ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance Software Research

  • Complying with Data Protection Law in a Changing World

    Sponsored by: Forcepoint

    Watch this webcast to learn some of the best strategies for answering compliance questionnaires, and some common compliance themes that span many regulations. Then, take a deep-dive into article 5 of the GDPR, and learn how you can improve your data breach monitoring and identification procedure.

  • Simplify GDPR readiness with IBM Cloud Secure Virtualization

    Sponsored by: IBM

    Watch this webcast as IT leaders from 3 global organizations explore the requirements and ramifications of GDPR compliance. Then, learn about how one cloud provider partnered with 2 other technologies to deliver protection for virtual workloads down to the VM level and ensure that the penalties of the GDPR never land at your doorstep.

  • Clear Data Mapping Starts in The Cloud

    Sponsored by: IBM

    This white paper outlines how a multi-cloud SaaS approach can help grant you the visibility needed for GDPR compliance. Click inside to learn 3 steps to GDPR readiness that are boosted by a multi-cloud environment.

  • Stride Towards GDPR Compliance with Confidence

    Sponsored by: IBM

    In this white paper, learn about the GDPR's concept of data control and processing, as well as the importance of the EU Cloud Code of Conduct for meeting the regulation's strict requirements. Discover how to engage with these processes early, and set your organization up to easily comply with the regulation's guidelines.

  • Why ISO/IEC 27001 Compliance is Impossible without Privileged Management

    Sponsored by: One Identity

    Access this white paper to learn how privileged access management is critical to ISO/IEC 27001 compliance to establish, implement, maintain, assess and continually improve a robust information security management system (ISMS).

  • Achieve Effective PCI Compliance by Automating Required Controls and Processes

    Sponsored by: Skybox Security

    Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.

  • Enabling and Securing Digital Transformation

    Sponsored by: CA Technologies

    Read this white paper to learn the specific challenges facing your organizations security capabilities and what's at stake. Then, evaluate how a comprehensive identity and access management system can help you minimize the threats to your environments.

  • The General Data Protection Regulation: Key Themes and Challenges

    Sponsored by: Forcepoint

    Read this white paper to explore 3 major misconceptions about the GDPR, and uncover 5 key steps to help your organization perform a basic assessment of its data protection capabilities. Then, discover an approach that can help you get in line with the GDPR in 3 core areas.

  • How to Combat the Compliance Triple Threat in the Food & Beverage Industry

    Sponsored by: IFS

    Explore how an ERP system can help food and beverage companies remain compliant with clear processes and procedures, and equipment maintenance and scheduling.

  • GDPR Requirements for Data Masking

    Sponsored by: Delphix

    This white paper examines GDPR requirements and why the EU GDPR strongly incentivizes the pseudonymisation of all personal data.

  • Care Redesign: A Blueprint for Change How to Lower Costs and Improve Patient Outcomes

    Sponsored by: HealthEdge

    Learn how payers can best integrate with providers to better care for members, as well as 10 critical trends from Healthcare Executive Group.

  • Payers — Get Ready for What's Next with Payment Reform

    Sponsored by: HealthEdge

    Learn more about the payment reform as the shift from fee-for-service reimbursement model changes to a value-based reimbursement model. Learn more about why data collection and analytics are important.

  • A Day in the Life of a GDPR Breach

    Sponsored by: Splunk

    This webcast outlines what the GDPR entails, as well as outlines a basic guide for what will happen, and what you should do to mitigate the damage done by a GDPR breach.

  • The Race to Meet GDPR Compliance

    Sponsored by: HyTrust

    No matter where you are in the world, if you do business within the EU, you need to be prepared for GDPR compliance. This white paper provides an overview of the GDPR so you can get ready.

  • Guide To PCI Compliance For Containers

    Sponsored by: Twistlock, Inc.

    Inside this guide, learn how to meet PCI compliance for containers. Uncover the core compliance requirements and key configuration strategies to address them.

  • Symantec GDPR

    Sponsored by: Symantec

    With severe financial penalties for GDPR non-compliance, enterprises can't just plan to afford to pay the fine. Discover what your organization needs to help prepare for the GDPR in May 2018.

  • Compliance: The 'Privacy By Design' Approach To Secure Personal Data

    Sponsored by: Symantec

    Learn how implementing security best practices with "Privacy by Design" built-in will make businesses more prepared while reducing risks and costs. Plus, discover 6 recommendations for organizations that have to comply with GDPR.

  • How this Large North American Retail Chain Achieves Compliance, Minimizes Risk, and Mitigates Threats

    Sponsored by: Rapid7

    In this case study, learn how, by adopting this vulnerability scanning system this North American retail chain's IT team able to go beyond compliance assessments to get actionable security information, and more.

  • Compliance Survey: Your Guide to What Experts are Saying

    Sponsored by: Chef Software

    Access this survey report now to learn how to mitigate the struggles faced when companies assess compliance or attempt to fix a compliance violation or security vulnerability, what priorities to set when attempting continuous improvement on overall security and performance, and more.

  • Financial markets regulatory outlook 2017

    Sponsored by: ComputerWeekly.com

    Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.

  • Connect Operations Across Your Food and Beverage Enterprise

    Sponsored by: Sage Software

    Discover a tool designed to meet the needs of those in the food and beverage industry but can be adopted for any business. It brings together all of your critical data—reducing the inefficiencies of running discrete supply chain, manufacturing, and financial systems. Then, read on to learn how 4 companies improved their global operations.

  • The Australian Privacy Amendment Explored

    Sponsored by: Rapid7

    Australia's new privacy amendment, which was set into place in 2016, requires many companies to report any data breach to the government. This resource outlines a proactive approach that can help you get on top of this, and any other data privacy laws.

  • The Current State of Blockchain Compliance

    Sponsored by: BAE Systems Applied Intelligence

    In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.

  • Neurosurgery Leader Improves Efficiency, Compliance And Security

    Sponsored by: RES Software

    Discover how Carolina Neurosurgery & Spine Associates (CNSA) adopted a digital workspace program that allowed them to not only improve their security, but also the effectiveness of their IT as a whole. Discover how they were able to increase clinician efficiency, reduce the risk of non-compliance, and improve cybersecurity.

  • Compliance - The New Hot Button for CIOs

    Sponsored by: VMware

    This informational white paper identifies the main purpose of compliance regulations, some of the risks that accompany enterprises who fail compliance audits, and reviews the best practices to ensure you have the right partner to meet your compliance requirements.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.