ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance Best Practices Research

  • A Computer Weekly buyer’s guide to compliance, risk and governance

    Sponsored by: TechTarget ComputerWeekly.com

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

  • State of GDPR in mainland Europe

    Sponsored by: TechTarget ComputerWeekly.com

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

  • Government insists 'nothing sinister' about web user data gathering

    Sponsored by: TechTarget ComputerWeekly.com

    Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.

  • Boost Compliance in Accounting with AI

    Sponsored by: ServiceNow

    View this e-guide to learn how accounting and finance teams can improve productivity, maintain compliance, and boost fraud protection through the incorporation of AI-based systems.

  • Preparing for Personal Data Privacy Policies

    Sponsored by: Micro Focus

    As data privacy laws continue to be established, the relationship that individuals have with companies has changed. No longer are companies free to just collect data and do whatever they please; they now effectively become stewards of the data. In this e-guide, discover how organizations can better manage personal data.

  • Managing Customer Data in the GDPR Era

    Sponsored by: GearsDesign

    Download this expert guide to learn more about why enterprises need to train agents on how to properly process incoming customer requests to delete or reduce customer data, while maintaining GDPR compliance.

  • GETTING GDPR RIGHT

    Sponsored by: Attunity

    Today's businesses can no longer treat customer privacy as an afterthought. Without a singular mandated solution, companies need to create the right GDPR roadmap. Download this white paper to learn more.

  • GDPR Data Protection Edicts Make Good Data Governance a Must

    Sponsored by: TechTarget Data Management

    Without the necessary governance controls, as mandated by GDPR, data can be a source of risk rather than value. Read this e-guide for advice on how to make the best out of compliance standards and protect your company from liability.

  • Get your Content Management System GDPR-Ready

    Sponsored by: Box

    In this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system.

  • GDPR Breach Notification Rule Could Complicate Compliance

    Sponsored by: Lepide Software

    Find out what GDPR compliance will entail, and what you can do to avoid the massive fine for failure to comply. Then, explore how the regulation's "breach notification rule" will prompt not just European companies, but those based in the US as well, to more promptly report a data breach.

  • EU GDPR Compliance Puts Focus on Data Tracking, Encryption

    Sponsored by: Ivanti

    In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.

  • Exploring Five GDPR Compliance Myths

    Sponsored by: Avnet

    The General Data Protection Regulation (GDPR) comes into force in May 2018, and there are a few misconceptions surrounding this legislation. This e-guide explores 5 common myths surrounding GDPR to help you prepare for the deadline.

  • EU GDPR Compliance puts Focus on Data Tracking, Encryption

    Sponsored by: The Media Trust

    GDPR compliance is mandatory by May 25, 2018. Discover how encryption will be an overlooked but key part in compliance, as well as how to reduce risk by avoiding keeping more personal data than is necessary for business/legal needs.

  • GDPR: The Race is on for Compliance

    Sponsored by: Dell SecureWorks

    Learn if your organization is ready to ensure its compliance to the GDPR and what you need to know to take it seriously.

  • GDPR Developments Will Dominate Storage and Compliance in 2017

    Sponsored by: Arrow + NetApp

    In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.

  • SAM Specialists Facing Challenges Covering All the Bases

    Sponsored by: Flexera Software

    According to a recent survey, only 29% of firms are currently monitoring their application use. This is staggeringly low in a time when traditional and cloud environments are used to host applications. Access this eGuide to learn how your Software Asset Management solution most evolve to cover any potential gaps.

  • Records Management Strategies to Maintain Regulatory Compliance

    Sponsored by: TechTarget Security

    Data governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.

  • The Current State of Blockchain Compliance

    Sponsored by: BAE Systems Applied Intelligence

    In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.

  • How IAM Can Address Unstructured Content Security Risks

    Sponsored by: IBM

    In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.

  • Building an Unstructured Data Protection Program

    Sponsored by: STEALTHbits

    In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.

  • Cloud Services Take Off, GRC Doesn't

    Sponsored by: TechTarget Security

    The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.

  • Healthcare CIOs Address Cybersecurity Vulnerabilities

    Sponsored by: Optum

    As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.

  • Drawing Business Value from GRC Analytics

    Sponsored by: TechTarget Security

    In this handbook, learn how companies are drawing business value from GRC analytics data and developing strategies to incorporate analytics best practices that benefit company-wide business processes.

  • How to Keep Cloud Services Compliant with HIPAA Standards

    Sponsored by: Actiance

    In this expert e-guide, health IT consultant Reda Chouffani explores how your healthcare organization can keep cloud services compliant with HIPAA standards.

  • Protecting Patient Data in the Mobile Era

    Sponsored by: TechTarget Health IT

    The rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.