Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Multimedia (View All Report Types)
1 - 25 of 64 Matches Previous Page  |  Next Page
Security and Compliance: From Conundrum to Competitive Advantage
sponsored by 8x8, Inc.
PODCAST: This podcast is all about taking issues surrounding security and compliance and transforming them into competitive advantage. Join Mike McAlpin and Hugh Reese as they help you leverage regulatory law with modern technologies.
Posted: 24 Jun 2015 | Premiered: May 26, 2015

8x8, Inc.

Service Optimization Maturity Assessment
sponsored by TeamQuest Corporation
VIDEO: This brief video explains how service optimization maturity models play a key role in gradually refining optimization efforts. Watch and learn how to optimize without compromising your overall service quality or value.
Posted: 23 Jun 2015 | Premiered: 23 Jun 2015

TeamQuest Corporation

Flip Security and Compliance from a Problem to Competitive Advantage
sponsored by 8x8, Inc.
WEBCAST: This webinar highlights the adverse effects of non-compliance on your organization. Discover how much you'll gain by using a secure, compliant approach guaranteed to meet your requirements
Posted: 23 Jun 2015 | Premiered: Jun 23, 2015

8x8, Inc.

10 Ways to Protect Your Company From a Data Breach
sponsored by Bit9 + Carbon Black
WEBCAST: This webcast presents a 10 step strategy to tightening retail security and maintaining PCI compliance.
Posted: 19 Jun 2015 | Premiered: Apr 4, 2014

Bit9 + Carbon Black

9 Ways to Secure Your Store Systems and Ensure PCI Compliance
sponsored by Bit9 + Carbon Black
WEBCAST: This brief whiteboard video presents 9 best practices to securing store systems to comply with PCI standards.
Posted: 18 Jun 2015 | Premiered: Nov 9, 2012

Bit9 + Carbon Black

Data as currency: Creating information value in the digital age
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: As enterprises strive to find ways to monetize information, they must balance the impulse to exploit their data with security and privacy concerns. In this classroom, we'll explore how organizations can stay on the right side of the law as they extract value from data.
Posted: 15 Jun 2015 | Premiered: 08 Jun 2015

SearchCompliance.com

Managing Threat and Fraud with Predictive Analytics
sponsored by IBM
VIDEO: This brief video encourages a systematic approach to reducing exposure and minimizing negative impact. Start discovering your best defense by analyzing the billions of bits of data in your company.
Posted: 11 Jun 2015 | Premiered: 30 Mar 2015

IBM

Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 04 Jun 2015 | Premiered: 01 Jun 2015

SearchSecurity.com

Harmonize File Sharing in Your Mac/Windows Environment
sponsored by Acronis
TRIAL SOFTWARE: Start your trial download for a file-and-print sharing tool today and mitigate protocol issues, performance, and compatibility problems. Discover three main benefits for Mac users in a Windows environment.
Posted: 29 May 2015 | Premiered: 29 May 2015

Acronis

Digitize and Accelerate Workflows with Electronic Stamp, Watermark and Signature Application
sponsored by Nuance
VIDEO: This brief video demonstrates the process of digitally implementing stamps, watermarks and signatures on important files. Tune in and learn which technologies are appropriate for this endeavor.
Posted: 27 May 2015 | Premiered: 02 Apr 2014

Nuance

PDF Security in Seconds
sponsored by Nuance
VIDEO: In today's business world, redacting information in sensitive documents can consume valuable time and money. This brief video explores how to make your documents, as well as entire folders, more secure in seconds with agile search capabilities. Tune in now and be well on your way to more compliant collaborations.
Posted: 22 May 2015 | Premiered: 02 Apr 2014

Nuance

PDF Protection: Features and Benefits
sponsored by Nuance
VIDEO: PDF files often contain sensitive information about people, organizations, and products that need to be protected before sharing. This brief video explores capabilities that ensure safe PDF sharing. Discover what you may be missing for compliant collaboration.
Posted: 22 May 2015 | Premiered: 02 Apr 2014

Nuance

Case Study: Document Conversion fit for a Law Office
sponsored by Nuance
VIDEO: This brief video features a case study about a law office's deployment of document conversion tools. Discover how administration saved time and money with their new document management strategy, and how to reap the same benefits.
Posted: 14 May 2015 | Premiered: 20 Nov 2013

Nuance

Maximizing the Efficiency of a Loan's Lifecycle
sponsored by Nuance
VIDEO: Manual, paper-based loan processes expose banks to longer delays, errors, and customer attrition. This featured video lays out concerns and strategies to leverage financial institutions' most critical process. Discover the benefits of expediting loans with collaborative technologies.
Posted: 13 May 2015 | Premiered: 23 Mar 2015

Nuance

Endpoint Security Benefits from Web-Based Platforms
sponsored by Absolute Software
WEBCAST: This brief webcasts highlights which features to look for in endpoint security technology. Tune in, and assess whether or not your current strategy has the following capabilities.
Posted: 07 May 2015 | Premiered: May 7, 2015

Absolute Software

CSI Techniques for IT Security
sponsored by Absolute Software
WEBCAST: This webinar illustrates the importance of staying ahead of the curve. Join Lance Mueller, Magnet Forensics' own Director of Forensics, to learn why you should proactively monitor for early signs of an IT security incident.
Posted: 07 May 2015 | Premiered: Jan 3, 2014

Absolute Software

Protect Your Data While Increasing End-User Productivity
sponsored by Absolute Software
WEBCAST: The District of Columbia National Guard (DCNG) once struggled to run inventories on devices and protect against data breaches. Tune in to the following webinar and learn how DCNG was able to improve inventory accountability and save resources.
Posted: 07 May 2015 | Premiered: Apr 8, 2014

Absolute Software

Data Breaches: Technical Options to Avoid Bad Press and Sales
sponsored by Absolute Software
WEBCAST: This webinar features Stephen Treglia, formerly of the Technology Crime Unit in New York, in addition to Geoff Glave, Senior Product Manager at Absolute Software. Join them as they take an in-depth look at technical options to consider that could help you minimize - or even avoid - security breaches.
Posted: 07 May 2015 | Premiered: Jul 22, 2014

Absolute Software

Data Security: Preparing for the Compliance Landscape of Tomorrow
sponsored by Absolute Software
WEBCAST: Data security and data protection laws, such as the proposed change in the EU, promise to completely revolutionize the compliance landscape for many organizations. The following webinar is designed to prepare CISOs and IT professionals today, to manage tomorrow's compliance landscape.
Posted: 07 May 2015 | Premiered: Nov 18, 2014

Absolute Software

Turning Compliance into an Opportunity
sponsored by Hewlett-Packard Limited
VIDEO: Take a look at this video to discover how you can make compliance more efficient and turn regulations into helps instead of hindrances.
Posted: 09 Apr 2015 | Premiered: 09 Apr 2015

Hewlett-Packard Limited

Dealing with Today’s Data Minefield and GRC Challenges
sponsored by Modulo
PODCAST: This podcast delves into the GRC challenges security officers are facing today and actions to overcome them.
Posted: 06 Apr 2015 | Premiered: Mar 11, 2015

Modulo

Automating GRC to Maximize Physical Security ROI
sponsored by Modulo
WEBCAST: This webcast teaches you how to integrate physical security risk management into your automated GRC strategy. View now to uncover how to improve data protection and the several other benefits that await.
Posted: 03 Apr 2015 | Premiered: Mar 4, 2015

Modulo

Automating IT Risk Management
sponsored by Modulo
WEBCAST: This webcast shows you how to reduce GRC complexity and cost through automation.  View now to learn more.
Posted: 03 Apr 2015 | Premiered: Mar 25, 2015

Modulo

Developing a GRC Framework to Enable Automation
sponsored by Modulo
WEBCAST: This webcast examines how bank automated GRC processes to execute risk and compliance assessments. View now to learn how to develop a GRC framework and use autoamtion to facilitate new functions required within GRC.
Posted: 03 Apr 2015 | Premiered: Oct 22, 2014

Modulo

How smart companies are automating their report assembly processes
sponsored by IBM
VIDEO: This webcast identifies key strategies and capabilities for effective multi-author, recurring narrative reporting and disclosure management.
Posted: 11 Feb 2015 | Premiered: 11 Feb 2015

IBM
1 - 25 of 64 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement