.
Additionally, learn what’s causing IT professionals to resort to lying to get their audits passed.
-
Security audits: How to prep for a more successful experience
By: Dell Software
Type: eGuide
No one looks forward to a visit from a security auditor. You may feel a sense of trepidation, expecting that they will find some fault within your systems.
But the findings from a good security auditor shouldn’t be feared or ignored; rather, the gaps they find and the advice they offer should be embraced.
In this expert e-guide, we explore how you can prepare for and participate in a security audit. Find out what you should do in advance to get ready for the auditor’s visit and how to address gaps once they’ve been identified.
Find more content like what you just read:
-
Meet the GRC challenges of the cloud head-on
By: Dell Software
Type: eGuide
Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.
-
Ask the experts: Discover how to handle external security auditors
By: Dell Software
Type: eGuide
A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.
-
Your Guide to a New Regulatory Era for Cybersecurity
By: Palo Alto Networks
Type: eBook
As the cybersecurity landscape evolves, organizations must stay ahead of new regulatory changes, including requirements from the U.S. Securities and Exchange Commission (SEC). Read this 12-page e-book to learn about the SEC cybersecurity reporting rule, what it covers, how to comply with it, and much more.
-
Prepare for the EU's new Network & Info Security Directive (NIS2)
By: NCC Group
Type: White Paper
Prepare for the EU's new Network and Information Security Directive (NIS2) with this comprehensive guide. Learn about the key requirements, consequences of non-compliance, and how to ensure your organization is ready. Get the white paper now to understand the steps to achieve NIS2 compliance.
-
Checklist: Self-assess your compliance readiness
By: NCC Group
Type: White Paper
This white paper outlines a structured approach to reviewing and enhancing your cyber security practices for regulatory compliance. Learn how to assess your compliance readiness, define your cyber security risks, and implement an effective compliance framework to protect your organization. Read the full white paper to get started.
-
Understanding FedRAMP cloud security requirements and options
By: Cisco
Type: Gartner Research Report
SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.
-
What Is DO-178C?
By: Wind River
Type: Blog
DO-178C, Software Considerations in Airborne Systems and Equipment Certification, is the principal certification document used by aviation across the world. This blog explores the ins and outs of DO-178C, going through its many parameters and criteria for qualification so that you can better understand and comply. Read on to learn more.
-
How to Build a Proactive Compliance Program with Identity Security
By: CyberArk
Type: eBook
This eBook reviews nearly 20 global regulations and frameworks, with details on their security-focused requirements. This includes:NIS2 directiveDORANIST Special Publication 800-207 on Zero Trust ArchitectureDownload the eBook and learn how you can streamline compliance initiatives.
-
Preparing for the Future of AI Regulation: A Readiness Roadmap
By: Dataiku
Type: eBook
Preparing for new AI regulations is crucial. This e-book explores 5 key pillars of AI regulatory readiness, including understanding requirements, leadership, responsibilities, governance, and technical foundations. Read on now to ensure your organization is ready for future regulations.
-
Checklist for Adopting Digital Operational Resilience Act
By: XM Cyber
Type: White Paper
In this white paper, discover a 25-point checklist for adopting the Digital Operational Resilience Act (DORA).
-
Guide to the Cybersecurity Maturity Model Certification (CMMC) compliance
By: Scalepad Software
Type: White Paper
The Cybersecurity Maturity Model Certification (CMMC) framework is designed to support and guide MSPs working with the US Department of Defense. This white paper presents a guide to the CMMC, breaking down the essential information so that you can navigate its more complex features. Read on to learn more.
-
Explore Cyber Policy: Insights on evolving regulatory landscape
By: NCC Group
Type: Research Content
As cyber rules expand globally, responsibility and liability are increasingly placed on senior leaders. Understand the latest regulatory trends and prepare your organization with this in-depth Global Cyber Policy Radar Report.
-
Preparing for the Digital Operational Resilience Act (DORA)
By: NCC Group
Type: White Paper
This white paper provides an overview of the Digital Operational Resilience Act (DORA) and outlines the key challenges and steps organizations must take to achieve compliance by 2025. Learn how to prepare your organization for DORA through this comprehensive guide.
-
DORA compliance 101: Key requirements, essential tools
By: Utimaco
Type: Webcast
Compliance with the Digital Operational Resilience Act (DORA) is intended to improve resilience against cyberattacks. In this webinar, uncover DORA’s objective, target market, timeline, and key requirements and tools for achieving compliance.
-
The role of privileged access management in meeting compliance and regulatory requirements eBook
By: One Identity
Type: eBook
Privileged Access Management (PAM) is essential for compliance and regulatory needs. PAM solutions offer detailed control over privileged accounts, enforce robust security, and provide auditing and monitoring. Discover how PAM aids in regulation compliance and data protection. Read the e-book for more.
-
Managed IT and Security Guide
By: ARG, Inc.
Type: eBook
Whether you are concerned about skyrocketing cyberattack threats, debating a migration to the cloud or looking to enhance your talent pool, this e-book will answer all your questions. Download now to access your ultimate managed IT and security guide.
-
Streamline Data Subject Access Requests in 3 Clicks
By: TD Synnex
Type: Product Overview
Streamline data subject access requests (DSARs) with IBM Discover and Classify in just 3 clicks. Automate the entire DSAR process, from intake to fulfillment, to meet privacy obligations and build trust. Read the full product overview to learn how.
-
Securing PHI and Meeting Compliance Needs in the Cloud for AbsoluteCare
By: ARG, Inc.
Type: Case Study
Read this case study to learn how ARG helped AbsoluteCare, a leading healthcare provider for vulnerable populations, find the best match for their infrastructure and security needs.
-
FedRAMP Compliant Unified Communications Solution Delivers Simplicity, Scalability and Savings
By: ARG, Inc.
Type: Case Study
A top 10 federal defense contractor with over 20,000 employees was managing a complex environment with large Avaya and Cisco footprints for PBX and contact center. They required a FedRAMP environment that provided a seamless consolidation of collaboration, conferencing and voice. Download this case study to learn how they got it.
-
Top 10 policies every IT compliance certification requires
By: Scalepad Software
Type: White Paper
A key factor in job satisfaction is eliminating manual, tedious tasks—like backup monitoring—so your team can focus their efforts on projects of greater business value. Download this white paper to view 5 tangible benefits of automated backup monitoring, applicable to your organization, MSPs, and others.
-
NIS2 and European boards: 2024 analyst report by ESG
By: Arctic Wolf
Type: ESG Showcase
In this 2024 report, TechTarget's Enterprise Strategy Group (ESG) unpacks what makes the Network and Information Systems 2 (NIS2) novel, its impacts in the EU and beyond, and more. Tap into the 10-page report to access those insights and ESG research findings.
-
FFIEC guidelines cybersecurity asset management address
By: Redjack
Type: White Paper
Cybersecurity asset management addresses several key requirements found in the Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment Tool and plays a crucial role in your compliance efforts. Download this white paper to learn which aspects of FFIEC guidelines cybersecurity asset management solutions address and how.
-
Guide to the NYDFS Cybersecurity Regulations
By: Redjack
Type: White Paper
Recently, the New York State Department of Financial Services (NYDFS) introduced an update to its cybersecurity regulations, adding requirements to ensure against growing concerns. Download this white paper for a full breakdown of the new changes.
-
Three Steps to Future-Proof Voice Compliance with Webex
By: Theta Lake
Type: White Paper
Learn how to simplify compliance with voice recording and archiving regulations for Webex. Theta Lake is designed to integrate seamlessly to help businesses capture, retain, and monitor Webex communications. Discover three best practices to future-proof your voice compliance. Read the white paper to learn more.
-
Compliance leader’s guide to cloud voice regulatory best practices
By: Theta Lake
Type: White Paper
The shift to cloud-based voice platforms is transforming communication and collaboration in businesses worldwide. Download this white paper to unlock key compliance considerations to prepare for the shift to cloud voice.
-
Email Security Best Practices for MSPs
By: Mailprotector
Type: eBook
This eBook explores a comprehensive set of best practices that any MSP can employ to fortify their clients’ email defenses. From encryption and authentication protocols to employee training and threat detection, this guide will equip you with the knowledge and tools to demonstrate your commitment to securing your clients’ most vulnerable assets.
-
Secure admin accounts, customer identities under new compliance rules
By: CyberQP
Type: White Paper
Explore how MSPs can secure admin accounts and customer identities to meet NIST and CMMC compliance requirements. Learn about privileged access management, password updates, and other best practices to protect your environment. Read the full white paper for more insights.
-
Ensuring NIS2 Compliance with Privileged Access Management: A Comprehensive Blueprint
By: One Identity
Type: White Paper
As the NIS2 Directive expands the scope of cybersecurity requirements, privileged access management (PAM) is crucial for compliance. Learn how PAM can help organizations mitigate risks, respond to incidents, and meet NIS2 obligations in this comprehensive white paper.
-
Global Compliance And Regulation Solutions
By: NCC Group
Type: White Paper
As cyber threats escalate, organizations must strengthen compliance with evolving regulations. NCC Group's global experts help clients meet complex regulatory standards, manage cyber hygiene, and improve security maturity. Read the full white paper to learn how NCC Group can guide your compliance journey.
-
A deep dive into global cyber policy in 2025
By: NCC Group
Type: Webcast
A turbulent time in geopolitics is complicating the cybersecurity landscape and prompting reevaluation of current regulations. Join NCC Group’s experts, the professionals who play an instrumental role in the shaping of global cybersecurity laws, as they discuss what to look out for in 2025 and beyond.