ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance (Finance) Research

  • 2013 Data Governance Survey Results

    Sponsored by: Rand Secure Data

    Check out this informative paper to explore the concept of data governance and why so many of today's organizations lack adequate solutions to this increasingly-difficult challenge. Find out key steps to improve your company's data governance and discover one solution that could perfect your strategy. Read on to learn more.

  • Guide to OCC updates to governance ruling

    Sponsored by: Iron Mountain

    Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.

  • An Expert Guide to the PCI DSS 3.0

    Sponsored by: TechTarget Security

    This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.

  • Compliance Guide: Ensure Social Media Compliance Across Your Organization

    Sponsored by: Hootsuite

    Whether you're in the financial, medical, or other industry, there are unique regulatory and legal requirements to consider when interacting on social media. In this informative resource, learn how a social relationship platform can help you manage all the areas of social media compliance,

  • Case Study: Customer and Channel Insight Shapes Business Decisions

    Sponsored by: Aria

    This brief case study reveals how the right billing system enabled communications provider IMN to meet the needs of sales growth by supporting enterprise-wide billing and customer management.

  • Advances in Financial Disclosure and Risk Management

    Sponsored by: IBM

    This on-demand webcast investigates performance management and analytics tools that can help drive success in finance and risk management. Watch now to discover product updates, best practices, and more.

  • Are Your File Transfer Methods Compliant?

    Sponsored by: OpenText

    This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.

  • Eight Tips to Safeguard Your Business Information

    Sponsored by: Iron Mountain

    Check out this short, two-page document to explore 8 tips for safeguarding your business information in today's day and age. Read on to fortify your data protection strategy with these tips, including: 1) structure your data, 2) assess and treat associated data risks, 3) ensure you have a disaster recovery plan and 5 more expert tips.

  • File Archive: the next big thing?

    Sponsored by: EMC Corporation

    Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more.

  • UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES

    Sponsored by: TechTarget Security

    This expert guide from SearchSecurity.com discusses the new Payment Card Industry (PCI) Mobile Payment Acceptance Security Guidelines and examines how to ensure compliance in a world where mobile payment has become ingrained into everyday life.

  • CARA Meets PCI Requirements and Gains Network Visibility: A Case Study

    Sponsored by: LogRhythm, Inc.

    This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!

  • Hitting the Information Governance and Compliance Sweet Spot

    Sponsored by: IBM

    In this expert e-guide from SearchCompliance.com, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.

  • Information Governance for Business Value

    Sponsored by: IBM

    In this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.

  • Eight Tips to Safeguard Your Business Information

    Sponsored by: Iron Mountain

    This short white paper explores 8 tips for safeguarding your business information in today's day and age.

  • Strategies to Maintain PCI DSS Compliance

    Sponsored by: GeoTrust, Inc.

    This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.

  • SIEM Demo: Get Complete Security Visibility in an Hour

    Sponsored by: AT&T Cybersecurity

    Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.

  • Quick Dirty Dozen PCI Compliance Simplified

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.

  • Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management

    Sponsored by: TechTarget Security

    This E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective.

  • Understanding the Data Management Challenges of Dodd-Frank

    Sponsored by: Bloomberg

    Join industry expert Harald Collet in this presentation transcript to learn about new information governance, recordkeeping, and compliance complexities in the age of Dodd-Frank, and find guidance and advice to help you overcome these challenges.

  • Banca Carige Video

    Sponsored by: IBM.

    In this brief video, discover how Banca Carige, a leading bank in Italy with over 700 branches, chose and implemented a large-scale data analytics platform in order to enable real-time analytics in all of its locations, improving business performance and individual client services.

  • May Information Security Magazine

    Sponsored by: TechTarget Security

    This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!

  • PCI Council issues mobile application rules for software developers

    Sponsored by: TechTarget Security

    The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.

  • Cloud Compliance Technical Guide

    Sponsored by: TechTarget Security

    Check out this expert technical guide for a global perspective on emerging cloud compliance issues.

  • Law & The Data Explosion

    Sponsored by: Symantec Corporation

    This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.

  • Closed-loop Records Management: The Stakes Are Too High to Ignore

    Sponsored by: RSD

    As the breadth, variety and importance of electronic data in the enterprise continues to expand, it is increasingly critical that corporate information policies be tied to strong IT enforcement. Access this resource to learn how to develop effective closed-loop records management through well-defined information governance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.