Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
51 - 75 of 638 Matches Previous Page  |  Next Page
How to Determine Proper Protocol for ROT
sponsored by Iron Mountain
WHITE PAPER: This white paper offers recommendations for consolidating your Redundant, Obsolete and Trivial content (ROT.) Learn the importance of deleting electronic records after suitable retention periods, and how doing so yields multiple benefits.
Posted: 19 Apr 2015 | Published: 31 Dec 2014

Iron Mountain

Implementing a Proactive Strategy For Data Security
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to implement a proactive data security strategy using a 5 step approach. Access now and discover how to overcome data security struggles and use people and processes to enhance technology solutions.
Posted: 17 Apr 2015 | Published: 17 Sep 2014

IBM

Addressing HACCP Issues Within the Food and Beverage Industry Using ERP Software
sponsored by IFS
WHITE PAPER: Learn how your organization can put in place a system to comply with HACCP guidelines in this white paper. Uncover the importance of an effective ERP system in compliance for the purposes of gathering, tracking, and reporting functionality.
Posted: 17 Apr 2015 | Published: 17 Apr 2015

IFS

Data Breach Risk Calculator
sponsored by IBM
RESOURCE: This brief infographic details how to calculate the cost of a breach by using such factors as your location and your industry.  View now to learn the story behind the numbers.
Posted: 17 Apr 2015 | Published: 30 Dec 2014

IBM

Could HIPAA Make Criminals Out of People You Know?
sponsored by 8x8, Inc.
WHITE PAPER: This white paper teaches you how to evaluate telecom providers for storing important data such as faxes, voicemail, and other PHI. View now to learn when to trust an organization as an associate and when to realize red flags are being raised.
Posted: 17 Apr 2015 | Published: 18 Aug 2014

8x8, Inc.

Records management strategies to maintain regulatory compliance
sponsored by SearchCompliance.com
EBOOK: Data governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.
Posted: 16 Apr 2015 | Published: 16 Apr 2015

SearchCompliance.com

Mobile Management Compliance Checklist in Financial Services
sponsored by BlackBerry
WHITE PAPER: This white paper provides you with the essential questions to ask when evaluating an EMM solution and how to ensure compliance.
Posted: 14 Apr 2015 | Published: 04 Dec 2014

BlackBerry

Internet System for Tracking Over-Prescribing (I-Stop) FAQ
sponsored by Imprivata
WHITE PAPER: Access this white paper to find out about frequently asked questions regarding software that tracks over-prescribing. Read on to learn more about the laws and regulations, software and data requirements, and more.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Imprivata

Researchers Confirm: Collaboration Strategies Bring a "Suite" of Solutions
sponsored by Microsoft
WHITE PAPER: Decision-makers won't want to miss this study on the effects of pragmatic teamwork solutions. Access now, and better understand the benefits, costs, and risks associated with a collaboration implementation. Business technology consultants have laid out quantifiable assets to be gained, inclusive of several key business areas.
Posted: 10 Apr 2015 | Published: 31 Oct 2014

Microsoft

Improving PHI Security Through Better HIPAA Compliance
sponsored by Bit9 + Carbon Black
EGUIDE: This white paper catches you up to speed with the latest HIPAA changes impacting security measures and offers practical steps to take to improve your security and compliance strategy.
Posted: 10 Apr 2015 | Published: 06 Nov 2014

Bit9 + Carbon Black

5 Steps to Reduce the Complexity of PCI Security Assessments
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper outlines the 5 steps to achieving PCI compliance and security harmony.  View now to learn more.
Posted: 10 Apr 2015 | Published: 06 Oct 2014

Bit9 + Carbon Black

Turning Compliance into an Opportunity
sponsored by Hewlett-Packard Limited
VIDEO: Take a look at this video to discover how you can make compliance more efficient and turn regulations into helps instead of hindrances.
Posted: 09 Apr 2015 | Premiered: 09 Apr 2015

Hewlett-Packard Limited

An IT Auditor's Guide to Security Controls & Risk Compliance
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper provides a framework for simplifying compliance enforcement and audits through six key policy controls.  Access now to learn how to achieve compliance harmony.
Posted: 09 Apr 2015 | Published: 05 Nov 2014

Bit9 + Carbon Black

Top 10 Measurement and Planning Mistakes and How to Avoid Them
sponsored by Information Builders
WHITE PAPER: Access this white paper to review the 10 most common planning and measurement errors that businesses commit. In addition to examining these blunders, discover real-world examples of how an enterprise can avoid or correct them. Learn strategic solutions, such as setting sensible goals.
Posted: 08 Apr 2015 | Published: 31 Dec 2014

Information Builders

A Quick Guide to EPCS
sponsored by Imprivata
WHITE PAPER: This white paper outlines how to put EPCS efforts and planning into action and what to include in your compliance strategy.
Posted: 08 Apr 2015 | Published: 05 Nov 2014

Imprivata

Conquering Global Financial Management with IQMS
sponsored by IQMS
CASE STUDY: When Poly-Cast needed to master the complex Chinese tax codes to expand their business in the PRC they turned to one financial management software that helped them maintain tax standards in the demanding company. Read on to find out what method Poly-Cast chose to handle their financial needs.
Posted: 07 Apr 2015 | Published: 07 Apr 2015

IQMS

Gartner's Magic Quadrant for IT Risk Management 2015
sponsored by Modulo
WHITE PAPER: This white paper examines the strengths and weaknesses of several ITRM platforms and provides insight into the market. View now to uncover the need to know facts about ITRM and how to choose the platform right for your organization.
Posted: 06 Apr 2015 | Published: 10 Mar 2015

Modulo

Dealing with Today’s Data Minefield and GRC Challenges
sponsored by Modulo
PODCAST: This podcast delves into the GRC challenges security officers are facing today and actions to overcome them.
Posted: 06 Apr 2015 | Premiered: Mar 11, 2015

Modulo

Data Analytics Security Platform Buyer's Guide
sponsored by HP Security Voltage
WHITE PAPER: This white paper explores how to protect your data to stay compliant with today's stringent healthcare regulations. Read on to learn more
Posted: 03 Apr 2015 | Published: 19 Nov 2014

HP Security Voltage

Automating GRC to Maximize Physical Security ROI
sponsored by Modulo
WEBCAST: This webcast teaches you how to integrate physical security risk management into your automated GRC strategy. View now to uncover how to improve data protection and the several other benefits that await.
Posted: 03 Apr 2015 | Premiered: Mar 4, 2015

Modulo

Automating IT Risk Management
sponsored by Modulo
WEBCAST: This webcast shows you how to reduce GRC complexity and cost through automation.  View now to learn more.
Posted: 03 Apr 2015 | Premiered: Mar 25, 2015

Modulo

Developing a GRC Framework to Enable Automation
sponsored by Modulo
WEBCAST: This webcast examines how bank automated GRC processes to execute risk and compliance assessments. View now to learn how to develop a GRC framework and use autoamtion to facilitate new functions required within GRC.
Posted: 03 Apr 2015 | Premiered: Oct 22, 2014

Modulo

Can Automating GRC Simplify Risk Management?
sponsored by Modulo
CASE STUDY: This case study walks you through how Yale New Haven Health System moved away from manual GRC approaches and reduced the amount of resources necessary to oversee operations. View now to learn if the strategy they chose is right for your organization.
Posted: 03 Apr 2015 | Published: 25 Feb 2015

Modulo

Improving Supply Chain Security for Better Business Governance
sponsored by Modulo
WHITE PAPER: This white paper outlines how governance, risk, and compliance management can provide a sound structure for threat mitigation.
Posted: 02 Apr 2015 | Published: 28 Jan 2015

Modulo

Streamlining Information Protection Through a Data-centric Security Approach
sponsored by HP Security Voltage
WHITE PAPER: This resource introduces a new strategy that combines data encryption and masking to simplify privacy management and mitigate leakage. View now to learn the five step plan to successful production data protection.
Posted: 02 Apr 2015 | Published: 02 May 2013

HP Security Voltage
51 - 75 of 638 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement