risk audit

Results 51 - 63 of 63Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Nov 16, 2009
Is your information at risk? Read this whitepaper to find out how the IBM WebSphere MQ FTE solution, built on WebSphere MQ, offers reliable, secure and auditable file transfers.
Tags : ibm, ebf, websphere mq, file transfer edition, fte, ftp
     IBM
By: Prodiance Corp.     Published Date: Dec 22, 2008
Since the National Association of Insurance Commissioners (NAIC) made revisions to the Financial Reporting Model Regulation (Model Audit Rule) in June 2006, the insurance industry’s attention to the risks associated with financial reporting has been on the rise. Structured similarly to Section 404 of the Sarbanes‐Oxley Act, the Model Audit rule places a significant burden on C‐level executives to ensure their oversight in the internal controls for financial reporting (ICFR) process. Executives within these insurance organizations, both public and private, will be required to evaluate their internal controls in preparation for the first reports due in 2010 for the 2009 reporting period.
Tags : prodiance, sarbanes‐oxley act, security and integrity of data, analytics, risk assessment, optimization, security, it management
     Prodiance Corp.
By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
     Dell Storage
By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the challenges organizations face during identity and access management implementations, ways to avoid common pitfalls, and how you can achieve the greatest value from your deployment
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding, data management, data center
     Courion
By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the factors that impact enterprise security strategy, including regulatory pressures, demands from audit to demonstrate compliance, the increasing risk of data breaches.
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding, data management, data center
     Courion
By: Courion     Published Date: Aug 21, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding, security
     Courion
By: Quest Software     Published Date: Oct 25, 2012
Reduce the security risk and compliance concerns of unstructured data: emails, documents and spreadsheets. Unlike native tools, ChangeAuditor offers comprehensive, easy-to-use auditing, and more, to ensure security and regulatory compliance.
Tags : security, data security, file share security, sharepoint, file servers, netapp, data management, data center
     Quest Software
By: ServiceNow     Published Date: Jul 12, 2013
Organizations are faced with many auditing challenges and often find themselves defining controls in documents and spreadsheets, manually tracking audit task assignments and storing audit documentation in disparate locations. With the ServiceNow IT GRC functionality, organizations gain a central repository that contains policies, risks, controls, findings and more all in one place. It also provides a way to automate audit tasks for remediation efforts and a dashboard view to manage the entire audit process. Learn more during this upcoming webinar.
Tags : it governance, risk, compliance, servicenow, webinar, software development, it management, platforms, data management
     ServiceNow
By: NETIQ     Published Date: Mar 12, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that youre doing so.
Tags : security intelligence, compliance, log management, user activity monitoring, security
     NETIQ
By: NETIQ     Published Date: Sep 09, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that youre doing so.
Tags : security intelligence, compliance, log management, user activity monitoring, security
     NETIQ
By: IBM     Published Date: Jul 14, 2016
If your company is engaged in international activities, it's critical that you assess and understand the risks of non-compliance with the Foreign Corrupt Practices Act (FCPA). To avoid becoming a costly statistic, you need to design your controls accordingly. Download this white paper from experts Joseph Howell, Cofounder and Executive Vice President at Workiva, and Brent Macey, Director of Internal Audit for Schnitzer Steel Industries, Inc. They'll discuss the major components of the FCPA, and how companies can perform the risk assessment process in an efficient manner. They'll also provide a practical guide to implement internal controls for FCPA at an international level.
Tags : best practices, risk management, foreign corrupt practice act, technology, business management
     IBM
By: IBM     Published Date: Jul 14, 2016
Workiva commissioned Forrester Consulting to conduct a Total Economic ImpactTM study and examine the potential return on investment (ROI) enterprises may realize by deploying Wdesk for Controls Management. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Wdesk on their organizations and how it can be leveraged to optimize the processes necessary to deliver Sarbanes-Oxley (SOX) compliance. This in-depth financial summary finds a 238% three-year, risk-adjusted ROI for a large auto parts retailer. Key outcomes include reduced the effort required to formulate and update processes and controls for SOX compliance resulting in a three-year benefit of $190,568, and simplified audit efforts with improved audit trails in financial controls, delivering three-year present value benefits of $128,965.
Tags : cloud reporting, business management, economic impact, forrester, consulting, data center
     IBM
By: DigiCert     Published Date: Jun 19, 2018
Regulatory compliance is more than a series of rules to adhere to, and getting it right could save you time and money. Historically, compliance has been regarded as a checklist of fixed requirements. But this reactive outlook risks being too short-sighted. It can lead to higher compliance costs, audit deficiencies, greater business downtime and an increased risk of data loss. Furthermore, it can lead to missed opportunities to achieve greater levels of operational effectiveness for your business. The only way to achieve a greater level of operational efficiency is to adopt a proactive strategy and stay ahead of the compliance curve.
Tags : 
     DigiCert
Start   Previous    1 2 3     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com