Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Auditing

RSS Feed   
Compliance Auditing Reports
 
Leading Canadian Bank Achieves Compliance for Themselves and their Customers
sponsored by Comforte AG
CASE STUDY: To achieve PCI compliance while reducing the risk of data breaches and potential fraud, a Canadian bank implemented comforte's platform which replaced sensitive data with tokens to render it unreadable anywhere stored. In this case study, explore the benefits the bank saw after implementing comforte.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Comforte AG

Security, Compliance & ERP
sponsored by SAP
VIDEO: In this comprehensive webinar, explore key issues and trends impacting security and compliance within ERP systems. Learn about the importance of incorporating a strong role mapping security profile framework during your ERP deployment, and review other essential tips for improving security and compliance within your organization.
Posted: 20 Aug 2019 | Premiered: 20 Aug 2019

SAP

Cybersecurity Effectiveness Podcast: Terry Ray
sponsored by Verodin
PODCAST: According to Terry Ray, SVP, Fellow, and former CTO of Imperva, Inc., practices and safety around data privacy and the cloud, though slowly improving, still leave much to be desired. In this podcast, he and Brian Contos discuss the concept of absolute security.
Posted: 29 Aug 2019 | Premiered: Aug 29, 2019

Verodin

NIST SP 800-171 and CUI
sponsored by TITUS
PRODUCT OVERVIEW: NIST Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, requires all current U.S. Department of Defense contractors to be compliant with DFARS Part 252.204-7012. In this solution brief, learn how Titus can help contractors comply with these requirements.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

TITUS

10 Best Practices for Data Archiving and Application Decommissioning
sponsored by Flatirons Digital Innovations
WHITE PAPER: To learn how to successfully archive and decommission legacy applications, download this paper. It shares 10 proven practices to help you in the process while avoiding common pitfalls.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Flatirons Digital Innovations

How Do You Cultivate Compliance to Protect Your Business?
sponsored by Concur Technologies
WHITE PAPER: Regardless of your organization's industry, size, or location, travel and expense spend mistakes or fraud can have significant financial consequences. In this white paper, uncover 6 ways to get control over compliance, effectively manage travel and expense spend, and cultivate a culture of compliance.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Concur Technologies

Building a Modern Information Governance Strategy
sponsored by Mimecast
WHITE PAPER: Many organizations are rethinking their information management programs. They are creating modern and easier-to-execute policies, developing comprehensive processes and deploying better technology, all of which drive compliance. In this white paper, learn how key security challenges can be addressed through a modern information governance strategy.
Posted: 11 Apr 2019 | Published: 28 Sep 2018

Mimecast

Digital Transformation and Tax Compliance
sponsored by Avalara
WHITE PAPER: In this white paper, explore the differences in how cloud vs. on-premises solutions handle sales and use tax compliance. Also, learn how Avalara can help organizations navigate to the cloud while remaining compliant.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Avalara

Mitigating IP Risk: 3 Strategies to Ensure Open Source Compliance
sponsored by Fossa
WHITE PAPER: Open Source is free, but there are responsibilities inherent to using open source as it comes with a set of obligations and risks. However, there are 3 strategies to mitigate IP risk and ensure open source compliance. Download this white paper to discover each of these approaches.
Posted: 28 Aug 2019 | Published: 28 Aug 2019

Fossa

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement