Regulatory Compliance Research
-
April Essential Guide to Data Protection
Sponsored by: TechTarget SecurityIn this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.
-
February Technical Guide on Cloud Compliance
Sponsored by: TechTarget SecurityIn this month’s Technical Guide from SearchCloudSecurity.com, gain a global perspective of today’s cloud compliance challenges. Explore key topics, including FedRAMP cloud computing standards, cloud security transparency, PCI in the cloud, Cloud Maturity Model (CMM) and more.
-
Cloud IAM: Is it worth the move?
Sponsored by: TechTarget SecurityAs cloud adoption increases, managers are beginning to consider integrating their IAM infrastructure into cloud architectures. In this e-guide, gain expert insight into cloud IAM including how to use a IAM Maturity model to improve IAM strategy, key considerations before moving to a cloud-based service and much more.
-
E-Guide: Steps to securing your file transfers and meeting compliance requirements
Sponsored by: TechTarget SecuritySecurity has become a main issue with the swift way we have started working, making data transfers less safe. Read this expert E-Guide and learn the steps necessary to secure your managed file transfers and meet compliance requirements.
-
E-Guide: Achieving compliance through IAM
Sponsored by: TechTarget SecurityRead this expert E-Guide to learn the best practices for using role management as a tool to meet compliance regulations.
-
How to create an effective data protection strategy for IT compliance
Sponsored by: TechTarget SecurityData protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
-
E-Guide: Balancing compliance with information security threat assessment
Sponsored by: TechTarget SecurityImplementing the rules and regulations of a specific industry can be difficult, making it hard for companies to accomplish the task at hand: being successful. In this expert E-Guide, you will learn that the hassle of compliance is worth it in the long run for your company and can be worked into your everyday culture.
-
Data Protection 101: Essential Steps for Holistic Information Security
Sponsored by: TechTarget SecurityData protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This e-guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
-
E-Guide: Selecting a SIM for midmarket business
Sponsored by: TechTarget SecurityThis expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.
-
Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements
Sponsored by: Oracle CorporationAlthough most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy.
-
Continuous Monitoring: Responding to New Threats in More Complex IT Environments
Sponsored by: Tripwire, Inc.Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.
-
Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World
Sponsored by: Tripwire, Inc.In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data.
-
Counterparty Risk: Are We Leveraging Our Tools?
Sponsored by: Sybase, an SAP companyWhile current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more.
-
Killing Data
Sponsored by: Voltage Security, Inc.Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
-
Balancing compliance with information security threat assessment
Sponsored by: IBMThis expert tip guide will provide you with the necessary tactics to balance compliance and threat management within your company.
-
Non-compliance outweighs the cost of compliance
Sponsored by: IBMEven though compliance has proven to be more of a chore for companies than a pleasant task, the facts show that when companies put the effort into complying, savings occur. Read this expert tip guide and discover why the cost of non-compliance is more than maintaining it.
-
Sharpening the focus on mainframe security
Sponsored by: IBMData breaches are becoming more common, with hackers targeting confidential information, causing losses in profitability, customer confidence and competitive advantage. As a result, mainframe security is under more scrutiny than ever before. Access this tip guide for steps every company can take to ensure the security of their most valuable data.
-
Presentation Transcript: How To Deploy Affordable Two-Factor Authentication Amidst Shrinking Budgets And Growing Data Protection Requirements
Sponsored by: StrikeForce TechnologiesDiscover the most affordable two-factor Out-of-Band authentication platform that addresses the data security challenges organizations face today. Learn how to deploy an authentication platform that will protect the following: remote access (VPN), domain access, website access, application access, risk-mitigation and transaction based environments.
-
Software complexity, integration drive business rules automation adoption trend
Sponsored by: IBMBusiness rules can bring additional insight, transparency and efficiency to case management, provided the approaches are combined and implemented properly. In this Tip Guide, learn how to prepare for and implement rules in case management, and where business rules and case management trends seem to be heading.
-
Building Your Business Case for Managed File Transfer
Sponsored by: OpenTextThe following paper is designed to act as a resource for completing a business report for a Managed File Transfer Solution. The paper will begin by detailing some of the costs associated with traditional methods of file transfer, followed by benefits of having an MFT solution, and some resources for business report writing.
-
Compliance and Risk Management: Factoring compliance as part of your risk management equation
Sponsored by: IBMEnterprises often struggle with integrating IT security and compliance efforts into an overall corporate risk management program. Inside this e-book, learn how to implement effective policies for GRC, audits and much more.
-
Tip Guide: How to make the case for an ERP upgrade
Sponsored by: SAP America, Inc.Delaying necessary upgrades or not taking advantage of innovations for enterprise resource planning (ERP) systems can impede productivity, security and regulatory compliance efforts. In this Tip Guide, ERP veterans discuss making the ERP upgrade business case using arguments that resonate with CEOs and CFOs.
-
Security-In-Depth Using Integrated Risk-Conscious Controls
Sponsored by: Tripwire, Inc.Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.
-
Presentation Transcript: Staying Compliant in the Cloud
Sponsored by: IntelAccess this resource for a detailed outline of the complications involved with meeting regulatory compliance and what your responsibilities are for compliance in a public cloud setting.
-
Governance and control: Focus risk management on multiple levers of control
Sponsored by: IBMWritten by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.