compliance risks

Results 26 - 50 of 60Sort Results By: Published Date | Title | Company Name
Published By: SailPoint Technologies     Published Date: Sep 16, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: Brainloop     Published Date: Nov 09, 2011
This white paper by Cheryl Klein, CPA, CISA, CITP, analyzes 10 questions that help identify compliance risks in your company. The 10 scenarios illustrate smart, cost-effective strategies for SOX, PII, HIPPA and security policy issues.
Tags : 
brainloop, security, compliance risks, sharing information, security management, data protection
    
Brainloop
Published By: NAVEX Global     Published Date: Apr 20, 2018
Our new market report takes an in depth look at recent developments and offers insight into running a compliant and ethical global business. With primary research and articles written by industry experts, you’ll get answers to some of today’s most important questions like: How are businesses navigating the risks posed by global supply chains? Have compliance risks changed since the rise of anti-corruption purges? How do you set the right tone for disclosing misconduct in the workplace? How can I evaluate the integrity of third parties within the era of fake news?
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Apr 20, 2018
Discover how organisations similar to your own are developing an effective ethics and compliance programme to improve workplace culture and reduce compliance risk. Our new research will help you identify the most appropriate activities to consider for your own programme, provide the data to help benchmark your results, and the guidance to improve buy-in and programme resources. What you'll learn: How are new regulations changing potential ethics and compliance risks? What challenges do compliance professionals face when trying to improve company culture? How are organisations investing in compliance activities? What results are compliance programmes achieving?
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 31, 2018
The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and compliance programmes through industry evidence and insights. Each programme is unique, with disparate risks and various levels of maturity, so not everything in this guide will apply to every programme. It is designed to help you perform a robust gap analysis of your unique programme and guide you through best practices to achieve the next level of programme sophistication right for your organisation. What you'll learn: How internal and external parties define programme effectiveness The eight essential components of an effective ethics and compliance programme How to share your assessment in a meaningful way
Tags : 
    
NAVEX Global
Published By: Intralinks     Published Date: May 29, 2013
The monolithic corporation we grew up with is being replaced by ecosystems of more specialized business entities, sometimes called “extended enterprises.” With this evolution has come a need for closer inter-enterprise collaboration and information flow – but with it also comes increased security and compliance risks.
Tags : 
secure, collaboration, cloud, inter-enterprise, information, compliance, strategies
    
Intralinks
Published By: Pega     Published Date: Sep 11, 2015
Download thsi white paper to learn how financial institutions can implement full end-to-end compliance and risk management through Pega BPM: -Transforming compliance from burden to benefit -Ensuring KYC, Suitability and Affordability compliance -Managing and measuring complaints to resolution -Providing governance, control and transparency around new products -Agility to extend to new risks and regulatory requirements -One common platform with specialized rules by regulatory requirement, geography and risk type
Tags : 
    
Pega
Published By: Skillsoft     Published Date: Mar 06, 2014
Compliance training is a necessity to reduce the liability and legal risks businesses face on a daily basis.
Tags : 
risk management, compliance, code of conduct, governance, risk assessment, safety, training, risk prevention, skillsoft, human resources, corporate counsel
    
Skillsoft
Published By: Intralinks     Published Date: Jan 24, 2013
In the form of a Q&A with expert IDC analysts, this white paper explores what tools and technologies are being adopted to facilitate Extended Enterprise Collaboration (such as cloud-based solutions).
Tags : 
secure, intralinks, compliant, cloud based, tools, technologies, security, compliance risks
    
Intralinks
Published By: ADP     Published Date: May 02, 2018
Software, outsourcing, service bureau, ASO, PEO… it’s little wonder the market for payroll solutions has a reputation for being confusing and hard to navigate. Where does one solution end and the other begin? And how do you know which one you need? This complexity is the reason we’ve created a comparison guide. Businesses have a wide spectrum of payroll options to choose from, and there are big differences between them, so like-for-like comparisons aren’t possible across categories. Before you start comparing vendors head-to-head, you need to decide which payroll style is best for you. And before you make that decision, you need to know what you want in return. Are you looking to save money? Save time? Eliminate errors? Do you want help minimizing tax compliance risks? There are plenty of options available, and they all come with different pros and cons.
Tags : 
    
ADP
Published By: BlackLine     Published Date: Aug 23, 2019
Accounting and finance leaders are expected to deliver accurate, compliant, and real-time analysis of their organization’s financial performance at all times. But many institutions wrestle with outdated systems and processes that don’t meet the needs of today’s business. Leading organizations are transforming their finance operations to reduce compliance risks and gain greater efficiencies.
Tags : 
    
BlackLine
Published By: HP Service Management     Published Date: Sep 03, 2008
In this first chapter of "The Shortcut Guide to IT Service Management and Automation," you will be led through a step by step analysis of your company's IT and business relationships, providing you with a basis for a strategic plan to turn service lifecycle management into a valuable business asset. Author and compliance expert Rebecca Herold demonstrates how technology acts as a strategic differentiator by enabling business growth, driving operational efficiencies to lower maintenance costs, optimizing outcomes, and reducing IT risks.
Tags : 
itil, itil v3, bsm, bsa, dca, itsm, it service management, operations, it operations, cmdb, automation, service, service management, service desk, lifecycle, life cycle, hpsm, hp sm, hp service management
    
HP Service Management
Published By: NAVEX Global     Published Date: Mar 04, 2014
The following six lessons will help you assess the focus of your compliance training program and formulate a strategy to tackle your biggest training risks.
Tags : 
navex global, compliance training, compliance implementation, effective compliance, risks, hr issues, human resources, compliance mix, training programs, compliant culture, risk assessment, qualified third parties
    
NAVEX Global
Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents
    
OpenText
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : 
saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering
    
Trend Micro SaaS
Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Cheryl Klein analyzes 10 questions that help you identify potential compliance risks in your company. The 10 different scenarios illustrate smart, cost-effective strategies for SOX, PII, and HIPPA compliance issues where information must be kept confidential.
Tags : 
brainloop, technology, security, compliance
    
Brainloop
Published By: Kroll Advisory Solutions     Published Date: Aug 02, 2013
First launched in 2011, the Anti-Corruption Benchmarking Report aims to give compliance officers a comprehensive view of the "ABC" (anti-bribery and corruption) risks they have, the resources they have to fight them, and how those resources are implemented into compliance programs. The results give compliance officers a view into the anti-bribery and corruption threats they face and share resources for creating a risk-based compliance program. Download the report to learn more.
Tags : 
compliance, corruption, anti-bribery, risk assessment, compliance programs, compliance risk
    
Kroll Advisory Solutions
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Privileged access management can not only reduce your enterprise’s exposure to these risks but also improve IT reliability and reduce IT costs. Download the white paper: Three Important Reasons for Privileged Access Management (and One Surprising Benefit). You’ll discover how a privilege access management solution can ensure: • Comprehensive compliance such as the Sarbanes-Oxley Act for responsible governance. • Ensure business integrity and responsible business processes. • Tackle security risks, both inside and outside the organization. • Realize bottom-line IT cost benefits.
Tags : 
privileged access management, it cost benefits, comprehensive compliance, business processes, it reliability
    
Centrify Corporation
Published By: IBM     Published Date: Feb 11, 2015
IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.
Tags : 
security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity
    
IBM
Published By: Brainshark     Published Date: Oct 16, 2013
Banking, insurance, securities and investment firms are challenged to keep employees, broker dealers, investors and others current in a world of constant change. Enabling video and mobile communications is the most efficient way to clearly communicate and stay ahead of competitors and changing regulations. Discover how 8 out of the top 10 US financial institutions use Brainshark communications to increase compliance, decrease risks, and lower the costs of communications.
Tags : 
finance, financial services, banking, investment, insurance, broker, credit union, banks, compliance, audit, sales, training, communications, certification, powerpoint, ppt, presentation, training video, partner training, brainshark
    
Brainshark
Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents
    
OpenText
Published By: IBM     Published Date: Aug 21, 2008
Today’s increasingly complex environments are a challenge to manage. This white paper will show you how IBM Service Management solutions from Tivoli can help you better understand your IT and operation environments and manage your business more efficiently—all while controlling costs and mitigating compliance risks. You’ll also discover how IBM Maximo Enterprise Asset Management solutions provide a single software platform for managing all IT and operations assets across your enterprise.
Tags : 
ibm, ibm mi, ibm grm, service management, tivoli, business management, maximo, it management
    
IBM
Published By: Symantec     Published Date: Nov 09, 2006
Security and compliance risks are greater than ever, and businesses depend on their data being protected when stored internally and taken offsite. New encryption capabilities offered by Backup Exec 11d for Windows Servers offer secure protection from unauthorized access. Learn more about encryption capabilities in Backup Exec 11d.
Tags : 
backup, backup and recovery, disaster recovery, compliance, data protection, encryption, access control, backup exec, data backup, symantec
    
Symantec
Start   Previous    1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.