Standards  >   Security Standards  >  

Control Objectives for Information and Related Technology

RSS Feed   
Control Objectives for Information and Related Technology Reports
 
COBIT5 For Risk
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This is a preview of a  report from ISACA offering guidance on how to use the COBIT 5 framework to establish the risk governance and management functions for the enterprise.
Posted: 01 Nov 2013 | Published: 19 Nov 2013

ComputerWeekly.com

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance
sponsored by Varonis
WHITE PAPER: This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002.
Posted: 10 Sep 2008 | Published: 10 Sep 2008

Varonis

The Challenges - and Myths - of Sarbanes-Oxley Compliance
sponsored by Bytware, Inc.
WHITE PAPER: This white paper addresses the challenges and dispels the myths associated with SOX compliance in iSeries (System i) shops. It also examines the 5 steps to take toward compliance, and how to achieve CobiT objectives such as risk assessment and more.
Posted: 29 Nov 2006 | Published: 30 Aug 2004

Bytware, Inc.

The IT Manager's Working Guide to Sustainable SOX Compliance
sponsored by SoftLanding Systems, Inc.
WHITE PAPER: Learn how to overcome real-world compliance challenges and optimize your SOX efforts. Packed with NEW resources, tips, and a SOX-specific list of COBIT 4.0 objectives, this paper offers actionable tactics to help IT departments achi...
Posted: 02 Oct 2006 | Published: 01 Aug 2006

SoftLanding Systems, Inc.

The State of System i Security 2007
sponsored by PowerTech
WHITE PAPER: This study highlights a number of very common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the AS/400.
Posted: 16 Apr 2007 | Published: 01 Apr 2007

PowerTech

eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies
sponsored by SearchSecurity.com
EBOOK: Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

SearchSecurity.com

Configuration Assessment: Choosing the Right Solution
sponsored by Tripwire, Inc.
WHITE PAPER: Check out this white paper to discover how automated configuration assessment solutions like Tripwire Enterprise help ease the burden on IT of achieving and maintaining compliance, securing the IT infrastructure, and generating evidence for mandatory audits.
Posted: 08 Jan 2009 | Published: 01 Jul 2008

Tripwire, Inc.

Sustaining Sarbanes-Oxley Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs
sponsored by Tripwire, Inc.
WHITE PAPER: To successfully sustain compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Check out this white paper to learn how Tripwire solutions enable organizations to achieve and sustain SOX compliance.
Posted: 08 Jan 2009 | Published: 08 Jan 2008

Tripwire, Inc.

The Modern Security Threat and Regulatory Compliance
sponsored by Bytware, Inc.
WEBCAST: SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
Posted: 29 Sep 2008 | Premiered: Sep 29, 2008

Bytware, Inc.

Log Management Best Practices
sponsored by RSA
WHITE PAPER: Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Posted: 14 Feb 2008 | Published: 01 Jan 2007

RSA
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement