Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed   
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance Audits Reports
1 - 25 of 208 Matches Previous Page  |  Next Page
Regulation Technology: Enabling More Than Compliance
sponsored by BT
WHITE PAPER: Since the financial crisis, many in the capital markets having turned to technology to help meet their obligations. In this white paper, explore how regulation technology providers can meet changing customer demands and provide technology which not only aid compliance, but also enable technology innovation through the client's broader business.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

BT

Security and Compliance Fears Keep Companies from Cloud Migration
sponsored by Ziften
RESOURCE: Migrating parts of your IT operations to the cloud can seem like a huge chore, and a dangerous one at that. There are a lot of security issues to deal with when migrating to the cloud. In this article, learn about how to keep your environment secure before, during and after a cloud migration.
Posted: 25 Mar 2019 | Published: 27 Feb 2019

Ziften

Data Immutability - A Key Issue for Capital Markets' RegTech
sponsored by BT
WHITE PAPER: Staying compliant involves not only accurate reporting, but also secure and immutable storage of data. In this white paper, learn how to demonstrate immutability is in action in your front, middle and back office setups.
Posted: 22 Mar 2019 | Published: 31 Mar 2019

BT

Is RegTech Your Differentiator
sponsored by BT
WHITE PAPER: If a financial firm takes a strategic approach to how it uses compliance-related data, it can move regulatory compliance from a headache to an enabler for business growth. This white paper discusses the opportunities for driving growth through the use of intelligent automation based on data sets collected for regulatory compliance.
Posted: 22 Mar 2019 | Published: 31 Mar 2019

BT

Privacy and Data Protection Webinar Transcript
sponsored by PricewaterhouseCoopers
RESOURCE: There is a lot more data at risk today than there has been in the past. This explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it. In this webcast transcript, learn about challenges in privacy and data protection and how PwC meets these challenges head on.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

PricewaterhouseCoopers

How Passive Monitoring Can Streamline NERC CIP Compliance
sponsored by ForeScout
EBOOK: The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards are a set of requirements designed to secure the assets required for operating North America's bulk electric system. In this e-book, learn how SilentDefense can help North-American utilities by saving considerable effort and money.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

ForeScout

A Guide to Simplifying Compliance with NIST SP 800-53 and 800-82
sponsored by ForeScout
RESOURCE: NIST Special Publication (SP) 800-53r4 provides a catalog of security controls for federal information systems and organizations and a process for selecting controls to protect operations and organizations. In this resource, explore the provided table which presents NIST SP's security controls applicable to ICS networks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

ForeScout

The GDPR Playbook for Data Teams
sponsored by Okera
WHITE PAPER: Prepare yourself to avoid a huge hit to your business's stability at the hands of GDPR. Read this white paper for 7 data-centric steps to protect yourself moving forward.
Posted: 21 Mar 2019 | Published: 31 Dec 2018

Okera

No Time to Lose: How to Help Ensure Your ICS Infrastructure Complies with the EU's NIS Directive
sponsored by ForeScout
EBOOK: This e-book explains the NIS Directive and its implications for essential service providers that depend on ICS networks to operate effectively. It also defines how essential service providers should assess solutions designed to support NIS compliance.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

ForeScout

A Brief Guide to Securing Your Multi-Cloud
sponsored by Splunk Services UK Ltd
WHITE PAPER: As more organizations are shifting infrastructure and services to the cloud, more are adopting a multi-cloud strategy. In this white paper, learn what multi-cloud is, what it isn't, the benefits of embracing it and lastly, how you can secure multi-cloud with the right security strategy.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

Splunk Services UK Ltd

Complying with CECL
sponsored by SAS
WHITE PAPER: The Financial Accounting Standards Board's Current Expected Credit Loss (CECL) standard introduces a new model for the recognition and measurement of credit losses for loans and debt securities. In this white paper, discover findings from the SAS/GARP survey which gauged lenders' progress and concerns in gearing up for the new model.
Posted: 19 Mar 2019 | Published: 26 Apr 2018

SAS

Data Protection is a Business Challenge
sponsored by Veritas
RESOURCE: Outages and data losses can have terrible business consequences. They are not simply short-time events; they cause significant, lasting disruptions. Direct loss of revenue is just the beginning of the potential negative outcomes from outages and data loss. In this infographic, learn about the data protection challenges that organizations face.
Posted: 19 Mar 2019 | Published: 31 Dec 2018

Veritas

Log Management Essentials
sponsored by One Identity
WHITE PAPER: In IT environments, a wide variety of sources generate log messages in many different formats. Whether you are trying to enhance security, improve operations or meet compliance objectives, log data contains valuable information and harnessing that data is critical. In this white paper, learn how to properly implement log management.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

One Identity

Hitachi Solutions
sponsored by Adobe Systems Incorporated
CASE STUDY: Hitachi Solutions was undergoing a significant evolution; they wanted to ensure their processes were optimized. In this case study, learn how Hitachi Solutions deployed Microsoft and Adobe solutions in-house to improve processes and better serve their customers.
Posted: 18 Mar 2019 | Published: 31 Dec 2018

Adobe Systems Incorporated

Are You Sending Data to Your Printers Securely? Find Out How.
sponsored by HP
RESOURCE: Any data that is sent between devices is vulnerable to an attack. Unsecured printers expose your business to the same data threats as your PCs. In this resource, find a checklist developed by The Center for Internet Security to help your organization better protect your printing environment.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

HP

Privacy and Data Protection Podcast
sponsored by Micro Focus & PwC
PODCAST: There is a lot more data at risk today than there has been in the past. This explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it. In this podcast, learn about challenges in privacy and data protection and how PwC meets these challenges head on.
Posted: 12 Mar 2019 | Premiered: Mar 7, 2019

Micro Focus & PwC

Data Privacy, Retail and Consumer Goods: Meeting the needs of CCPA, consumers, and the bottom line
sponsored by Micro Focus & PwC
WHITE PAPER: A new set of regulations is almost here: the California Consumer Privacy Act (CCPA), which was passed in June, is scheduled to go live on January 1, 2020. In this white paper, learn everything you need to know about the CCPA.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

Micro Focus & PwC

Laying the Foundation for GDPR Compliance
sponsored by SentryOne LLC
WHITE PAPER: The GDPR is in effect but, many businesses are still struggling with how to properly implement protections across systems and processes. This white paper discusses the 4 key rights that European citizens have under GDPR, and what businesses need to do to ensure they are GDPR compliant.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

SentryOne LLC

Technology's Role in Data Protection - The Missing Link in GDPR Transformation
sponsored by Micro Focus & PwC
WHITE PAPER: The EU GDPR delivers a fundamental change in how data controllers and data processors handle personal data. In this white paper, evaluate your organization's GDPR efforts using PwC's framework for evaluating GDPR technology.
Posted: 11 Mar 2019 | Published: 31 Oct 2017

Micro Focus & PwC

Simplifying GDPR Compliance
sponsored by Micro Focus & PwC
WHITE PAPER: GDPR sets the foundation for how multinational organizations protect, and derive value from, sensitive customer information. In this white paper, learn about how Micro Focus delivers a set of solutions to help take action on customer data in accordance with GDPR, including the "right to be forgotten".
Posted: 08 Mar 2019 | Published: 31 Jan 2018

Micro Focus & PwC

10 Best Practices for Data Archiving and Application Decommissioning
sponsored by Flatirons Digital Innovations
WHITE PAPER: To learn how to successfully archive and decommission legacy applications, download this paper. It shares 10 proven practices to help you in the process while avoiding common pitfalls.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Flatirons Digital Innovations

Combat Money Laundering with In-Database Analytics
sponsored by Onfido
EGUIDE: Money laundering was back at the top of the agenda recently when on June 26th 2017, the European Union's Fourth Anti-Money Laundering Direct came into force. One way to detect money laundering activities is by using in-database analytics. In this e-guide, discover 4 factors that contribute to compliance failure in anti-money laundering.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Onfido

Using Trend Micro's Hybrid Cloud Security Solution to Meet PCI DSS 3.2 Compliance
sponsored by Trend Micro, Inc.
WHITE PAPER: This white paper examines the applicability of Trend Micro's Hybrid Cloud Security Solution, specifically Trend Micro Deep Security, to secure Payment Card Industry (PCI) data in accordance with the PCI DSS when used in physical, virtual, cloud, or container environments.
Posted: 27 Feb 2019 | Published: 31 Aug 2017

Trend Micro, Inc.

Your Key to Regulatory Compliance for Archive Data
sponsored by iTernity
PRODUCT OVERVIEW: To take advantage of a sustainable and cost-efficient archiving approach that complies with HIPAA, SOX, and SEC 17a-4(f), download the following paper. It details a solution that combines HPE StoreEasy Storage and iTernity Compliant Archive Software (iCAS) to fulfill the above.
Posted: 27 Feb 2019 | Published: 31 Dec 2017

iTernity

Audit-proof and Hardware-independent Archiving with iCAS
sponsored by iTernity
PRODUCT OVERVIEW: This paper will introduce you to a software-defined archiving system—iCAS—that protects data with the highest security standards for audit-proof compliance. Built to meet the most stringent requirements like HIPAA, HITECH, and the GDPR, learn how it can help your organization, as well.
Posted: 27 Feb 2019 | Published: 31 Dec 2018

iTernity
1 - 25 of 208 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement