ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance Best Practices Research

  • How to Comply with the HIPAA Security Rule

    Sponsored by: Thawte Inc.

    In this expert guide from SearchHealthIT.com, find out how to comply appropriately with the HIPAA compliance regulations to ensure that your organization doesn't run into unexpected and unneeded complications.

  • Quick Dirty Dozen PCI Compliance Simplified

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.

  • Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management

    Sponsored by: TechTarget Security

    This E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective.

  • Using EHRs to Achieve Meaningful Use

    Sponsored by: TechTarget Health IT

    As stage 2 implementation dates loom, providers and industry stakeholders are assessing how well they've integrated certified electronic health records, technology standards and meaningful use stage 1 requirements into healthcare delivery.

  • Where BCDR and GRC Come Together: A CIO's Guide

    Sponsored by: Essextec

    In this e-guide, our experts from SearchSecurity.com will help you establish better security with this IT disaster preparation and recovery guide for enterprise CIOs.

  • Understanding the Data Management Challenges of Dodd-Frank

    Sponsored by: Bloomberg

    Join industry expert Harald Collet in this presentation transcript to learn about new information governance, recordkeeping, and compliance complexities in the age of Dodd-Frank, and find guidance and advice to help you overcome these challenges.

  • Using Predictive Coding to Your E-Discovery Advantage

    Sponsored by: TechTarget CIO

    E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.

  • Cloud-based archiving for e-discovery/compliance: Five "need to knows"

    Sponsored by: Hewlett Packard Enterprise

    This expert E-Guide discusses five key questions to answer when evaluating or developing a cloud-based archiving strategy for your business.

  • Information Lifecycle Governance Leader Reference Guide

    Sponsored by: IBM

    Storing data that no longer has any value to the organization is a crippling process that forward-thinking CIOs must begin to shy away from. This white paper provides key insight surrounding the defensible disposal of unnecessary data.

  • May Information Security Magazine

    Sponsored by: TechTarget Security

    This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!

  • PCI Council issues mobile application rules for software developers

    Sponsored by: TechTarget Security

    The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.

  • Enterprise Security: Why you need Effective Log Management

    Sponsored by: TechTarget Security

    For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.

  • CIO Handbook: The Risk Management Approach to Information Governance

    Sponsored by: TechTarget Security

    This handbook provides information governance-related risk management advice for organizations faced with managing and securing corporate data.

  • Cloud Compliance Technical Guide

    Sponsored by: TechTarget Security

    Check out this expert technical guide for a global perspective on emerging cloud compliance issues.

  • Taking a Strategic Approach to Risk Management

    Sponsored by: TraceSecurity

    This e-guide will provide readers with the understanding they need to address potential security threats and risk mitigation while efficiently utilizing available resources. Topics covered include operational risk, risk management and compliance policies, the risk assessment process, and more.

  • Tips for Creating a HIPAA-Friendly BYOD Policy

    Sponsored by: HP & Intel®

    This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.

  • HIPAA Compliance Takes Patient, Employee and Vendor Followup

    Sponsored by: HP & Intel®

    This e-guide highlights ways health care providers improve their mobile device security in the wake of BYOD initiatives. Inside, learn how you can embrace the consumerization of IT while ensuring your facility remains compliant with HIPAA regulations.

  • How to Manage Secure File Transfers to Meet Compliance Requirements

    Sponsored by: IBM and SI Architects

    This expert eGuide will help you learn how to maintain a balance between functionality and security when it comes to wide area network (WAN) file transfers. IT expert Dan Sullivan answers questions about WAN management and how to ensure secure transfers.

  • Sustainability: From Strategic Objective to Compliance Operation

    Sponsored by: HP & Intel®

    This e-guide from SearchCompliance.com offers 3 lessons learned regarding compliance departments' responsibility to comply with green initiatives that haven't evolved as quickly as the business has. Inside, learn how to closely monitor compliance operation conditions that affect corporate strategy and balance resources with operational capacity.

  • Put Compliance Management Back into Server Virtualization

    Sponsored by: HP & Intel®

    This e-guide from searchCompliance.com offers expert insight that will help ensure your business remains compliant before, during and after any server virtualization implementation. Read now to learn how you can put compliance management back into server virtualization.

  • Four DLP Best Practices To Enhance Security

    Sponsored by: TechTarget Security

    Read this eGuide to learn what is involved with implementing full-blown DLP and how it can help improve the security of your business. Topics covered include best practices for introducing DLP to your business, understanding the relationship between DLP and the cloud, and more.

  • Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist

    Sponsored by: TechTarget Security

    Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.

  • E-Discovery Cloud Considerations

    Sponsored by: Symantec Corporation

    In this expert e-guide, discover key considerations in preparing for a discovery request in the cloud. Learn about the legal requirements for the preservation of evidence, storage duration and cost, and more by clicking through now.

  • De-risking IT Lifecycle Management

    Sponsored by: TechTarget ComputerWeekly.com

    Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.

  • Archiving in the Cloud: Essential Tips and Questions to Answer

    Sponsored by: Symantec Corporation

    Find out why archiving is a logical first step toward the cloud by checking out this expert, exclusive E-Guide, which offers essential tips and 5 questions to answer as you create an archiving strategy for your company. Read on to access more, such as 5 keys of cloud-based archiving for eDiscovery and compliance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.