Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
76 - 100 of 643 Matches Previous Page  |  Next Page
Automating IT Risk Management
sponsored by Modulo
WEBCAST: This webcast shows you how to reduce GRC complexity and cost through automation.  View now to learn more.
Posted: 03 Apr 2015 | Premiered: Mar 25, 2015

Modulo

Developing a GRC Framework to Enable Automation
sponsored by Modulo
WEBCAST: This webcast examines how bank automated GRC processes to execute risk and compliance assessments. View now to learn how to develop a GRC framework and use autoamtion to facilitate new functions required within GRC.
Posted: 03 Apr 2015 | Premiered: Oct 22, 2014

Modulo

Can Automating GRC Simplify Risk Management?
sponsored by Modulo
CASE STUDY: This case study walks you through how Yale New Haven Health System moved away from manual GRC approaches and reduced the amount of resources necessary to oversee operations. View now to learn if the strategy they chose is right for your organization.
Posted: 03 Apr 2015 | Published: 25 Feb 2015

Modulo

Improving Supply Chain Security for Better Business Governance
sponsored by Modulo
WHITE PAPER: This white paper outlines how governance, risk, and compliance management can provide a sound structure for threat mitigation.
Posted: 02 Apr 2015 | Published: 28 Jan 2015

Modulo

Streamlining Information Protection Through a Data-centric Security Approach
sponsored by HP Security Voltage
WHITE PAPER: This resource introduces a new strategy that combines data encryption and masking to simplify privacy management and mitigate leakage. View now to learn the five step plan to successful production data protection.
Posted: 02 Apr 2015 | Published: 02 May 2013

HP Security Voltage

Use ERM to bring together scattered GRC efforts
sponsored by Modulo
WHITE PAPER: Read this brief white paper to discover how using such a software can simplify your job and enhance your GRC management.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

Modulo

Healthcare Organizations: Security and Compliance Beyond HIPAA and PCI DSS
sponsored by HP Security Voltage
CASE STUDY: This case study shows how one organization overcame data protection challenges. View now to learn how the strategy they chose enabled the enterprise to simplify encryption management and if it is right for your organization.
Posted: 01 Apr 2015 | Published: 28 Apr 2014

HP Security Voltage

Predictive Coding: The Next Frontier in eDiscovery
sponsored by Zovy LLC
WHITE PAPER: Predictive coding, a form of technology assisted review (TAR), has been and will continue to dramatically change the way discovery is conducted during legal cases. Predictive coding is considerably more powerful than basic keyword searches. This whitepaper examines the value of predictive coding and how it can help organizations conduct eDiscovery.
Posted: 31 Mar 2015 | Published: 31 Mar 2015

Zovy LLC

GRC: An Alternative  Approach to Spreadsheets in Risk Management
sponsored by Modulo
WHITE PAPER: This white paper outlines the cost and complexity reducing benefits offered by one GRC strategy.  View now to learn how to retire spreadsheets and manual processes.
Posted: 30 Mar 2015 | Published: 10 Sep 2014

Modulo

Navigating the Legal and Compliance Implications of BYOD
sponsored by Dropbox for Business
WHITE PAPER: This white paper delves into the legal and compliance implications of BYOD and offers recommendations for setting up a successful strategy.
Posted: 30 Mar 2015 | Published: 04 Dec 2013

Dropbox for Business

Two Industry Experts Offer Top Tips For Records Management
sponsored by Iron Mountain
WHITE PAPER: Access this helpful e-guide to learn from two compliance experts about the key steps to developing a records and information management privacy compliance program, as well as the risks companies potentially face by not getting rid of data.
Posted: 30 Mar 2015 | Published: 30 Mar 2015

Iron Mountain

Why Role Management has the Spotlight
sponsored by SailPoint Technologies
WHITE PAPER: Uncover how role management can help your organization manage information security and corporate risk in three key areas. Access now to learn more.
Posted: 24 Mar 2015 | Published: 04 Dec 2013

SailPoint Technologies

5 Important Truths about Digital Workspaces in a Dangerous World
sponsored by RES Software
WHITE PAPER: In this white paper, explore the five truths that offer answers to those critical questions. Read on to learn how to protect your users and enterprise in the digital workspace age.
Posted: 24 Mar 2015 | Published: 14 Jan 2015

RES Software

How to Empower Users and Maximize Security and Compliance
sponsored by RES Software
WHITE PAPER: In this white paper, learn the four simple steps to enabling anywhere, any device computing while securing multiple end points and access management.
Posted: 23 Mar 2015 | Published: 07 Jan 2015

RES Software

All Data Archive Tools are not Created Equal: The Importance of Index and Search
sponsored by Zovy LLC
WHITE PAPER: This whitepaper overviews how archiving tools with powerful index and search capabilities can help maximize the value of intellectual property, and contribute to successful data governance.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Zovy LLC

Shellshock: Best practices for responding to the next vulnerability or Six best practices for successful vulnerability response
sponsored by Alert Logic
WHITE PAPER: In this white paper, uncover the six steps to effective vulnerability response and how to craft your defensive strategy.
Posted: 17 Mar 2015 | Published: 04 Feb 2015

Alert Logic

How to make PCI DSS 3.0 compliance an every day practice or A guidebook to successful PCI DSS 3.0 compliance
sponsored by Alert Logic
WHITE PAPER: View this white paper to explore the evolution of security compliance from an annual event to an everyday practice and how to drill down the details.
Posted: 17 Mar 2015 | Published: 05 Nov 2014

Alert Logic

Are you regularly monitoring log data?
sponsored by Alert Logic
WHITE PAPER: In this quick infographic, you will learn the 13 collections and alerts that help support the infrastructure security of an automated log management system.
Posted: 17 Mar 2015 | Published: 04 Feb 2015

Alert Logic

How Personalized, Compliant Service Boosts Loyalty and Avoids Liability
sponsored by Oracle Corporation
WHITE PAPER: Access this informative white paper to learn more about the complex relationship between compliance and personalization. Get 5 steps to boost loyalty and avoid liability.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

Oracle Corporation

Overcoming Stringent Dodd-Frank Act Recordkeeping Requirements
sponsored by Hewlett-Packard Company
CASE STUDY: View now and explore the challenges of staying compliant with stringent Dodd-Frank Act requirements.  Read on to learn how one strategy can help you retain and preserve structured and unstructured data across multiple applications and databases.
Posted: 11 Mar 2015 | Published: 09 Feb 2015

Hewlett-Packard Company

Case Study: Utilizing Predictive Coding to Remain Compliant
sponsored by Hewlett-Packard Company
CASE STUDY: View now to learn how HP mitigated risks and reduced analysis costs in this case study.  Read on to learn how they were able to keep up with information requests and investigations by utilizing predictive coding.
Posted: 11 Mar 2015 | Published: 19 Dec 2014

Hewlett-Packard Company

Case Study: Going Beyond Traditional GRC Utilities and Methods
sponsored by Hewlett-Packard Company
CASE STUDY: View now to learn how one financial services firm met regulatory obligation associated with vast quantities of structured and unstructured data.  Read on to learn how the firm secured, indezed, analyzed, and archived data across all media types.
Posted: 11 Mar 2015 | Published: 05 Feb 2014

Hewlett-Packard Company

Financial Services: Modern Big Data Architectures
sponsored by Red Hat
WHITE PAPER: Know your customer (KYC) policies and practices that are part of the response to anti-money laundering (AML) are becoming critical in meeting requirements of the US Patriot Act. Read this technology overview to learn about a solution for KYC and AML compliance.
Posted: 09 Mar 2015 | Published: 31 Jan 2015

Red Hat

Staying Compliant for On-the-Fly Investigations
sponsored by Dell Software
WHITE PAPER: Access this white paper and learn how to make sense of all of your data and remain compliant for on-the-fly investigations.
Posted: 23 Feb 2015 | Published: 04 Dec 2014

Dell Software

3 Step Guide for IT Governance & Compliance
sponsored by Dell Software
WHITE PAPER: This white paper details the three critical steps for maintaining compliance with external regulations and internal security policies. Read on to learn the four key external regulations to consider when preparing an IT compliance audit. Read on to learn more.
Posted: 23 Feb 2015 | Published: 13 Dec 2012

Dell Software
76 - 100 of 643 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement