Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed   
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance Audits Reports
1 - 25 of 202 Matches Previous Page  |  Next Page
Data Sharing In Finance:Open Banking, Cdr, And Beyond
sponsored by TIBCO
WHITE PAPER: Access this TIBCO white paper to gain a deeper understanding of what, exactly, Australia’s Consumer Data Right legislation mandates, discover how these regulations are likely to impact businesses and technologies, and learn how you can remain complaint and successful.
Posted: 06 Apr 2021 | Published: 06 Apr 2021

TIBCO

Comply with Global Tax Regulations and Maximise VAT/GST Recovery by Optimising the Integrity of Your Data
sponsored by SAP Concur solutions
DATA SHEET: Concur Tax Assurance protects against audits and penalties by optimizing the integrity of your data in compliance with global VAT regulations. Learn how to digitize the compliance process and maximize profitability with this dynamic platform by reading on here.
Posted: 30 Mar 2021 | Published: 31 Dec 2020

SAP Concur solutions

Inventa for Wealth Management
sponsored by 1Touch.io
DATA SHEET: With 1touch.io’s Inventa, an AI-based sustainable data discovery tool, firms can move forward with their own digital initiatives while effortlessly staying on top of privacy requirements. Read this paper to learn how your organization can ensure sustainable data discovery and reduce the burden on data science teams with Inventa.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

1Touch.io

The Changing Vendor Audit Landscape
sponsored by Livingstone Tech
WEBCAST: As organizations adopt more cloud platforms with subscription-based licensing, the traditional landscape of software publisher audits and related risk is also rising. This webinar covers these changes and how to prepare through best practices. Tune in to learn about how to approach risk assessment, how to deal with audits and more.
Posted: 11 Feb 2021 | Premiered: Feb 11, 2021

Livingstone Tech

ServiceNow Risk & Compliance: Advancing GRC, Risk & BCM
sponsored by ServiceNow
RESEARCH CONTENT: Download this Forrester Total Economic Impact Report for exclusive insight into the efficiencies and advancements in governance, risk and compliance (GRC), vendor risk management (VRM) and business continuity management (BCM) with ServiceNow Risk and Compliance – as well as an analysis of costs.
Posted: 10 Feb 2021 | Published: 31 Jan 2021

ServiceNow

Aparavi Data Intelligence & Automation
sponsored by Aparavi
VIDEO: Data conservation, protection, and accessibility is massively important for corporate ethics and compliance. Watch this 5-minute video to learn how a fictional company can use Aparavi’s data intelligence and automation platform can use metadata to identify and pinpoint potential code of conduct or ethics violations.
Posted: 01 Feb 2021 | Premiered: 01 Feb 2021

Aparavi

Opinion Matters: UK Public Sector attitudes on communication security after the onset of COVID-19
sponsored by Zivver
RESEARCH CONTENT: The following report highlights the results from recent study into communication security trends and concerns across the UK public sector. Read through these in-depth results to see how your organization’s communication security concerns compare.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Zivver

Improving Security and Compliance in Hybrid Cloud with Automation
sponsored by Red Hat
WEBCAST: Massive global shifts towards hybrid cloud environments are making cybersecurity more difficult to achieve than ever before. This Red Hat webinar offers exclusive insight into how automation can improve security and compliance in hybrid cloud environments – watch now to get started.
Posted: 28 Jan 2021 | Premiered: Jan 28, 2021

Red Hat

How Zivver Helps Organisations with ISO 27001 Compliance
sponsored by Zivver
PRODUCT OVERVIEW: Complying with all 114 of the controls required for ISO 27001 can be a complicated process. This solution brief provides a comprehensive list of the 22 controls covered in Zivver’s platform, designed to help your organization meet ISO 27001 compliance requirements.
Posted: 28 Jan 2021 | Published: 28 Jan 2021

Zivver

Your complete guide for preventing Data Leaks
sponsored by Zivver
EGUIDE: Organizations tend to spend their efforts on protecting their data against hackers while overlooking the impacts of data leaks caused by human error. This e-guide provides comprehensive insight into the causes and risks of data leaks, as well as preventative measures and compliance best practices – read on to get started.
Posted: 28 Jan 2021 | Published: 28 Jan 2021

Zivver

A simple and effective security layer for digital communications
sponsored by Zivver
CASE STUDY: In this case study, follow the journey of Agency DNA, a business management consultancy, as they partner with Zivver to establish a simple and effective data protection program that addresses key challenges related to compliance, user experience, and more – read on to unlock the full story.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Zivver

Security Compliance and Data Privacy the Open Source Way
sponsored by Red Hat
VIDEO: As our world grows increasingly data-driven, ensuring the privacy and security of customer data becomes a top priority for organizations – especially as each new compliance mandate is enforced. Watch this Red Hat webinar to learn more about the evolving landscape of data security and privacy.
Posted: 26 Jan 2021 | Premiered: 26 Jan 2021

Red Hat

Aeris Whitepaper: IoT Device Security: Understanding IoT Security Rules and Regulations
sponsored by Aeris
WHITE PAPER: Customers whose IoT programs collect personally identifiable data should keep security top of mind to ensure they’re compliant with local, national and global data privacy regulations. Read this white paper too learn more about IoT device security and how the landscape is affected by data privacy rules and regulations.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Aeris

Achieving security and compliance in Red Hat OpenShift Dedicated
sponsored by Red Hat
VIDEO: In this webinar from Red Hat’s online Security Symposium, join distinguished Red Hat expert Bill Montgomery as he offers a closer look at Red Hat’s OpenShift Dedicated (OSD), highlighting 8 key security and compliance features, the benefits of a hosted vs. self-managed models, and more – watch now to get started.
Posted: 25 Jan 2021 | Premiered: 25 Jan 2021

Red Hat

DevOps Security, Monitoring & Compliance with OpenShift and Sysdig
sponsored by Red Hat
VIDEO: IT, cloud and DevOps-related risks are on the rise and addressing these challenges alone can be resource-intensive. In this webinar, join experts at Red Hat and Sysdig as they discuss how to extend security, compliance and monitoring capabilities with a secure-by-design platform – watch now to get started.
Posted: 21 Jan 2021 | Premiered: 21 Jan 2021

Red Hat

Evonik Industries Success Story
sponsored by SNP Transformation
CASE STUDY: For Evonik, a global chemicals company, balancing a growing list of compliance mandates with data protection and employee productivity is a difficult task. Read this case study to see why they partnered with SNP to address these challenges and discover the outcomes of this initiative.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

SNP Transformation

Protect Your Data on the Way to the Cloud
sponsored by Atakama
RESOURCE: Las year, the New York Department of Financial Services (NY DFS) issued 23 NYCRR 500, adding yet another compliance requirement to the already heavily regulated financial industry. Read this article to learn more about NY DFS, who it affects and why it matters.
Posted: 14 Dec 2020 | Published: 19 Oct 2020

Atakama

Agentless EDR For Unmanaged Devices
sponsored by Armis
PRODUCT OVERVIEW: As the number of organizations within an environment grows, security teams need a way to identify, manage and secure them. Read this solution brief for a closer look at Armis’ agentless endpoint detection and response (EDR) platform, which provides the visibility, compliance and security requirements needed to address this initiative.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

Armis

Simplifying Cross-Framework Compliance Management
sponsored by Aptible
WEBCAST: Compliance professionals dread audits. With all of the standards and regulations organizations are held to, finding apt software to maintain compliance across multiple frameworks is an arduous process – until now. Check out this webcast from Aptible to get a look at how you can use automation to remove stress from audits.
Posted: 10 Dec 2020 | Premiered: Dec 10, 2020

Aptible

The Maturity Model for Governance, Risk, and Compliance
sponsored by Aptible
EBOOK: For more than a decade, the GRC framework has helped companies maintain their data integrity and manage risk in an increasingly digital world. But with compliance growing more and more complex, your GRC operations need to mature as your business does. Scrutinize this guide to understand how to evolve your GRC model in 4 levels.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Aptible

SecurDPS Discover and Classify
sponsored by Comforte AG
PRODUCT OVERVIEW: Data is becoming a highly valuable resource. As such, organizations are taking meticulous precautions in order to safeguard their data against attacks. This solution brief introduces SecurDPS Discover and Classify, designed to automate data discovery and classification to enhance network and data usage visibility – read on to learn more.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Comforte AG

CW APAC, June 2020: Trend Watch - data protection
sponsored by ComputerWeekly.com
EGUIDE: Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

ComputerWeekly.com

Major international retailer re-structures it’s mega vendor licensing with Livingstone Group
sponsored by Livingstone Tech
CASE STUDY: Oftentimes, universal licensing agreements (ULAs) make businesses pay more than necessary for the cost of convenience. With the headache of ULA management, many businesses start to question if that promise of convenience is even realized. Explore the alternatives to ULAs here.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Livingstone Tech

What You Should Know About Your Identity & Access Management
sponsored by Beta Systems
WHITE PAPER: This 34-page whitepaper offers a comprehensive deep dive into Garancy Access Intelligence Manager (AIM) – an offering designed to help organizations monitor data sources, analyze access permissions, meet compliance requirements and address threats. Read on to learn more about its key features and capabilities.
Posted: 04 Nov 2020 | Published: 31 Jan 2019

Beta Systems

IT-GRC Tools
sponsored by ServiceNow
WHITE PAPER: IT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.
Posted: 12 Oct 2020 | Published: 21 Jul 2020

ServiceNow
1 - 25 of 202 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences