compliance

Results 1751 - 1775 of 2045Sort Results By: Published Date | Title | Company Name

The Importance of Cyber Resilience and Incident Response for Financial Institutions

Published By: BAE Systems     Published Date: Jan 06, 2016
For most financial institutions, it’s no longer a question of ‘if’ but ‘when’ they’ll be attacked.. If you’re like most financial institutions, you have controls that identify breaches, but need proper procedures that’ll enable you to recover from such an event. In this presentation at the CUNA Technology Council Conference, Tom Neclerio, BAE Systems’ VP of Cyber Consulting Services, discusses the current threats across the financial marketplace and explores strategies for implementing a successful incident response program as outlined in the FFIEC’s cyber resilience guidance.
Tags : 
bae systems, applied intelligence, cyber security, cyber resilience, incident response, financial institution, data breach, cyber attack, ffiec, compliance, regulations, security challenges, regulatory compliance, cyber professional services, risk assessment, vulnerability, penetration testing, crimeware, phishing, critical infrastructure
    
BAE Systems

The Importance of Foundational Security in Public Sector Networks

Published By: Cisco     Published Date: Dec 21, 2016
Across organizations from all sectors, the network is becoming more integral to daily operations. This is acutely felt by public sector organizations in the United States, namely federal, state, and local governmental organizations. Public sector organizations contend with the challenge of ensuring the security of highly sensitive data on the network in the midst of uncertain budgets and, in many cases, outdated infrastructure. At the same time, many public sector organizations grapple with a complex web of compliance protocols that must be supported on the network. This Analyst Connection explores the need for network infrastructure upgrades that include "foundational security."
Tags : 
    
Cisco

The Increasing Role of Compliance Mandates: Archive Management

Published By: Xiotech     Published Date: Mar 01, 2007
Many organizations have no policies in place for retaining, managing, and purging documents. This paper looks at some of the basic components of a document strategy—retention, management, and destruction—and highlights some of the current compliance drivers that make it all necessary.
Tags : 
archive management, email archiving, email archive, data warehousing, compliance, data retention, xiotech, data management, document management
    
Xiotech

The Intersection of Compliance and Protection: The Case for Daily Wear PPE Programs

Published By: Westex     Published Date: Aug 01, 2018
Meeting the needs of compliance standards while keeping your workers protected is a top priority for those in the electrical industry. There are a number of measures you can take to help keep your workers safe, starting with a sound personal protective equipment (PPE) program. In this new white paper, we detail the key changes found in the 2018 edition of NFPA 70E, and explain how daily wear PPE may help enhance both compliance and worker protection when compared to traditional task-based PPE.
Tags : 
nfpa, nfpa 70e, arc flash, ppe, flame resitance, arc resistance, fr fabric
    
Westex

The Intersection of Security & Compliance: The New Risk Assessment

Published By: RiskWatch     Published Date: Feb 05, 2007
As corporate security policies and compliance regulations are created to address the increasingly dangerous post 9/11 environment, security risk management is becoming an increasingly important tool in corporate governance. Learn more in this white paper by RiskWatch.
Tags : 
network security, security, compliance, glba, hipaa, risk assessment, risk management, hipaa compliance, return on investment, roi, riskwatch
    
RiskWatch

The IT Manager's Working Guide to Sustainable SOX Compliance

Published By: SoftLanding Systems     Published Date: Nov 18, 2006
If you are spending too much time and money on SOX compliance, this white paper will help you identify where investments in technology could really pay off in time for your next SOX audit.
Tags : 
compliance, sarbox, sox, sarbanes oxley, sarbanes-oxley, sox compliance, sox audit, change management, access control, softlanding, soft landing, it management, sarbanes oxley compliance
    
SoftLanding Systems

The Journey to a Multi-Cloud Infrastructure

Published By: Intel     Published Date: Sep 20, 2019
Skilled IT teams understand that one cloud does not fit all. Compliance issues may demand that some data be held internally. Budget-imposed total cost of ownership (TCO) limits may push other data out to public clouds. Hence, a scalable multi-cloud infrastructure becomes imperative. This whitepaper addresses key questions commonly raised by CIOs considering the move to multi-cloud. Further, it sheds light on how Intel® technologies such as the 2nd Generation Intel® Xeon® Scalable processors and Intel® Optane™ DC Persistent Memory can help boost your cloud credentials.
Tags : 
    
Intel

The Land of Unusual Leaves: It's a Jungle Out There

Published By: Optis     Published Date: Nov 06, 2014
What you don’t know could hurt you. From short-term family leave that only Vermont offers to leave that 25 states offer for victims of crime and violence, the land of unusual leaves is full of potential pitfalls and hazards for HR.
Tags : 
leave, leave management, employee leave, paid leave, unpaid leave, state leave, fmla, state fmla, time off, leave compliance, federal leave laws, leave management solution, leave management system, cloud-based leave management system, leavexpert®
    
Optis

The Legal and Commercial Risks and Issues to Consider When Managing Emails

Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, disaster recovery, email security, encryption, high availability, security management
    
Mimecast

The LMS Requirements Trail Map

Published By: Absorb     Published Date: May 09, 2018
eLearning has become the prevailing approach to employee onboarding, compliance training, and professional development. The efficiencies that eLearning affords stem from automation, customization and self-service. These attributes allow end users (employees and others) to access just the right training at just the right time. They also provide Learning and Development administrators the peace of mind that training will be delivered as needed, in a consistent manner and that tracking the progress of individuals will also be made simpler by automation.
Tags : 
lms, employee, training, efficiencies, elearning, automation
    
Absorb

The Logic and Value of a Tiered Archive

Published By: Imation Scalable Storage     Published Date: Apr 06, 2012
Learn how a tiered storage solution can help your business realize excellent reliability, protection and compliance in the face of extreme data growth.
Tags : 
imation, tiering, data, recovery, scalable, scalable storage, protect, connect, store, retention, retrieval, recover, mobile security, consumer, security, storage
    
Imation Scalable Storage

The Many Ways Cloud Can Facilitate Growth

Published By: Epicor     Published Date: Nov 07, 2017
Every manufacturing company has aspirations to grow. Growth is exciting, yet it can also be challenging. Arm yourself with the right enterprise applications and technology, and consider cloud ERP software as an important component of your arsenal as you strive for growth and battle for market share. This report from Mint Jutras—an independent research and advisory firm that specializes in analyzing the business impact of enterprise solutions—highlights how cloud applications allow businesses to grow by: • Quickly expanding into new territories • Tightening compliance and governance • More effectively implementing standard processes • Achieving greater visibility into the enterprise Download the Mint Jutras report today to learn how cloud ERP from Epicor can help your business grow.
Tags : 
erp software, cloud erp, manufacturing, epicor erp, cloud applications
    
Epicor

The Many Ways Cloud Can Facilitate Growth

Published By: Epicor Software Corp     Published Date: Nov 07, 2017
Every manufacturing company has aspirations to grow. Growth is exciting, yet it can also be challenging. Arm yourself with the right enterprise applications and technology, and consider cloud ERP software as an important component of your arsenal as you strive for growth and battle for market share. This report from Mint Jutras—an independent research and advisory firm that specializes in analyzing the business impact of enterprise solutions—highlights how cloud applications allow businesses to grow by: • Quickly expanding into new territories • Tightening compliance and governance • More effectively implementing standard processes • Achieving greater visibility into the enterprise Download the Mint Jutras report today to learn how cloud ERP from Epicor can help your business grow.
Tags : 
erp software, cloud erp, manufacturing, epicor erp, cloud applications
    
Epicor Software Corp

the Mastering the Complexity of Revenue Management white paper

Published By: Intacct Corporation     Published Date: Jan 26, 2016
Get the white paper "Mastering the Complexity of Revenue Management" to learn: • 5 specific steps you can take to ensure better compliance, improved visibility, and lower costs. • 9 key revenue management technology requirements that decision makers can't afford to miss. • Why Vendor Specific Objective Evidence (VSOE) is worrying more and more revenue managers and what you need to do about it. • 7 benefits that optimized revenue management brings to your organization, including accelerated closing, reduced revenue leakage, and forecasting visibility.
Tags : 
    
Intacct Corporation

The Method Behind PCI's Madness

Published By: LaGarde     Published Date: Sep 10, 2008
It's difficult to pick up a news report without reading about another data breach or case of identity theft. With so much personal and financial information stored and transmitted electronically, consumers are at greater risk than ever of becoming victims of fraud.
Tags : 
lagarde, pci, pci-dss, pci dss, compliance, credit card, payment card, data protection, identity theft, pci compliance
    
LaGarde

The Need for Disk Encryption and Advanced Password Protection in Healthcare

Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc

The Need for Effective Event Management

Published By: GFI     Published Date: Jun 14, 2007
This white paper shows where GFI EventsManager fits in this picture and how it is an invaluable asset in the corporate toolbox.
Tags : 
event management, performance management, employee performance, roi, return on investment, information management, records management, network management, compliance, records, gfi
    
GFI

The New FCA Whistleblower Rules: What You Need to Know

Published By: NAVEX Global     Published Date: Oct 18, 2016
This paper summarises: What the new FCA whistleblower rules are and why they were introduced, how the rules will impact your company’s ethics and compliance efforts and what actions to take both before and after the rules are fully enforced
Tags : 
    
NAVEX Global

The New Prescription for Privacy: Understanding and Meeting Security Requirements

Published By: Symantec Corporation     Published Date: Oct 03, 2013
This report looks at the challenges and requirements of protecting confidential patient data online, the risk of security breaches in the world of EHR, and the measures that healthcare organizations must take in order to achieve and maintain compliance.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation

The New Realities of Data Governance in a Regulated World

Published By: Hitachi Vantara     Published Date: May 10, 2018
Digitizing communications governance is critical as banks adopt next-generation automation and RegTech solutions to address compliance and risk-mitigation measures. Regulations are changing risk profiles, requiring oversight of the culture of risk-taking, and preventing market abuse. Hitachi Vantara solutions enable you to centrally “capture, curate, consume” all regulated employee communications across the front office, middle office and back office.
Tags : 
    
Hitachi Vantara

The New Science of Sales Performance

Published By: Anaplan     Published Date: Mar 05, 2015
Many sales organizations continue to operate as they have for years: At headquarters, executives work with sales leaders to set revenue targets for the year. Sales teams receive top-down goals, which cascade across product lines, channels and other business dimensions. The end result is an account-level target, which is assigned to a sales rep. Because most companies do not have an easy way to complete this process—nor do they use a common system of record—they must resort to the quickest and easiest mechanism at hand: spreadsheets, a nonscalable, single-dimensional solution that does not handle complete data sets. This approach also poses challenges across key sales management functions, including planning, execution and optimization.
Tags : 
consolidation, planning, survey, performance, sales, audience, finance, strategic exercise, compliance, software soliutions, knowledge management, business technology
    
Anaplan

The New Threat: Attackers That Target Healthcare Organizations (And what you can do about it)

Published By: Third Brigade     Published Date: Aug 21, 2009
Healthcare organizations are being targeted by financially motivated attackers that steal and sell valuable data, including identities and computing resources. This white paper defines the new threat, and outlines three important steps that providers can take to protect their critical systems.
Tags : 
hipaa, hipaa compliance, network security, network security appliance, security management, intrusion prevention, intrusion detection, hacker detection, ips, host-based ips, third brigade, security, access control, application security, authentication, firewalls, internet security
    
Third Brigade

The Nuts and Bolts of T&E Policies

Published By: Concur Technologies     Published Date: Oct 09, 2015
Millions in losses, millions more in fines. Yet research shows 82% of travel and entertainment fraud is committed by just 5% of employees. This eBook explains what’s at stake and how automating expense reports can uncover fraud or head it off before it happens, and help employees make the right choices.
Tags : 
t&e, concur, compliance, financial services, fraud
    
Concur Technologies

The OFAC 50% Rule: When Government Lists Are Not Enough

Published By: Factiva     Published Date: Dec 01, 2015
When compliance managers think about the good old days, they do not have to look back too far. In fact, prior to 2008, the world was a much simpler place: the U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) published a list of sanctioned companies and individuals, and as long as their company was not doing business with any person on that list, they seemed to be in good shape. This was definitely not an easy task. However, after 2008, it became more complicated when OFAC guidance stated that an ownership interest of 50% or more by a sanctioned subject was blocked or otherwise limited.
Tags : 
compliance, ofac, sanction
    
Factiva

The Paperless Future of Healthcare and Life Sciences

Published By: DocuSign     Published Date: Mar 23, 2016
Download this complimentary whitepaper and discover how DocuSign’s eSignature solutions modernize healthcare and life sciences organizations by eliminating paper and antiquated signature processes while meeting compliance requirements and reducing costs and errors.
Tags : 
    
DocuSign
Start   Previous    64 65 66 67 68 69 70 71 72 73 74 75 76 77 78    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.