Regulations Research
-
Information Security Magazine - February 2010: Under Control
Sponsored by: Information Security MagazineFeature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more.
-
Presentation Transcript: Getting Set for e-Discovery
Sponsored by: Symantec CorporationIn this presentation transcript, expert Michael A. Clark, Managing Director for EDDix LLC, highlights eDiscovery and offers insight for preparing your company for litigation.
-
NERC: What You Need to Know
Sponsored by: TechTarget SecurityThe North American Electric Reliability Corporation's regulations aim to protect the nation's vulnerable critical infrastructure. Read this E-Book to find out what responsible entities need to do to comply with the NERC.
-
Essential Guide to PCI DSS
Sponsored by: Information Security MagazineThis E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
-
The Path to IFRS Conversion: Considerations for the banking and capital markets industry
Sponsored by: DeloitteAs acceptance of IFRS in the United States becomes imminent, more banks and capital markets institutions are asking key questions: How does IFRS affect my institution? What events would influence my institution's pace of IFRS adoption? What obstacles might we need to consider? Read this paper to learn the answers to these questions and more.
-
PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
Sponsored by: Tripwire, Inc.What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.
-
SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
Sponsored by: Tripwire, Inc.SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements.
-
The Massachusetts Data Protection Law
Sponsored by: TechTarget SecurityMassachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
-
Meeting Compliance Objectives in SharePoint®
Sponsored by: AvePoint, Inc.This document is intended to aid IT administrators and other stakeholders responsible for managing SharePoint deployments, in planning and implementing a comprehensive, reliable, and efficient compliance strategy appropriate to their organizational needs.
-
eBook: Compliance for the Midmarket: Governance, Risk and Technology
Sponsored by: TechTarget CIORead this E-book to learn about how you can take a proactive approach to regulatory compliance. Rather than waste time and resources tackling one regulation at a time, find out how companies are looking at the big picture and forming security strategies based on their needs. Sponsored By: Imperva and StoredIQ
-
Laws, regulations and compliance: Top tips for keeping your data under your control
Sponsored by: SophosThis paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
-
The Top 12 Most Difficult Active Directory Management Tasks
Sponsored by: Dell SoftwareThis paper explains the top 12 Most Difficult Active Directory Management Tasks and provides solution for making them easier.
-
Becoming Value-driven: Focusing on What Matters Most
Sponsored by: IBMThis white paper provides insight into the six key areas essential for becoming a value-driven organization. Discover how to gain the visibility and control essential to meet and exceed customer needs.
-
Expert Ebook: Mastering PCI
Sponsored by: Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and UtimacoThis eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
-
Total Economic Impact Of Oracle Enterprise Content Management Suite
Sponsored by: Oracle CorporationThis whitepaper examines the financial impact and potential ROI on companies who use OracleEnterprise Content Management Suite. It provides companies with the ability to easily manage, reuse, and retain content and to streamline related business processes
-
Assuring Asset Documentation Integrity
Sponsored by: McLaren SoftwareIn this whitepaper, we will discuss best practices for assuring the integrity of your asset documentation.
-
Pervasive Data Profiler v4
Sponsored by: Pervasive IntegrationPervasive Data Profiler™ ensures data quality. Proactively audit all types of data; automate testing against changing business data quality needs and compliance regulations. Get hyper-fast, multithreaded processing of large data sets or sample data
-
Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
Sponsored by: VeriSign, IncThe drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.