Compliance Best Practices Research
-
How to Comply with the HIPAA Security Rule
Sponsored by: Thawte Inc.In this expert guide from SearchHealthIT.com, find out how to comply appropriately with the HIPAA compliance regulations to ensure that your organization doesn't run into unexpected and unneeded complications.
-
Quick Dirty Dozen PCI Compliance Simplified
Sponsored by: AT&T CybersecurityMaintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
-
Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management
Sponsored by: TechTarget SecurityThis E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective.
-
Using EHRs to Achieve Meaningful Use
Sponsored by: TechTarget Health ITAs stage 2 implementation dates loom, providers and industry stakeholders are assessing how well they've integrated certified electronic health records, technology standards and meaningful use stage 1 requirements into healthcare delivery.
-
Where BCDR and GRC Come Together: A CIO's Guide
Sponsored by: EssextecIn this e-guide, our experts from SearchSecurity.com will help you establish better security with this IT disaster preparation and recovery guide for enterprise CIOs.
-
Understanding the Data Management Challenges of Dodd-Frank
Sponsored by: BloombergJoin industry expert Harald Collet in this presentation transcript to learn about new information governance, recordkeeping, and compliance complexities in the age of Dodd-Frank, and find guidance and advice to help you overcome these challenges.
-
Using Predictive Coding to Your E-Discovery Advantage
Sponsored by: TechTarget CIOE-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
-
Cloud-based archiving for e-discovery/compliance: Five "need to knows"
Sponsored by: Hewlett Packard EnterpriseThis expert E-Guide discusses five key questions to answer when evaluating or developing a cloud-based archiving strategy for your business.
-
Information Lifecycle Governance Leader Reference Guide
Sponsored by: IBMStoring data that no longer has any value to the organization is a crippling process that forward-thinking CIOs must begin to shy away from. This white paper provides key insight surrounding the defensible disposal of unnecessary data.
-
May Information Security Magazine
Sponsored by: TechTarget SecurityThis month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
-
PCI Council issues mobile application rules for software developers
Sponsored by: TechTarget SecurityThe Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
-
Enterprise Security: Why you need Effective Log Management
Sponsored by: TechTarget SecurityFor many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
-
CIO Handbook: The Risk Management Approach to Information Governance
Sponsored by: TechTarget SecurityThis handbook provides information governance-related risk management advice for organizations faced with managing and securing corporate data.
-
Cloud Compliance Technical Guide
Sponsored by: TechTarget SecurityCheck out this expert technical guide for a global perspective on emerging cloud compliance issues.
-
Taking a Strategic Approach to Risk Management
Sponsored by: TraceSecurityThis e-guide will provide readers with the understanding they need to address potential security threats and risk mitigation while efficiently utilizing available resources. Topics covered include operational risk, risk management and compliance policies, the risk assessment process, and more.
-
Tips for Creating a HIPAA-Friendly BYOD Policy
Sponsored by: HP & Intel®This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.
-
HIPAA Compliance Takes Patient, Employee and Vendor Followup
Sponsored by: HP & Intel®This e-guide highlights ways health care providers improve their mobile device security in the wake of BYOD initiatives. Inside, learn how you can embrace the consumerization of IT while ensuring your facility remains compliant with HIPAA regulations.
-
How to Manage Secure File Transfers to Meet Compliance Requirements
Sponsored by: IBM and SI ArchitectsThis expert eGuide will help you learn how to maintain a balance between functionality and security when it comes to wide area network (WAN) file transfers. IT expert Dan Sullivan answers questions about WAN management and how to ensure secure transfers.
-
Sustainability: From Strategic Objective to Compliance Operation
Sponsored by: HP & Intel®This e-guide from SearchCompliance.com offers 3 lessons learned regarding compliance departments' responsibility to comply with green initiatives that haven't evolved as quickly as the business has. Inside, learn how to closely monitor compliance operation conditions that affect corporate strategy and balance resources with operational capacity.
-
Put Compliance Management Back into Server Virtualization
Sponsored by: HP & Intel®This e-guide from searchCompliance.com offers expert insight that will help ensure your business remains compliant before, during and after any server virtualization implementation. Read now to learn how you can put compliance management back into server virtualization.
-
Four DLP Best Practices To Enhance Security
Sponsored by: TechTarget SecurityRead this eGuide to learn what is involved with implementing full-blown DLP and how it can help improve the security of your business. Topics covered include best practices for introducing DLP to your business, understanding the relationship between DLP and the cloud, and more.
-
Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
Sponsored by: TechTarget SecurityOrganizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
-
E-Discovery Cloud Considerations
Sponsored by: Symantec CorporationIn this expert e-guide, discover key considerations in preparing for a discovery request in the cloud. Learn about the legal requirements for the preservation of evidence, storage duration and cost, and more by clicking through now.
-
De-risking IT Lifecycle Management
Sponsored by: TechTarget ComputerWeekly.comAnalysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.
-
Archiving in the Cloud: Essential Tips and Questions to Answer
Sponsored by: Symantec CorporationFind out why archiving is a logical first step toward the cloud by checking out this expert, exclusive E-Guide, which offers essential tips and 5 questions to answer as you create an archiving strategy for your company. Read on to access more, such as 5 keys of cloud-based archiving for eDiscovery and compliance.