Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed   
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance Audits Reports
1 - 25 of 254 Matches Previous Page  |  Next Page
Sumo Logic Uses Hacker-Powered Pen Tests for Security and Compliance
sponsored by HackerOne
CASE STUDY: Sumo Logic started seeing their pen testing reports coming back clean. Although this sounds like good news, they knew it must be because their pen testers kept looking in the same places. In this case study, learn why they decided they needed a more diverse group of testers and how it led them to HackerOne and the hacker-powered security model.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

The Total Economic Impact Of Alert Logic SIEMless Threat Management
sponsored by Alert Logic
RESEARCH CONTENT: Many companies struggle to assemble the right combination of tools and expertise to provide their own security and secure their clients' applications and data in public cloud and hybrid environments. In this Forrester Consulting TEI study, evaluate Alert Logic's ability to help companies solve these problems.
Posted: 14 Jun 2019 | Published: 31 May 2019

Alert Logic

Podcast: Privileged Account Governance and Incident Response
sponsored by One Identity
PODCAST: A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this podcast, listen as Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.
Posted: 13 Jun 2019 | Premiered: Jun 13, 2019

One Identity

PCI Network Security Compliance For Kubernetes Platforms
sponsored by Tigera
WHITE PAPER: PCI DSS requires proper monitoring at the network level. The challenge with traditional network monitoring tools is that they generate inaccurate data for Kubernetes. In this white paper, learn how Tigera supports continuous PCI compliance that gives teams the ability to pinpoint any point in time and say with certainty if they were in compliance.
Posted: 13 Jun 2019 | Published: 13 Jun 2019

Tigera

5 Best Practices for Kubernetes Network Security and Compliance
sponsored by Tigera
WHITE PAPER: As businesses look to modernize their applications, many have turned to Kubernetes because of the benefits containerized workloads bring. However, businesses need to think about securing their applications. In this white paper, explore 5 best practices for securing Kubernetes at the network level.
Posted: 13 Jun 2019 | Published: 13 Jun 2019

Tigera

What Complying With Kari's Law Means For Your Business
sponsored by Bandwidth
WHITE PAPER: Kari's Law requires direct dialing of "9-1-1" for emergency services to be enabled in enterprise environments and directs the FCC to develop necessary calling regulations for the multi-line telephone systems. In this white paper, learn how to bring your business into compliance with the law before the February 2020 deadline.
Posted: 12 Jun 2019 | Published: 18 Mar 2019

Bandwidth

Make Trusted Data Privacy Compliance Reporting Easy With ALTR Monitor
sponsored by ALTR
PRODUCT OVERVIEW: Data privacy has transformed from industry-specific regulations into broader compliance concerns which require transparency into the access and use of sensitive data. However, traditional database logs and monitoring products don't return complete information. In this solution brief, explore how ALTR Monitor provides a tamperproof record of data.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

ALTR

How to Address Governance, Risk and Compliance In Your Organization
sponsored by Optiv
EGUIDE: Compliance is a growing concern for many companies, especially as new regulations and technologies are introduced. In this e-guide learn how to create a GRC program to better help organizations achieve their goals by ensuring events that threaten the continued operations of the organization can be identified, prevented and mitigated if they occur.
Posted: 10 Jun 2019 | Published: 05 Jun 2019

Optiv

Modernize Your Data Protection
sponsored by Forcepoint
WEBCAST: Navigating your data protection journey can be complex. In this webcast, Angelica Torres-Corral, Senior Product Marketing Manager at Forcepoint gives insights to gaining visibility & control of your data, optimizing a Data Loss Prevention (DLP) software and adopting a more proactive security strategy.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019

Forcepoint

The Practical Executive's Guide to Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: There has been much confusion in the marketplace regarding data loss prevention (DLP) controls. As a result, organizations that want to protect their confidential data and comply with laws and regulations are often unsure where to turn. In this white paper, explore a 9-step process for implementing and executing a data protection strategy.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Forcepoint

Meet PCI DSS Requirements
sponsored by HackerOne
WEBCAST: Many organizations are limited by traditional penetration tests. A better approach is needed to discover real-world vulnerabilities while meeting penetration testing requirements set forth by PCI-DSS. In this webcast, learn how crowdsourced security testing addresses compliance requirements, scales security teams and keeps applications safe.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

Key Considerations For Implementing an IAM System
sponsored by Onfido
EGUIDE: IT administrators have many features to choose from and requirements to meet when looking for an identity and access management (IAM) tool. In this e-guide, explore other key considerations for selecting and implementing the right IAM system in your organizations.
Posted: 30 May 2019 | Published: 28 May 2019

Onfido

NHS Trust Improves Mental Health Services by Deploying Veeam Intelligent Data Management
sponsored by Veeam Software
CASE STUDY: View NHS's study to learn how they were ultimately able to improve patient safety by guaranteeing data availability for clinicians, free up IT resources, and assure data loss prevention in compliance with the GDPR.
Posted: 30 May 2019 | Published: 30 May 2019

Veeam Software

Cybersecurity in Financial Services: Orchestrating the Best Defense in an Evolving Threat Landscape
sponsored by ServiceNow
WHITE PAPER: Financial Services has been a targeted sector and cybercrime is becoming sophisticated on an industrial scale. A more strategic and wholesale approach needs to be adopted industry-wide to fend off the threat. In this white paper, learn how organizations can leverage technology to get a holistic view of their entire business.
Posted: 24 May 2019 | Published: 28 Feb 2019

ServiceNow

Security Maturity: Mapping the Road to Resilience in Europe
sponsored by Dell SecureWorks
WHITE PAPER: The road to cybersecurity maturity can be tricky. This is because there isn't one universal standard by which management can determine how well the risk is being managed. For European organizations, reviewing the highlights in this white paper can provide clues for comparing their own cybersecurity maturity to that of other EMEA organizations.
Posted: 23 May 2019 | Published: 23 May 2019

Dell SecureWorks

How to Strengthen Your Vendor Risk Management Strategy Through Automation
sponsored by BitSight
RESOURCE: To reduce third-party cyber-risk organizations need processes and solutions that leverage automation. In this resource, Stephen Boyer, CTO of BitSight, explains how organizations can incorporate automation to develop more mature vendor risk management programs.
Posted: 23 May 2019 | Published: 23 May 2019

BitSight

Third-Party Cyber-Risk for Financial Services: Blind Spots, Emerging Issues & Best Practices
sponsored by BitSight
RESEARCH CONTENT: Today's complex business world means that organizations need to work with third parties. While this is critical, the exchange of sensitive information creates a new set of security risks. In this research report, explore key findings from a survey aimed to assess how financial institutions are responding to third-party cyber-risk.
Posted: 22 May 2019 | Published: 30 Apr 2019

BitSight

Halton Borough Council Supports Vulnerable Citizens with Veeam Intelligent Data Management
sponsored by Veeam Software
CASE STUDY: The challenge of ensuring exponentially increasing volumes of data are properly backed up is one which many enterprises can appreciate. To discover how Halton Borough Council ultimately achieved reliable, GDPR-compliant backups without draining vital resources, access the study now.
Posted: 22 May 2019 | Published: 22 May 2019

Veeam Software

Smarter Data Protection with Machine Learning
sponsored by TITUS
WHITE PAPER: Protecting sensitive data is critical, but it can be difficult to achieve without first enhancing how data is kept. Many organizations struggle to accurately identify complex data as it moves throughout workflows. In this white paper, learn how machine learning offers a way for organizations to better protect their sensitive data.
Posted: 20 May 2019 | Published: 30 Nov 2018

TITUS

Compliance Needs Drive Data Access Auditing Requirements
sponsored by BMC
WHITE PAPER: More and more regulations are being passed that dictate increased effort be exerted to better secure and protect the accuracy and privacy of enterprise data. So how can organizations ensure they are in compliance with these regulations (and others)? Download this white paper for 4 data access auditing techniques to help maintain compliance.
Posted: 16 May 2019 | Published: 16 May 2019

BMC

Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
sponsored by Forcepoint
WEBCAST: Some approaches to information security simply won't deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy. In this webcast, Doug Landoll discusses how to take a risk-first approach to addressing information security.
Posted: 15 May 2019 | Premiered: May 15, 2019

Forcepoint

Access & Protect Your Data – Anywhere, Anytime
sponsored by TITUS
WHITE PAPER: The explosion of data and complexity of regulatory governance have made data protection a moving target. In this white paper, learn how TITUS and Dataguise bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable data wherever it resides.
Posted: 15 May 2019 | Published: 15 May 2019

TITUS

Automating Security and Compliance for Hybrid Clouds
sponsored by Red Hat
WEBCAST: In a hybrid infrastructure consisting of physical, virtual, cloud, and container environments, maintaining visibility, security, governance, and compliance remains important—but it's becoming more time consuming. In this webcast, Lucy Kerner discusses how to solve these challenges in your hybrid infrastructure by automating security and compliance.
Posted: 15 May 2019 | Premiered: May 15, 2019

Red Hat

Can You Handle Your Data?
sponsored by TITUS
WHITE PAPER: The modern world is swimming in data, with no signs of that changing any time soon. Threats to the security of all this data have grown in number and sophistication, meaning data regulations are more complicated than ever. In this white paper, learn how organizations can improve information handling practices to better protect their sensitive data.
Posted: 14 May 2019 | Published: 31 Jan 2019

TITUS

The Total Economic Impact™ Of HackerOne Challenge
sponsored by HackerOne
RESEARCH CONTENT: HackerOne provides security and compliance penetration (pen) testing services that help its customers identify and remediate security vulnerabilities. To understand the benefits, costs, and risks associated with this investment, Forrester interviewed 4 customers with experience using HackerOne Challenge. Download the report for key findings.
Posted: 10 May 2019 | Published: 31 May 2019

HackerOne
1 - 25 of 254 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement