Getting regulatory compliance wrong can be detrimental for any business. However, adhering to today’s complex regulatory environment requires careful planning. With a wide range of information related regulation from the Data Protection Act to HIPPA and the Computer Misuse Act your business as a financial entity must also implement appropriate operational risk frameworks (BASEL 2).
IThound’s resources include white papers, best practices, analyst reports and case studies that can help ensure your business is compliant.
Company: Quest Software UK
Monitoring Active Directory isn’t a new idea, but early techniques and tools were limited and often did not give complete data. This paper focuses on LDAP monitoring, a fundamentally different method. VIEW SUMMARY
Category: Auditing | Published: November 2012| Type: White Paper
Rating: + 1
Lots has changed since the last major European law on data protection. Mobile working has boomed, meaning sensitive company data is now at risk. This white paper discusses what the new EU-wide General Data Protection Regulation reform proposals will mean to companies globally. Read to find out more. VIEW SUMMARY
Category: Enterprise Data Protection | Published: November 2014 | Type: White Paper
Rating: + 3
Company: Carbon Trust
The Energy Savings Opportunity Scheme (ESOS) is a policy that aims to increase energy efficiency to mitigate climate change. Read this guide to explore the background and policy aims, how it will affect your business, how to comply, what the benefits are and how to achieve the real value of ESOS. VIEW SUMMARY
Category: Energy Efficiency | Published: October 2014 | Type: White Paper
Company: IBM United Kingdom Limited
Insurance is a data-intensive industry. By taking the steps discussed in this paper, insurance companies can safeguard sensitive personal data, meet regulatory and compliance requirements and provide a better service to the customer. VIEW SUMMARY
Category: Master Data Management | Published: May 2014 | Type: Analyst Report
An organisation has multiple stakeholders that need to be communicated with or reported to on a regular basis.Ensuring that all the stakeholders’ information needs are met requires a holistic approach to managing information – the creation of a GRC platform. Read this paper to find out more. VIEW SUMMARY
Category: Data Governance | Published: December 2013 | Type: White Paper
Rating: + 1
Identifying and understanding information security and privacy laws can be a complex task. Threats to your information, such as phishing and malware, are on the rise. In this paper, we consider how security awareness training can help mitigate inside and outside attacks by educating your workforce. VIEW SUMMARY
Category: Compliance | Published: December 2013 | Type: White Paper
Many organisations don't realise that the AS/400 has an SQL visbility problem. Unaware organisations are likely to face security problems and compliance fines. Unauthorised users on IBM i can access sensitive data, none of which is monitored. Read to find out more about these security issues. VIEW SUMMARY
Category: Access Control | Published: October 2013 | Type: White Paper
PCI compliance is serious, but proving it is time-consuming, complex and costly. When this compliance is called into question, a decentralised network infrastructure makes it inefficient for data security teams to resolve issues. Read this case study to explore the pain points of compliance. VIEW SUMMARY
Category: Data Security | Published: July 2013 | Type: Case Study
Rating: + 2
It is something we all do every day, so surely email management should be your organisations number one priority? Improper email management can lead to many risks so it imperative that you get it right, read this whitepaper to find out how. VIEW SUMMARY
Category: Email Management | Published: November 2012 | Type: White Paper
Rating: + 2
What's more important, security or compliance? Most IT shops are focused on compliance but breaches are still happening. A recent study concludes that evidence of those breaches tends to be right there in log files. But CISOs aren’t tapping into that intelligence and many breaches go undetected VIEW SUMMARY
Category: Regulatory Compliance (Basel II / Sarbanes Oxley/ HIPPA ) | Published: October 2012 | Type: White Paper
As a member you receive free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.
© Incisive Business Media (IP) Limited 2014, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013.