Regulatory Compliance Research
-
Eguide: Top 10 risks in cloud computing and how to stay compliant
Sponsored by: TechTarget SecurityTransitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing.
-
E-Guide: Are 'strong authentication' methods strong enough for compliance?
Sponsored by: TechTarget SecurityAlthough strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.
-
E-Guide: Shortcut guide to Web application firewall deployment
Sponsored by: TechTarget SecurityBefore purchasing a Web application firewall (WAF), there are several factors all organizations must consider. This expert tip offers advice on how to pick a WAF that best fits your organization and lays out the steps for successful deployment.
-
E-Guide: Using web application firewalls to ease compliance efforts
Sponsored by: TechTarget SecurityWhen properly maintained, Web application firewalls help organizations ease PCI management and compliance obligations. This expert guide highlights the various compliance benefits WAF provide and explains how they can also be used to protect against both common and emerging threats.
-
Compliance Frameworks That Enhance e-Discovery Effectiveness
Sponsored by: AXS-One, a Daegis CompanyThe threat of e-discovery is a dark cloud hovering over an enterprise. These projects require an excess of effort and money – and requests are often made with no prior notice. Thankfully, records management can alleviate the pain of e-discovery. This e-guide provides a high-level view of records management in the workplace.
-
Securing the Cloud for the Enterprise
Sponsored by: Symantec CorporationDespite the many the benefits of the cloud, one key challenge still remains a concern – Security. View this paper as it explores the security challenges of the cloud and offers key principles that can help address the security and compliance concerns in an evolving threat and compliance landscape.
-
SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program Part 2
Sponsored by: IBMThis expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.
-
SearchSecurity.com E-Guide: Balancing compliance with information security threat assessment
Sponsored by: IBMWhile compliance regulations and standards have improved information security, they have also created unique challenges when it comes to adequately securing the organization. This expert tip offers authoritative, technical advice on how to balance compliance with your information security threat assessment.
-
Iron Mountain EMR Scanning Survey Report
Sponsored by: Iron Mountain70% of hospitals expect to meet EHR meaningful use guidelines this year. Yet, 78% expect to continue to treat patients using paper records for up to 5 more years despite the financial incentive for meeting these requirements. Inside this white paper, learn how your peers are transitioning to an EHR system.
-
Best practices for utilising SharePoint e-discovery capabilities
Sponsored by: Dell SoftwareIn this expert e-guide, discover how SharePoint 2010 can simplify e-discovery for your organisation. Plus, learn how to sell a governance plan to management by reminding them of the benefits.
-
SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools
Sponsored by: IBMAuditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.
-
SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program
Sponsored by: IBMThis expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.
-
SearchSecurity.com E-Guide: Defining an acceptable level of risk for the organization
Sponsored by: IBMDefining an acceptable level of risk for the organization is no easy task. Learn how threat profiles and business drivers can be used to determine an appropriate level of risk for the organization in this expert tip. In addition, find out how to perform an accurate enterprise security risk analysis.
-
SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes
Sponsored by: IBMThis expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.
-
Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector
Sponsored by: Dell SecureWorksDell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.
-
Presentation Transcript: Has Your QSA Thrown You Under a Bus?
Sponsored by: Dell SecureWorksAfter working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.
-
Presentation Transcript: Vulnerability Scanning and Compliance
Sponsored by: Dell SecureWorksIn this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.
-
Leveraging XBRL for Value in Organizations
Sponsored by: ISACAThis white paper was developed jointly by ISACA and IFAC, providing guidance on how to leverage value from XBRL initiatives and compliance requirements, with examples and case studies included.
-
Technical Guide on SIM
Sponsored by: TechTarget SecuritySecurity information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance.
-
August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders
Sponsored by: Information Security MagazineThis month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market.
-
Minimize your financial institution’s risk with solutions from IBM
Sponsored by: IBMOrganisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.
-
Electronic Health Records: From Evaluation to Implementation
Sponsored by: DellEMC and Intel®With the enactment of the American Recovery & Reinvestment Act (ARRA), healthcare facilities can receive reimbursement for early adoption of Electronic Health Records (EHRs). However, late EHR adopters will be penalized through decreased Medicare and Medicaid reimbursements. Learn how ARRA could impact your healthcare facility.
-
E-Guide: 10+ Tips on Building a Strong Records Management/Data Retention Policy
Sponsored by: StoredIQIs your company in line with e-discovery requests? This expert E-Guide provides a crash course on everything e-discovery by outlining 10 steps to building a records retention management system and also discusses three main objectives in developing an electronic data retention policy.
-
Choosing a Cloud Provider with Confidence
Sponsored by: GeoTrust, Inc.In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.
-
Enabling Continuous Compliance Across the Enterprise
Sponsored by: IBMToday's innovative enterprises are transforming compliance into a continuous action that is woven into the fabric of both their IT security and business environments. Learn how this transformation can significantly improve compliance results with fewer resources, while providing valuable insights to drive strategic business decisions.