Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best PracticesReports
151 - 175 of 527 Matches Previous Page  | Next Page
May Information Security Magazine
sponsored by SearchSecurity.com
EZINE: This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
Posted: 29 Apr 2013 | Published: 29 Apr 2013

SearchSecurity.com

Log Management Tightens Data Security, Performance
sponsored by SearchCompliance.com
EBOOK: For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchCompliance.com

Storage Through the Looking Glass
sponsored by ComputerWeekly.com
ANALYST REPORT: This analyst report aims to help you take a much needed step away from the technical detail of storage to create some strategic perspective.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

CIO Handbook: The Risk Management Approach to Information Governance
sponsored by SearchCompliance.com
EBOOK: This handbook provides information governance-related risk management advice for organizations faced with managing and securing corporate data.
Posted: 19 Apr 2013 | Published: 20 Mar 2013

SearchCompliance.com

A Practical Guide to Records Management in the Digital Era
sponsored by Iron Mountain
WHITE PAPER: Making the transition to digital management of paper and electronic records is challenging. Companies can't risk efficiency or accuracy with their data, and may need a more simplified approach during the transition. View this resource to uncover a more practical approach to records management in the digital era.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

Iron Mountain

How to Begin Addressing the Paper-to-Digital Challenge
sponsored by Iron Mountain
WHITE PAPER: View this white paper to learn more about how records management is transitioning into a more digital environment. Enterprises needed to find a solution for the staggering growth of content, and the only way to do so is with an enterprisewide information management soluition that goes beyond storing records.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Iron Mountain

Cloud Compliance Technical Guide
sponsored by SearchCloudSecurity.com
WHITE PAPER: Check out this expert technical guide for a global perspective on emerging cloud compliance issues.
Posted: 02 Apr 2013 | Published: 31 Dec 2012

SearchCloudSecurity.com

Effective print security for SMBs
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

ComputerWeekly.com

Recordkeeping Needs Assessment Case Study: Using the Cloud to Improve Dismal Scores
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom explores the methodology used to conduct an early Generally Accepted Recordkeeping Principles® needs assessment (N.A.), followed by a discussion of how the N.A. led to the selection of a Cloud provider to improve dismal scores.
Posted: 02 Apr 2013 | Premiered: 02 Apr 2013


Magic Quadrant for Security Information and Event Management
sponsored by Hewlett-Packard Company
WHITE PAPER: View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data.
Posted: 01 Apr 2013 | Published: 24 May 2012

Hewlett-Packard Company

Building A Powerful IM Strategy for Large Organizations
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: Large organizations face challenges in identifying and defining requirements for the implementation of information management strategies. This classroom will lead you through Enbridge Inc.'s journey - from understanding business risks and gaining executive support, to elaborating, staffing, and implementing measureable execution techniques.
Posted: 01 Apr 2013 | Premiered: 02 Apr 2013


The E-discovery Ostrich
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights four simple steps that will ensure your organization is ready for e-discovery. Learn what a failure to plan for an e-discovery mandate can really cost your business, and discover why a little foresight can go a long way toward peace of mind.
Posted: 25 Mar 2013 | Published: 25 Mar 2013

Iron Mountain

Health IT 101 Classroom
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: Health IT is an everchanging industry with new HIPAA compliance regulations to consider. This Classroom will answer all your questions on the evolution Health IT, Health Information Exchange, Meaningful Use Stage 2 and more.
Posted: 15 Mar 2013 | Premiered: 20 Mar 2013

SearchHealthIT.com

Healthcare Security Classroom
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: Health IT is an everchanging industry with new HIPAA compliance regulations to consider. As more and more mobile devices are being brought into the hospital networks more security concerns arise. This Classroom will answer all your questions on the evolution mobile Health IT, and the importance of protecting patient data.
Posted: 15 Mar 2013 | Premiered: 20 Mar 2013

SearchHealthIT.com

Intelligent Role Management for Improved Security and Compliance
sponsored by IBM
WHITE PAPER: Uncover why managing user access entitlements and activities is so crucial and learn about an identity and access management solution that will help you improve both security and compliance in your organization.
Posted: 07 Mar 2013 | Published: 31 Jul 2012

IBM

Information governance University--Knowing and Mastering the Rules of the Game Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In the global marketplace, legal teams and compliance managers must be aware of how laws and regulations in different countries and regions address information governance. This session will discuss strategies for identifying rules, creating inventory of rules and successful techniques for measuring execution of those rules.
Posted: 07 Mar 2013 | Premiered: 07 Mar 2013

SearchCompliance.com

Information Governance University: Records Management Strategy, Transparency and Collaboration Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This session discusses expert strategies on simplifying records management
Posted: 06 Mar 2013 | Premiered: 07 Feb 2013

SearchCompliance.com

Effective E-Discovery: Best practices, processes and team building tips
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Research shows that general counsels are frustrated by lack of control, collaboration and communication regarding e-discovery processes. This classroom will focus on ways to optimize communication, get team members on the same page, and how to better leverage and integrate IT into the e-discovery process.
Posted: 06 Mar 2013 | Premiered: 07 Mar 2013

SearchCompliance.com

Information Governance University: Archive Information governance models, measurement and program success Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This session discusses planning and measuring strategies for successful information governance.
Posted: 06 Mar 2013 | Premiered: 07 Mar 2013

SearchCompliance.com

Information Governance Online Symposium
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Since corporate data is one of an organization's most valuable assets, it only makes sense to implement an information governance policy. By doing so, IT leaders can reduce legal risks and increase the ability to be more agile. Enter this online learning environment in order to gain information governance advice from several industry experts.
Posted: 06 Mar 2013 | Premiered: 07 Mar 2013

SearchCompliance.com

Total Quality Assurance for Businesses with a Global Business Plan
sponsored by IFS
WHITE PAPER: Establishing a business that is competitive on a global spectrum can be challenging. View this white paper to learn more about how you can deploy a complete quality assurance package that provides the support your business needs. It outlines what you should be looking for in a source so you can be certain you've made the right selection.
Posted: 18 Feb 2013 | Published: 18 Feb 2013

IFS

PCI Council issues mobile application rules for software developers
sponsored by Hewlett-Packard Company
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Hewlett-Packard Company

Taking a Strategic Approach to Risk Management
sponsored by TraceSecurity
EGUIDE: This e-guide will provide readers with the understanding they need to address potential security threats and risk mitigation while efficiently utilizing available resources. Topics covered include operational risk, risk management and compliance policies, the risk assessment process, and more.
Posted: 28 Dec 2012 | Published: 28 Dec 2012

TraceSecurity

Tips for Creating a HIPAA-Friendly BYOD Policy
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

HP & Intel®

HIPAA Compliance Takes Patient, Employee and Vendor Followup
sponsored by HP & Intel®
EGUIDE: This e-guide highlights ways health care providers improve their mobile device security in the wake of BYOD initiatives. Inside, learn how you can embrace the consumerization of IT while ensuring your facility remains compliant with HIPAA regulations.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

HP & Intel®
151 - 175 of 527 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement