Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Multimedia (View All Report Types)
1 - 25 of 44 Matches Previous Page  |  Next Page
Data Access Governance Solutions Demo
sponsored by STEALTHbits
PRODUCT DEMO: StealthAUDIT for DAG is an auditing, compliance, and governance framework for unstructured data and critical applications that provides comprehensive data collection, analysis, remediation workflows, and reporting. Click on the download now button to request a live demonstration of the Data Access Governance solutions.
Posted: 28 Sep 2016 | Premiered: 28 Sep 2016


Expense Management: Flexible Systems for More Efficiency and Compliance Capabilities
sponsored by Infor
VIDEO: This video explores how Raymond James Financial implemented expense management, enabled flexibility, and enhanced compliance capabilities. Find out how they improved reporting, sped up turnaround on payment and expense reports, eliminated manual routing and exception reporting, and more.
Posted: 12 Aug 2016 | Premiered: 12 Aug 2016


Cyber Security Awareness with PolicyTech
sponsored by Navex Global
VIDEO: Learn how to save time and money in training employees while ensuring your organization meets legal and regulatory requirements. Access now to discover more about why distributing your security policy has never been easier.
Posted: 29 Jul 2016 | Premiered: 01 Jun 2016

Navex Global

Oracle Compliance: Challenges and Solutions
sponsored by Matrix42
WEBCAST: This question-and-answer video features advice for complying with Oracle database licensing challenges that are becoming more common. Find out the best way to get relevant information from your Oracle instances to properly prepare for audits.
Posted: 14 Jul 2016 | Premiered: Jul 14, 2016


Big data business intelligence
sponsored by
VIRTUAL ENVIRONMENT: The ability to access, analyze and extract information assets more efficiently than the competition has become a vital business driver in the big data age. In this classroom, learn how to use information governance to draw business value and intelligence from big data.
Posted: 29 Jun 2016 | Premiered: 16 May 2016

Beyond the Perimeter: Protecting your Network
sponsored by IBM MaaS360
WEBCAST: Learn how to protect your network beyond the perimeter defenses and securely integrate mobile access to company data. Watch this webinar to learn what considerations you need to account for when planning your network security strategy, especially when it comes to employee mobile devices.
Posted: 31 May 2016 | Premiered: May 25, 2016

IBM MaaS360

How HealthEast Care System Achieved EPCS Success
sponsored by Imprivata
VIDEO: In this short video, hear from key IT and clinical decision makers at HealthEast Care System as they describe how they achieved an efficient way to safely and securely electronically prescribe controlled substances.
Posted: 25 Mar 2016 | Premiered: 29 Feb 2016


Webinar & Demo: How to Manage SAP Licenses More Efficiently
sponsored by Snow Software
WEBCAST: In this webinar, you'll learn how to optimize your SAP landscape from a technical perspective. Tune in now and learn about technologies that collect, aggregate and analyze SAP usage data with complementary software asset management tools.
Posted: 24 Feb 2016 | Premiered: Jun 12, 2015

Snow Software

Stay in Compliance: Clinical Standards Data Management
sponsored by Cambridge Semantics
VIDEO: In this short video explore the capabilities clinical data standards management systems, and discover how your organization can stay in compliance come December 2016.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Cambridge Semantics

How to Simplify PCI DSS Compliance with AlienVault USM
sponsored by AlienVault
WEBCAST: In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.
Posted: 31 Jul 2015 | Premiered: Jul 2, 2015


Information Governance Symposium: Leverage predictive coding, analytics tech for information governance
sponsored by
VIRTUAL ENVIRONMENT: Corporate data is one of an organization's most valuable assets, making a comprehensive information governance policy vital to bottom line success. Enter this interactive, online learning environment to gain information governance advice from several industry experts.
Posted: 28 Jan 2014 | Premiered: 31 Jan 2014

Information Governance Symposium: Information Governance Best Practices
sponsored by
VIRTUAL ENVIRONMENT: In this classroom, learn tips and strategies to incorporate information governance into everyday businesses processes, including best practices to implement company-wide data management policies and metrics to help measure the success of information governance efforts.
Posted: 24 Oct 2013 | Premiered: 05 Nov 2013

Health IT 101 Classroom
sponsored by
VIRTUAL ENVIRONMENT: Health IT is an everchanging industry with new HIPAA compliance regulations to consider. This Classroom will answer all your questions on the evolution Health IT, Health Information Exchange, Meaningful Use Stage 2 and more.
Posted: 15 Mar 2013 | Premiered: 20 Mar 2013

Medical Device Security – How to Protect Data in a Connected World
sponsored by Coalfire
WEBCAST: In this webinar, you'll learn what medical device manufacturers are doing, or not doing, to embed security into devices, and find out about best practices that healthcare providers can implement to increase data security.
Posted: 02 Jun 2016 | Premiered: Dec 8, 2015


How smart companies are automating their report assembly processes
sponsored by IBM
VIDEO: This webcast identifies key strategies and capabilities for effective multi-author, recurring narrative reporting and disclosure management.
Posted: 11 Feb 2015 | Premiered: 11 Feb 2015


Achieving Data Security and Compliance in the Healthcare Industry
sponsored by IBM
VIDEO: In this video, Mark Starry, Director of Enterprise Architecture and Security at Capital Region Health Care in central New Hampshire, discusses the technology they leveraged to achieve total network visibility and cost-effectively achieve compliance with security requirements.
Posted: 30 Jan 2015 | Premiered: 11 Jul 2012


Enterprise Vault Archiving Overview
sponsored by Symantec Corporation
VIDEO: This video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.
Posted: 02 Jun 2014 | Premiered: 02 Jun 2014

Symantec Corporation

Best practices in managing requirements in Energy and Utilities industries
sponsored by IBM
WEBCAST: This webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.
Posted: 27 Mar 2014 | Premiered: May 31, 2013


PST Archiving: Your Employees' Dirty Little Secret
sponsored by Commvault
WEBCAST: This webcast provides you with a background on PST data, the risks relating to it, and an archiving solution that efficiently and effectively manages these files.
Posted: 06 Mar 2014 | Premiered: Jan 23, 2014


PCI DSS v3.0: How to Adapt your Compliance Strategy
sponsored by AlienVault
WEBCAST: With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.
Posted: 20 Dec 2013 | Premiered: Dec 20, 2013


Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute
WEBCAST: The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
Posted: 11 Nov 2013 | Premiered: Nov 11, 2013


Security University: GRC Classroom
sponsored by
VIRTUAL ENVIRONMENT: GRC is essential to all businesses. But considering its importance and breadth, coupled with the transformative nature of compliance regulations, GRC management can be daunting. This classroom will explore: GRC solutions for various stages; Questions to ask when considering a purchase; Vendor insights on achieving comprehensive GRC plans
Posted: 27 Sep 2013 | Premiered: 05 Jul 2013

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 03 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013


CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

1 - 25 of 44 Matches Previous Page    1 2    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement