Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

FFIEC Compliance

RSS Feed   
DEFINITION: Conformance to a set of standards for online banking issued in October 2005 by the Federal Financial Institutions Examination Council (FFIEC). The standards require multifactor authentication (MFA) because single-factor authentication (SFA) has proven inadequate against the tactics of increasingly sophisticated hackers, particularly on the Internet.
FFIEC Compliance Reports
101 - 125 of 495 Matches Previous Page  |  Next Page
COVID-19Checklist
sponsored by OpenText
WHITE PAPER: When it comes to COVID-19 recovery, it’s crucial that you have a plan for: security, business continuity, supply chain disruption, and more. Grab a copy of this checklist to start planning your comeback, and ensure you have a plan for every facet of your organization.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

OpenText

CW ANZ - December 2018: Rise to cloud and data management challenges
sponsored by ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how enterprises in ANZ are approaching data management in the cloud, and some of the best practices that they can adopt to address cloud related challenges.
Posted: 14 Dec 2018 | Published: 14 Dec 2018

ComputerWeekly.com

CW ANZ: Trend Watch – Security
sponsored by ComputerWeekly.com
EZINE: With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.
Posted: 11 Jul 2019 | Published: 18 Jul 2019

ComputerWeekly.com

CW APAC, March 2021: Tech career guide
sponsored by ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at the qualities and skills that are required to be successful in DevOps.
Posted: 04 Mar 2021 | Published: 04 Mar 2021

ComputerWeekly.com

CW ASEAN: European data law - be aware and prepare
sponsored by ComputerWeekly.com
EZINE: Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

ComputerWeekly.com

CW500: Key trends for IT leaders in 2017 – technology trends
sponsored by ComputerWeekly.com
PRESENTATION: A look forward to the 12 months ahead for IT leaders and the key trends of the coming year - this presentation came from Spencer Izard, chief analyst in the enterprise advisory team at Ovum, discussing the major technology trends for this year.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

ComputerWeekly.com

Data Protection 101: Essential Steps for Holistic Information Security
sponsored by SearchSecurity.com
EGUIDE: Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This e-guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 17 Nov 2011 | Published: 17 Nov 2011

SearchSecurity.com

Cost-Effective Document Management Solutions for Business-Critical Processes - Part I: Why a New Generation of Enterprise Content Management Solutions Are Emerging to Meet the Need for Secure Document Exchange
sponsored by IntraLinks, Inc
WHITE PAPER: This is Part I of a white paper series that examines online workspaces, a type of enterprise content management solution delivered in a Software-as-a-Service model. This paper provides an overview of online workspaces as an alternative to current document management methods.
Posted: 10 Mar 2009 | Published: 10 Mar 2009

IntraLinks, Inc

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

SearchSecurity.com

Counterparty Risk: Are We Leveraging Our Tools?
sponsored by Sybase, an SAP company
WHITE PAPER: While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more.
Posted: 22 Feb 2012 | Published: 22 Feb 2012

Sybase, an SAP company

Creating an Enterprise Mobile Management Regulated Solution for BlackBerry Enterprise Service 10
sponsored by BlackBerry
WEBCAST: This exclusive resource examines the enhancements that have been made in to BlackBerry ® Enterprise Service 10 and how it can support your organization's mobile needs in the regulated market in terms of security, mobile auditing, archiving and forensics.
Posted: 14 Nov 2013 | Premiered: Nov 14, 2013

BlackBerry

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Siperian, Inc.

CRO Survey: Risk, Regulation and Return
sponsored by IBM Line of Business
WHITE PAPER: To better understand the perspectives and concerns of today's CROs, the IBM Institute for Business Value interviewed banking risk management executives in depth and cosponsored a wider, cross-industry survey conducted by the Economist Intelligence Unit.
Posted: 18 Jul 2007 | Published: 01 May 2005

IBM Line of Business

CW Europe – September Edition
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Europe read how data discipline ensures you avoid data loss, as well as helping you to think clearer and to be organised.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

ComputerWeekly.com

Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance
sponsored by Silver Tail Systems
EGUIDE: This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.
Posted: 22 Feb 2011 | Published: 22 Feb 2011

Silver Tail Systems

Data Center Designs to Help Meet Your Compliance Challenge
sponsored by Iron Mountain
WHITE PAPER: This valuable resource reveals how the right data center services can help you successfully meet your industry-specific regulatory requirements and better support compliance.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Iron Mountain

Data Loss Prevention 2.0: Preventing the loss of confidential information via webmail, Facebook, wikis and blogs
sponsored by Code Green Networks, Inc.
WHITE PAPER: In today’s technology rich environment organizations are finding employees often post sensitive company information to insecure or public Internet sites using Web 2.0 applications. Code Green Networks TrueDLP provides organizations with a complete data loss prevention solution to stop the loss or theft of confidential or proprietary information.
Posted: 09 Nov 2009 | Published: 09 Nov 2009

Code Green Networks, Inc.

Data Monetization Strategies: Make and Save Money With Data and Analytics
sponsored by Information Builders
WHITE PAPER: Are you sitting on your data with no plan? Do you know how to capitalize on information you already have? This whitepaper dives into the world of profiting from data. Access now to discover 4 essential steps to getting started, as well as challenges to overcome and a discussion on the importance of data integrity.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Information Builders

Data Privacy e-Book
sponsored by SearchSecurity.co.UK
TECHNICAL ARTICLE: SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

SearchSecurity.co.UK

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

Data Security in the E-discovery Process
sponsored by SearchCompliance.com
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

SearchCompliance.com

Data, Disconnected: Communications Firms Take the Necessary Steps to Build Greater Accuracy into Their Customer Management Processes
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER: This white paper for the communications sector examines how inaccurate data can impact customer relationships and how implementing a multi-phase process can help feed cleaner customer data into enterprise solutions to maximize return on investment.
Posted: 20 Jan 2009 | Published: 20 Jan 2009

Pitney Bowes Group 1 Software

Database Security: Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 07 Sep 2010 | Published: 07 Sep 2010

Imperva
101 - 125 of 495 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info