Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed   
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance Audits Reports
26 - 50 of 231 Matches Previous Page  |  Next Page
CW APAC, June 2020: Trend Watch - data protection
sponsored by ComputerWeekly.com
EZINE: Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
Posted: 08 Jun 2020 | Published: 11 Jun 2020

ComputerWeekly.com

Capsule8 for PCI Compliance
sponsored by Capsule8
PRODUCT OVERVIEW: As e-commerce becomes essential to the revenue stream of digital businesses, ensuring the PCI DSS compliance and securing cardholder data becomes increasingly critical. Download this solution brief and explore Capsule8’s Protect platform, designed to ensure security while easing PCI DSS compliance workload.
Posted: 05 Jun 2020 | Published: 05 Jun 2020


Data Privacy and Non-Compliance: From Silicon Valley to SMBs
sponsored by Ostendio
RESOURCE: In this article written by the President and CEO of Ostendio, learn about the data privacy and non-compliance issues that are plaguing companies of all sizes – from Silicon Valley to SMBs.
Posted: 04 Jun 2020 | Published: 10 Apr 2020

Ostendio

How to Choose a SOC 2 Auditor: 6 Questions to Ask
sponsored by Ostendio
RESOURCE: For organizations looking to conduct a SOC 2 audit, choosing the right external audit firm can be a daunting, yet crucial, process. To make sure you choose the right partner, this article highlights 6 questions to consider during the selection process. Read on to find out what they are.
Posted: 04 Jun 2020 | Published: 27 Sep 2019

Ostendio

Cybersecurity Maturity Model Certification (CMMC)
sponsored by BlueVoyant
WHITE PAPER: The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity requirement for DoD contractors and subcontractors designed to protect the handling of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But what does the CMMC entail, and when will it come into effect? Read on to find out.
Posted: 08 May 2020 | Published: 08 May 2020

BlueVoyant

State of Software Security: Volume 10
sponsored by Veracode, Inc.
WHITE PAPER: For the last decade, Veracode has been conducting studies and releasing annual reports regarding the current trends and challenges within software security. In this year’s edition, examine key statistics surrounding trending themes like compliance, security debt, scanning for flaws, and more. Read on to unlock the full report.
Posted: 06 May 2020 | Published: 06 May 2020

Veracode, Inc.

NIST Application Security Revisions You Need to Know
sponsored by Contrast Security
RESOURCE: NIST is a standard leader in the cybersecurity space that sets guidelines for organizations to follow across different areas of security. This landing page contains several useful resources focusing on the NIST revisions to their application security guidelines.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Contrast Security

Help Reduce Cyber Risks and Simplify Your Journey to Compliance
sponsored by AT&T Cybersecurity
PRODUCT OVERVIEW: For organizations with a limited IT budget, gaining the visibility needed to understand security risks and address compliance requirements is a cumbersome task. In this solution brief, explore the features and capabilities of AT&T Cybersecurity – designed to simplify compliance and security – to see if it’s a good fit for your needs.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

AT&T Cybersecurity

AppSec Guide: Complying with New NIST SP 800-53 IAST & RASP Requirements
sponsored by Contrast Security
WHITE PAPER: The newly released AppSec requirements from the National Institute of Standards and Technology (NIST) outline the need to address specific software vulnerabilities in response to the increasing volume of automated attacks. This whitepaper highlights what to expect with the new requirements and provides 4 key steps for ensuring compliance.
Posted: 10 Apr 2020 | Published: 30 Mar 2020

Contrast Security

Case Study: NetLib Helps MIMICS gain competitive advantage in the Financial Sector
sponsored by NetLib Security
CASE STUDY: In this case study, follow the data security journey of MIMICS, a financial software firm, and their continued partnership with NetLib Security as they focus on security objective related to database encryption, data privacy regulations, and more.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

NetLib Security

Reclaim Your Compliance Training
sponsored by Cornerstone OnDemand
WHITE PAPER: Download this white paper to learn how you can reclaim compliance training and move past negative connotations to get more value out of it.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Cornerstone OnDemand

GDPR Compliance support that works for your business
sponsored by TITUS
PRODUCT OVERVIEW: GDPR is forcing organizations to rethink their workflows and achieve broader visibility into personal data collection. In this solution brief, take a closer look at Titus’ offering that is powered by machine learning to help identify what data you have, how sensitive it is, and how it should be handled by your security stack.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

TITUS

The 4 Levels of Automated Remediation
sponsored by DivvyCloud
WHITE PAPER: Automated remediation allows for organizations to save time and resources by automating security tasks that previously required manual attention. Contrary to popular belief, organizations don’t need to be at 100% automation on day 1. In this guide, discover the various levels of automation and learn how to choose the right one for you.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

DivvyCloud

Cloudian HyperStore Compliance Assessment
sponsored by Cloudian
EBOOK: In this e-book, Cohasset Associates has been called upon to assess the capabilities of Cloudian HyperStore. Read on to learn Cohasset’s opinion on HyperStore which includes whether or not it retains records requiring time-based retention in compliance with the recording and non-rewritable, non-erasable storage of electronic records.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Cloudian

4 Ways SailPoint Predictive Identity Puts You in Control
sponsored by SailPoint Technologies
WHITE PAPER: As digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

Creating an Identity-Aware Organization from Infrastructure to Users
sponsored by SailPoint Technologies
WHITE PAPER: Cybercriminals are no longer just hacking through your firewall to gain entry to your infrastructure. They have found another, easier path in – your users. In this white paper, learn how identity management is key to ensure a secure, compliant and efficient infrastructure.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

The CCPA: Security Standards and Measures to Comply
sponsored by Crosskey Cyber Security
RESOURCE: The CCPA is now operative and the Attorney General can begin enforcement actions against businesses on July 1 of this year. Even if you believe you are not subject to the CCPA, it is a good idea for SMBs to comply with the standard for many reasons. In this blog, learn about the cybersecurity standard SMBs need to meet to satisfy the CCPA.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Crosskey Cyber Security

Auditing Your Company’s Use of Open Source
sponsored by Fossa
WHITE PAPER: As more and more companies continue to include open source as part of their software program, it’s critical to establish a strategy to manage consumption and ensure efficient use of resources. Download this guide for the key aspects of an open source strategy designed to keep you on track with your operational and compliance objectives.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Fossa

Supporting GRC with Business Continuity and Disaster Recovery
sponsored by Cirrus Data Solutions
EGUIDE: Read this exclusive guide to discover how BC can support GRC initiatives and how to use the data acquired during BIA and RA activities to support GRC.
Posted: 28 Jan 2020 | Published: 27 Jan 2020

Cirrus Data Solutions

CCPA Compliant Email Security
sponsored by Egress Software Technologies Inc
DATA SHEET: In this Egress product datasheet, learn how you can remain CCPA compliant by preventing breaches, protecting regulated data, fulfilling DSARs, and auditing your email network.
Posted: 28 Jan 2020 | Published: 28 Jan 2020

Egress Software Technologies Inc

GDPR Perspectives: Rethinking Data Discovery for Privacy and GDPR
sponsored by BigID
WHITE PAPER: With data privacy laws like GDPR regulating the way organizations manage data, it’s grown increasingly critical for organizations to take a strategic approach to the way they collect, process, and categorize data. Read this white paper to learn about the rising popularity of data classification solutions and other discover tools.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

BigID

PandaLabs Annual Report 2018
sponsored by Panda Security
RESEARCH CONTENT: As technology continues to advance, cybercriminals are leveraging new capabilities into more sophisticated cyberattacks. PandaLabs, Panda Security's anti-malware laboratory, tracks threat data in real time and has compiled it into a report. Download the report for highlights of 2018's cybersecurity trends, as well as emerging threats for 2019.
Posted: 31 Dec 2019 | Published: 30 Nov 2018

Panda Security

The Digital Nexus in Banking
sponsored by Hitachi Vantara
EBOOK: With Hitachi, achieving the level of regulatory compliance your business needs become a lot easier while managing data becomes less of an arduous task. To learn about the 3 major benefits of managing data with Hitachi and to go over the provided compliance maturity checklist, read this e-book.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Hitachi Vantara

The Financial Adviser's Guide to Compliant IM and Collaboration
sponsored by Smarsh
WHITE PAPER: The rise of collaboration platforms and the compliance requirements they bring with them are a symptom of a larger reality: Workplace communications are changing. Read on to learn how you add IM and collaboration platforms to a compliant ecosystem in your organization.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Smarsh

The Financial Adviser's Guide to Social Media Strategy and Policy
sponsored by Smarsh
WHITE PAPER: The U.S. Securities and Exchange Commission (SEC) and Financial Industry Regulatory Authority (FINRA) recognize social media’s growing role in firms’ marketing strategies. In this guide, find practical steps to help you develop social media strategy and policy that meets social media recordkeeping and supervision regulatory requirements.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Smarsh
26 - 50 of 231 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info