it audit

Results 251 - 275 of 376Sort Results By: Published Date | Title | Company Name
Published By: AuditBoard     Published Date: Nov 26, 2018
Affecting over 200,000 machines in more than 150 countries, the ransomware known as Wanna Decryptor, or “WannaCry,” became the largest cybersecurity attack in history in May 2017. The malicious software locked out users from critical data, and demanded a ransom payment to unlock the contents. Governments, hospitals, and corporations scrambled to address the attack and prevent the infection from spreading. Ironically, the virus’ execution method was simple: it exploited a vulnerable Windows SMB protocol to spread – an exploit Microsoft had addressed two months prior to the attack with the release of a patch.
Tags : 
    
AuditBoard
Published By: AuditBoard     Published Date: Nov 26, 2018
You are the CAE of a mature company sitting with your external auditor, ready to kick off planning for the upcoming year. You’ve always been on top of your controls environment, and expect this upcoming year to go smoothly. However, mid-way through discussing your new areas of focus, the conversation goes astray as your auditor starts throwing out terms like “IPE” or “Electronic Audit Evidence” and says a whole new set of evaluation points will have to occur for every control test in your environment.
Tags : 
    
AuditBoard
Published By: AuditBoard     Published Date: Nov 26, 2018
Aggregating and analyzing internal organizational data, external subject matter expertise, and internal control-related data should provide the internal audit team a solid understanding of how the process works, the key risks managed by the process, and how the internal audit team should spend their time and resources to carry out the process.
Tags : 
    
AuditBoard
Published By: Tripwire     Published Date: Jul 05, 2007
Discover how high-performing IT organizations are able to create a culture that supports and uses change management to their advantage, facilitating enterprise business goals.
Tags : 
cmdb, configuration management, auditing, risk management, audit, risk audit, risk control, configuration control, compliance, tripwire
    
Tripwire
Published By: Tripwire     Published Date: Aug 21, 2009
This paper covers the implementation, disclosure and ongoing evaluation of internal controls for SOX compliance with a focus on the role of IT, as well as the penalties for non-compliance.
Tags : 
sarbane oxly act, sarbanes oxley, sox, sarbox, sarbanes-oxley, financial, it management, audit, compliance, auditing, enron, tripwire
    
Tripwire
Published By: Tripwire     Published Date: Jul 05, 2007
Find out about the requirements and issues addressed in corporate governance Bill 198, Canada's version of Sarbanes-Oxley, for internal controls for technology and how IT configuration auditing brings compliance.
Tags : 
sox, sarbanes-oxley, bill 198, canada, canadian financial, canadian sox, financial controls, compliance, compliant, tripwire
    
Tripwire
Published By: Tripwire     Published Date: Jul 13, 2007
In this whitepaper, you will learn how configuration audit and control can be used effectively to ensure system management productivity, and help reduce costs and sustain configuration viability within the bounds of operational, security and regulatory standards.
Tags : 
change management models, auditing, configuration management, security, change management, network security, efficiency, productivity, tripwire, cmdb, risk management, audit, risk audit, risk control, configuration control, compliance, tripwire, change control
    
Tripwire
Published By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : 
tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
    
Tripwire
Published By: Tripwire     Published Date: Jul 08, 2008
The Tripwire Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. This provides immediate visibility into the state of their systems, and through automating the process, saves time and effort over a manual efforts.
Tags : 
tripwire, iso, iso 27001, security, compliance, comply, isms, information security
    
Tripwire
Published By: Tripwire     Published Date: Jul 08, 2008
This paper outlines the nature of infrastructure integrity, change auditing, and compliance solutions. It describes how an investment in configuration assessment and change auditing solutions can stabilize IT operations, lowering the operational costs associated with the IT infrastructure; be a force multiplier; and provide a solid foundation that increases the effectiveness of the investment in information security.
Tags : 
tripwire, information security, infrastructure, change management, change, change auditing
    
Tripwire
Published By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : 
tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi, health and human services, hhs, health care, insurance, ehrs, electronic ph, ephi, access controls, password management, account management, access control, unique user identification
    
Tripwire
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire
Published By: Tripwire     Published Date: Jun 30, 2009
Learn the 5 core competencies of compliance and how to institute an automated compliance solution.
Tags : 
tripwire, banking, confidence, institution, regulatory, compliance, automated, solution, system, institution, change, documentation, control, security, audit, accountability
    
Tripwire
Published By: Tripwire     Published Date: Jun 30, 2009
Understand the issues addressed by the new international banking standard known as the Basel Committee on Banking Supervision (BCBS or Basel II), and find out how Tripwire can help meet all requirements of Basel II compliance even before it becomes a worldwide banking regulation.
Tags : 
tripwire, basel ii, compliance, banking, standard, committee bcbs, banking supervision, supervision, requirement, worldwide, regulation, security, control, documentation, audit, accountability, management, risk, data, system
    
Tripwire
Published By: Tripwire     Published Date: Jun 30, 2009
Learn about the financial institution safeguards included in the Gramm-Leach-Bliley Act (GLBA) and how your organization can institute an orderly set of compliance steps using an automated configuration audit and control solution.
Tags : 
tripwire, glba, compliance, managers, officers, directors, financial, institutions, safeguard, gramm leach bliley act, organization, solution, control, data automated, configuration, system, regulation, banking, administration, ncua
    
Tripwire
Published By: Tripwire     Published Date: Dec 16, 2009
This Prescriptive Guide outlines the steps information security managers can take to break the compliance blame cycle and build an information security program that works. It also describes how they can achieve alignment among all stakeholders so that information security and compliance activities become integrated into daily business operations.
Tags : 
tripwire, information security, audit fatigue, compliance, security risk
    
Tripwire
Published By: Tripwire     Published Date: Apr 21, 2010
Running scared from an upcoming PCI audit? There's a better way. It's called continuous compliance built directly into every day operations. The result is a virtual elimination of costly (not to mention scary) fire drills, even as credit card standards continue to evolve.
Tags : 
tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit, auditing
    
Tripwire
Published By: Tripwire     Published Date: Apr 21, 2010
Learn more about these challenges, how to address them, and how Tripwire IT security and compliance automation solutions can help.
Tags : 
tripwire, pci dss compliance, it security, automation solution, payment card industry, data security standard, audit
    
Tripwire
Published By: IBM     Published Date: Feb 11, 2015
IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.
Tags : 
security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems
    
IBM
Published By: IBM     Published Date: Feb 24, 2015
Read this report from Forrester Research to learnhow IBM ACM solutions improve the efficiency of knowledge workers, integrate with analytics to create upselling and cross-selling opportunities and reduce the cost and risk of regulatory fines through increased audit consistency.
Tags : 
ibm, acm solutions, cross-selling opportunities, audit consistency
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: Lancope     Published Date: Jun 21, 2014
Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.
Tags : 
lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence, network audit
    
Lancope
Published By: IAG Consulting     Published Date: Aug 24, 2010
Requirements quality is tangible. It is possible to look at the specific characteristics of requirements documentation and determine if it is sufficiently clear, accurate and complete to lead to a successful project. Since flawed requirements trigger about 70% of all project failures,1 this paper will present some hard and fast rules for looking at requirements documents, in any format, and being able to determine if they are reasonably well constructed. It will outline the key points to look for in a requirements document, and why this can save a company hundreds of thousands of dollars. Finally, it will offer five straightforward questions to address when evaluating requirements quality. The paper is not intended to be a full audit of requirements, but rather act as a guide and checklist for evaluation.
Tags : 
iag, project management, project management, maturity, consulting, business requirements
    
IAG Consulting
Published By: VeriSign Incorp.     Published Date: Jan 15, 2008
Provide your users with visual cues that indicate your site is secure. Extended Validation SSL can facilitate online commerce by increasing visitor confidence and reducing the effectiveness of phishing attacks.
Tags : 
shopping online, ssl certificate, extended validation, ca/browser forum, ssl certification authorities, certificate authority, ssl certificates, identity authentication, webtrust auditors, internet explorer 7, ie7, green address bar, security status bar, verisign secured seal, phishing, ev upgrader, verisign, verisign, verisign, ssl
    
VeriSign Incorp.
Published By: Splunk Inc.     Published Date: Jun 02, 2009
According to Forrester, organizations spent $1.5 trillion globally managing IT last year. 75% of this was spent on silos, legacy systems that still don't get answers to the most important questions: troubleshooting outages, investigating security incidents, and demonstrating compliance. Learn about the innovative software product forward-thinking organizations are using to dramatically improve their productivity and change the way they manage and secure IT.
Tags : 
it management, forrester, silos, legacy, data center, compliance, security, troubleshooting, secure data access, silo, splunk, secure, operations, compliance, audit, soa, virtualization, service-oriented architecture, service desk, productivity
    
Splunk Inc.
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.