information risk

Results 101 - 125 of 207Sort Results By: Published Date | Title | Company Name

Risk or Reward? Collaboration and Social Media In the Pharmaceutical Industry

Published By: Actiance, Inc.     Published Date: Jan 15, 2015
But what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA for use of these networks. Adopting new technologies that allow employees to share information and exchange ideas with each other and with your customers is often the best way to achieve better business results, but doing so can involve considerable risk. That’s because the content people create using these technologies is subject to the scrutiny of regulators, legislators, and litigators. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Pharmaceuticals companies must be knowledgeable of, and abide by, specific information retention regulations in every country where they do business, including those countries that prohibit data from leaving the countries’ borders. Not having technology in place to help manage these requirements and increasing risks, or
Tags : 
collaboration, social media risk and reward, retention regulations, data, business requirements, it management, enterprise applications
    
Actiance, Inc.

Social Media Risks and Benefits for the Pharmaceutical Industry

Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Social Media Risks and Benefits for the Pharmaceuticals Industry Drug makers are just beginning to realize how social networks can improve business processes. Social media helps your organization share information and exchange ideas with your customers quickly, but doing so can involve considerable risk. That’s because social media is subject to the scrutiny of regulators, legislators, and litigators. So, what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Not having technology in place to help manage these requirements and increasing risks, or doing so without careful planning, can be a costly mistake. Read this paper to gain an understanding of: What the regulatory landscape of the pharmaceuticals industry looks like What concerns you should be aware of f
Tags : 
social media, increased risks, business processes, regulatory requirements, it management
    
Actiance, Inc.

Sans Healthcare

Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys

Guide to IT Security Breach Prevention Part II: Reducing Mobile, Web, and Social Media Risk

Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part II: Reducing Mobile, Web, and Social Media Risks.
Tags : 
kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, mobile risks, web risks, social media risks, security, wireless security, best practices, risk management, data protection
    
Kaspersky Lab

Principles for Improving Internal Audit’s Value Proposition

Published By: ARMA     Published Date: Nov 04, 2014
All organizations depend on information to manage day-to-day operations, comply with regulations, gauge financial performance, and monitor strategic initiatives. This critical information resides in the organization's business records. As internal auditors conduct their annual risk assessment, they should consider how well business records are managed and assess the degree to which the risks to this information are understood.
Tags : 
value proposition, financial performance, internal auditors, annual risk assessment, it management, knowledge management, best practices, business intelligence, business management
    
ARMA

Step Out of the Bull’s-Eye: Protecting Your Company from Advanced Threats and Targeted Cyberattacks

Published By: Kaspersky Lab     Published Date: Oct 30, 2014
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage. Regardless of the adversaries’ motives, corporations understand the need to implement defensive measures to secure their infrastructure and sensitive data while mitigating the risk of future attacks.
Tags : 
financial profit, economic espionage, it security, risk mitigation, security, it management, knowledge management, business intelligence, business management
    
Kaspersky Lab

Buyer's Guide for Extended Collaboration

Published By: Intralinks     Published Date: Oct 30, 2014
Are you struggling with finding an enterprise collaboration solution that’s both easy to use and secure enough for your organization to share information outside the firewall? With the infiltration of consumer devices and applications into the enterprise, it’s even more difficult to control access to confidential data while enabling employees to get work done. This 16-page Buyers Guide to Enterprise Collaboration addresses the three key drivers of the selection process: Risk management strategy Accelerating business productivity Improving IT efficiency Even if you are already in an RFP process, or just starting to figure out your requirements, this Buyers’ Guide provides insight into the factors you should be considering, keepi
Tags : 
enterprise collaboration, firewall, risk management strategy, business productivity, it efficiency, security, enterprise applications
    
Intralinks

2014 Top Insights for Legal, Risk & Compliance Executives

Published By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB

Case Study: Maximize productivity with a healthy EHR core

Published By: Allscripts     Published Date: Oct 20, 2014
Download this case study to learn how Allscripts Professional solutions have enabled Pulmonary Associates of Richmond to meet Meaningful Use, earning incentives of $714,000.
Tags : 
allscripts, pulmonary associates, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts

Case Study: Forward-looking practice uses EHR to move toward new payment models

Published By: Allscripts     Published Date: Oct 20, 2014
Download this case study to learn how Allscripts Professional solutions have helped Cornerstone Medical Care in Brandon, Florida negotiate value-based contracts, accounting for a seven-figure increase in revenue.
Tags : 
allscripts, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts

Social media and HR—friends or foes?

Published By: Sage     Published Date: Oct 14, 2014
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, human resources, recruit, risk, intellectual property
    
Sage

Develop an intelligent disaster recovery solution with cloud technologies

Published By: IBM     Published Date: Oct 14, 2014
If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.
Tags : 
disaster recovery operations, cloud technologies, cloud computing, critical business aplplications, it management, knowledge management, business analytics, business intelligence, business technology
    
IBM

Business Transformation: A Roadmap for Maximizing Organizational Insights

Published By: SAS     Published Date: Sep 30, 2014
When Information Revolution1 was published in 2006, no Chinese based companies were among the top 10 largest companies by market capitalization. Apple didn’t sell phones. Facebook was something college kids used to connect with their friends. Back then, we talked a lot about the amount of data coming in and faster processing speed. What we believed then remains true today: Data, and the decision-making process, can be moved throughout the organization to equip every decision maker (automated, line worker, analyst, executive) to make the best choices. By operationalizing analytics, organizations can identify and quantify both opportunity and risk. Information Revolution highlighted SAS’ Information Evolution Model, which helps organizations understand how they interact with their information and how to extract more value from it through analytics.
Tags : 
sas, organizational insights, operationalizing analytics, sas’ information evolution model
    
SAS

NC State on Big Data on IBM Power Systems for Critical Decision Making

Published By: IBM     Published Date: Sep 16, 2014
To compete in today’s rapidly changing business environment, organizations need to capture, analyze and act on information rapidly. If they can quickly identify trends, discover patterns and generate new insights, they can address a wide array of strategic and operational goals—from increasing customer loyalty and creating targeted marketing offers to enhancing operational efficiency and reducing risk. In their report, Business Value of Big Data on Power Systems, NC State University talks about unlocking the business value of big data, and how IBM Power Systems can deliver the foundation for organizations to bring insight to the point of impact faster.
Tags : 
big data, targeted marketing offers, ibm power systems, structured data, data management, business analytics, business intelligence, business management
    
IBM

Maximizing Data Security with Whitewater Cloud Storage Gateways

Published By: Riverbed     Published Date: Sep 05, 2014
Information is becoming the currency of the 21st century, and organizations of all sizes are creating more information than ever before. Frequently, organizations struggle with how best to balance storage requirements with available budgets. The benefits of greater storage capacity are clear: better change management and roll-back, easier archival and discovery, reliable backup and recovery. But to continually grow on-site capacity requires unsustainable investment and introduces unnecessary risk. Prominent cloud service providers present an appealing alternative with their vast amounts of storage, offering low cost, high availability, and built-in redundancy. Riverbed’s Whitewater® family of cloud storage gateways is a drop-in replacement for existing tape- and diskbased backup targets, cuts backup costs 30-50% compared to tape and disk, and provides effective DR capability with minimal effort.
Tags : 
data security, cloud storage, gateways, requirements, archival, discovery, management, storage, data management
    
Riverbed

Fireblade's Web Application Security Explained

Published By: Fireblade     Published Date: Aug 21, 2014
Fireblade has developed an innovative behavioral approach to website security. It inspects users’ behavior and interactions with and relays the aggregated information to a central cloud, where a continual, real-time risk assessment process uses big data to discern legitimate users from attackers and abusers. Download this whitepaper to learn about this new approach.
Tags : 
fireblade, web application security, cloud security, interactions, cloud computing, hackers, attackers, cyberattack, central security cloud, network security, hacker detection, intrusion detection, data protection
    
Fireblade

Social media and HR—friends or foes?

Published By: Sage     Published Date: Aug 19, 2014
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, human resources, recruit, risk, intellectual property
    
Sage

Mobile is the New Normal for Conducting Business

Published By: Globalscape     Published Date: Aug 13, 2014
Mobile devices have offered organizations unparalleled access to information and a new level of flexibility in doing business. However, with this newfound freedom comes inherent risks and the danger of security breaches. This whitepaper discusses the growth of mobile devices in the workplace, inherent security issues in common file sharing services, and what organizations can do to enforce BYOD security policies without limiting the productivity of its employees.
Tags : 
globalscape, mobile, business, byod, security, business technology
    
Globalscape

Develop an intelligent disaster recovery solution with cloud technologies

Published By: IBM     Published Date: Jul 09, 2014
If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.
Tags : 
ibm, disaster recovery, disaster recovery solution, cloud technology, it operation, restoration, disaster as a service, draas, recovery point objectives, rpo, recovery time objectices, rto, virtualized server recovery, it management, risk management, server virtualization, search and retrieval
    
IBM

5 Ways to Reduce Your Risk of Non-Compliance

Published By: Paycor     Published Date: Jun 05, 2014
Did you know the Department of Labor assessed $82 million in penalties in 2013? Misclassified employees, lack of documentation, payroll errors and employment discrimination lawsuits add up to costly mistakes for healthcare organizations every day. If you’re using spreadsheets to track employee data and relying on disconnected information systems, your organization is at risk of becoming a statistic. This whitepaper will empower you to mitigate risk and ensure your organization can continue to serve its mission.
Tags : 
healthcare, compliance, labor law, wage and hour, tax law, healthcare reform
    
Paycor

Security Innovation Council Report: TRANSFORMING SECURITY: DESIGNING A STATE-OF-THE-ART EXTENDED TEA

Published By: EMC Corporation     Published Date: May 27, 2014
The information security mission is no longer about implementing and operating controls. This report by the Security for Business Innovation Council (SBIC) describes how information security teams are transforming to include a much broader set of technical and business-centric activities, to better manage the wider risks to information assets.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
    
EMC Corporation

Ten Information Risk Questions Every GC Should Ask the CIO

Published By: CEB     Published Date: May 19, 2014
This document helps general counsel identify potential information technology issues that may create legal or regulatory risks. General counsel should use the ten questions and our guidance on what to listen for in the CIO's response to pressure test the company's IT management and security controls.
Tags : 
ceb, cio, information risk, it management, security controls, general counsel, regulatory risks, security
    
CEB
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.