RSS feed Get our RSS feed

News by Topic

compliance assessment

Results 26 - 46 of 46Sort Results By: Published Date | Title | Company Name
By: Skillsoft     Published Date: Oct 03, 2014
To compete in todayís global marketplace, employees at every level of your organization need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions ó even when no one is watching. Sixty-two percent of organizations cite risk management and assessment as a top-three concern when asked about elements of success. Many companies struggle to meet this challenge, but an effective compliance training program can foster a culture of workplace best-practices from the boardroom all the way to the shop floor. Here are 10 questions that you may find useful to consider when planning or reviewing your code of conduct program.
Tags : skillsoft, compliance, conduct program, compliance training program, workplace culture, risk
     Skillsoft
By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire provides IT organizations with enhanced file integrity monitoring, configuration assessment and log management that automates continuous PCI compliance.
Tags : tripwire, pci compliance, file integrity monitoring, configuration assessment, log management, malware, security, event management
     Tripwire, Inc
By: NAVEX Global     Published Date: Nov 18, 2013
Download this whitepaper to learn the 4 fundamental steps to creating an effective third party compliance program like the elaborate, richly funded programs that are so prominent in the news.
Tags : compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance, third party compliance, risk assessment
     NAVEX Global
By: NAVEX Global     Published Date: Mar 04, 2014
If you are looking for a deeper understanding of how to effectively and efficiently manage your organizationís employee handbook, code of conduct, and policies and procedures, The Definitive Guide to Policy Management is your all-inclusive resource.
Tags : navex global, ethics and compliance, code of conduct, policy management, perspectives, assessment tools, best-practice, automation
     NAVEX Global
By: NAVEX Global     Published Date: Mar 04, 2014
Almost every company has some, many or all of the elements of an effective third party compliance program. The challenge is to identify what you have. This whitepaper can help you identify.
Tags : navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment
     NAVEX Global
By: NAVEX Global     Published Date: Mar 04, 2014
Review the past year and identify key trends with an eye towards planning for the year ahead with the recommendations of this research whitepaper.
Tags : navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment
     NAVEX Global
By: NAVEX Global     Published Date: Mar 04, 2014
The following six lessons will help you assess the focus of your compliance training program and formulate a strategy to tackle your biggest training risks.
Tags : navex global, compliance training, compliance implementation, effective compliance, risks, hr issues, human resources, compliance mix
     NAVEX Global
By: Kroll Advisory Solutions     Published Date: Aug 02, 2013
First launched in 2011, the Anti-Corruption Benchmarking Report aims to give compliance officers a comprehensive view of the "ABC" (anti-bribery and corruption) risks they have, the resources they have to fight them, and how those resources are implemented into compliance programs. The results give compliance officers a view into the anti-bribery and corruption threats they face and share resources for creating a risk-based compliance program. Download the report to learn more.
Tags : compliance, corruption, anti-bribery, risk assessment, compliance programs, compliance risk
     Kroll Advisory Solutions
By: Tripwire     Published Date: Jul 08, 2008
This paper outlines the nature of infrastructure integrity, change auditing, and compliance solutions. It describes how an investment in configuration assessment and change auditing solutions can stabilize IT operations, lowering the operational costs associated with the IT infrastructure; be a force multiplier; and provide a solid foundation that increases the effectiveness of the investment in information security.
Tags : tripwire, information security, infrastructure, change management, change, change auditing, security
     Tripwire
By: Tripwire     Published Date: Jul 08, 2008
Configuration assessment lets businesses proactively secure their IT infrastructure and achieve compliance with important industry standards and regulations. Learn why configuration assessment is so important, why organizations find it difficult to control system configurations, and what types of configuration assessment solutions are available.
Tags : tripwire, configuration, compliance, infrastructure
     Tripwire
By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance
     Tripwire
By: Tripwire     Published Date: Jun 30, 2009
Learn how Tripwire can help you deploy a comprehensive configuration assessment and control solution that: a) reduces the time and resources required to verify compliance and prepare for audits; and b) maintains continuous compliance by allowing IT to immediately identify any exceptions and trigger remediation of configurations that do not conform to policy.
Tags : tripwire, automate, fisma, compliance, configuration, assessment, solution, audit
     Tripwire
By: Tripwire     Published Date: Dec 16, 2009
Read this white paper to find out the first solution to effectively combine configuration assessment and file integrity monitoring, enabling automated and sustainable configuration control throughout virtual and physical infrastructures.
Tags : tripwire, file integrity monitor, compliance, security, configuration assessment, configuration control, virtual and physical infrastructure
     Tripwire
By: IBM     Published Date: Mar 18, 2015
Read the 2014 IDC MarketScape for Worldwide B2B Integration Gateway Software to learn whatís causing so many businesses to adopt advanced integration solutions, and discover why IBM is positioned as a Leader in this vendor assessment.
Tags : b2b integration, compliance, b2b networks, integration gap, impediment, customer satisfaction, integration initiatives, integration gateway
     IBM
By: NAVEX Global     Published Date: Dec 22, 2017
Assessment is part of your compliance programmeís necessary life cycle for improvement. We work in an ever-evolving landscape of risk that requires compliance professionals to identify the gaps their programmes have today, and may have tomorrow. Your programme effectiveness as a whole is based on the effectiveness of each one of its parts. So, ensure your assessment is broad as well as in-depth. Programme assessment is not a tick-the-box exercise. It is just as important as creating a company culture and mitigating risk. Remember, if your assessment is thorough and effective, you will have identified weaknesses in your programme and vulnerabilities for risk. Donít be discouraged by your work to highlight these areas for improvement. Your programme and your organisation will be better for it once you make the necessary adjustments for a robust and effective ethics and compliance programme.
Tags : compliance programme, compliance, programme assessment, definitive guide, improving compliance, ethics and compliance, programme awareness, anti-bribery awareness
     NAVEX Global
By: Preventsys     Published Date: Aug 21, 2009
Increased assessment, reporting and compliance requirements are going to be difficult to manage from year to year, and organizations without the right strategy, will face a significant increase in costs to audit and report on compliance annually.
Tags : compliance, regulatory compliance, fisma, security management, audit, auditing, security audit, vulnerability management
     Preventsys
By: RiskWatch     Published Date: Jan 17, 2007
Risk assessment is the cornerstone of security.  The risk assessment process includes gathering information about the assets of the organizations, including all information assets, and all physical assets.
Tags : risk assessment, compliance assessment, risk management, security, it management, security management, infrastructure, vulnerability
     RiskWatch
By: RiskWatch     Published Date: Feb 05, 2007
As corporate security policies and compliance regulations are created to address the increasingly dangerous post 9/11 environment, security risk management is becoming an increasingly important tool in corporate governance. Learn more in this white paper by RiskWatch.
Tags : network security, security, compliance, glba, hipaa, risk assessment, risk management, hipaa compliance
     RiskWatch
By: Easynet     Published Date: Mar 26, 2008
Compliance with the payment card industry (PCI) data security standard is now a reality for every retailer: compliance should be high on every retailer's list of priorities for enterprise security. With this reality comes the need for retailers to fully understand their PCI compliance status through a thorough gap analysis and associated risk assessment.
Tags : compliance, vpn, retail, managed networks, easynet
     Easynet
By: NAVEX Global     Published Date: Mar 21, 2018
The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and compliance programmes through industry evidence and insights. Each programme is unique, with disparate risks and various levels of maturity, so not everything in this guide will apply to every programme. It is designed to help you perform a robust gap analysis of your unique programme and guide you through best practices to achieve the next level of programme sophistication right for your organisation.
Tags : 
     NAVEX Global
By: IBM     Published Date: Jul 14, 2016
If your company is engaged in international activities, it's critical that you assess and understand the risks of non-compliance with the Foreign Corrupt Practices Act (FCPA). To avoid becoming a costly statistic, you need to design your controls accordingly. Download this white paper from experts Joseph Howell, Cofounder and Executive Vice President at Workiva, and Brent Macey, Director of Internal Audit for Schnitzer Steel Industries, Inc. They'll discuss the major components of the FCPA, and how companies can perform the risk assessment process in an efficient manner. They'll also provide a practical guide to implement internal controls for FCPA at an international level.
Tags : best practices, risk management, foreign corrupt practice act, technology, business management
     IBM
Previous    1 2     Next   
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics