All Resource articles – Page 19

View all stories of the same content type.

  • Resource

    Information Governance Considerations and Big Data in The Financial Services Sector

    2016-02-01T11:30:00Z Provided by HPE

    Learn how you can manage Big Data in the financial services sector and protect yourself from an uncertain future. When it comes to information governance in the financial services sector, remember that: Scrutiny by regulators is increasing. Auditors need comprehensive context to examine and reconstruct a financial event properly. Any ...

  • Resource

    GRC Capabilities Illustrated Series: Review Design and Operation of GRC Capabilities for Principled Performance

    2016-01-06T12:00:00Z Provided by

    We’ve all heard the old adage “what gets measured, gets done,” and this applies equally to GRC management actions and controls, which must be reviewed for operational effectiveness. Beyond that, we must consider that changes to the external and internal context may render our current actions and controls ineffective, so ...

  • Resource

    e-Book: Keeping Your Corporate Data Safe Under Lock and Key

    2015-11-30T11:00:00Z Provided by

    Around the world, governments and regulators are responding to the massive trove of personal data companies are amassing and a rash of data security breaches with new strict guidelines, regulations, and laws. In response, privacy and compliance programs are increasingly at an intersection. In recent times, however, many companies have ...

  • Resource

    e-Book: Shining a Spotlight on Supply Chain Risk Management

    2015-11-20T14:30:00Z Provided by

    The bigger your global supply chain grows, the less visibility and assurance your corporation has into the integrity and security of its products and operations. Compliance officers often may lose control over procedures and protocols, which can lead to serious regulatory consequences. To help compliance officers and legal teams navigate ...

  • Resource

    Free Guide: Building Better Vendor Risk Assessments

    2015-11-18T15:30:00Z Provided by

    Improve the Quality & Efficiency of Your Vendor Risk Program Download our informative white paper, Building Better Assessments, and you will learn how organizations like yours can improve third-party risk assessments while balancing regulatory pressures, business requirements, and budget constraints. Key topics include: Quality - How did you perform against ...

  • Resource

    KPMG-sponsored Forbes Insights: Audit 2020

    2015-11-09T11:15:00Z Provided by

    Emerging technologies and an explosion of available data has led the audit profession to a turning point. Today’s auditors need to keep pace with this technology growth and leverage it to deliver a more insightful audit. KPMG-sponsored "Forbes Insights: Audit 2020 A Focus on Change" recaps auditors’ outlook on the ...

  • Resource

    e-Book: Understanding Anti-Corruption Compliance

    2015-11-05T15:30:00Z Provided by

    Enforcement of the U.S. Foreign Corrupt Practices Act and U.K. Bribery Act has skyrocketed in recent years, and it's no surprise that bribery and corruption risks continue to keep compliance officers up at night. This e-Book, produced by Compliance Week in cooperation with KPMG, explores what countries are doing on ...

  • Resource

    Free Guide: Conducting Pre-Contract Vendor Due Diligence

    2015-11-04T11:15:00Z Provided by

    Today’s global, digital economy opens up a world of opportunities—and a whole new world of risk exposure. When important parts of your business can be fulfilled anywhere, risks may be everywhere. If one of your vendors takes a hit, you could take the fall. Which begs the question: Do you ...

  • Resource

    Selecting Foundational Controls Makes SOX Compliance Easier

    2015-11-02T16:45:00Z Provided by Dell

    Key components of regulatory compliance include being able to demonstrate the use of appropriate IT-related internal controls that mitigate fraud risk, and the implementation of necessary safeguards for legally protected information that’s electronically stored and transmitted. Read this Dell white paper for a look at SOX security compliance from an ...

  • Resource

    Selecting Foundational Controls Makes PCI DSS Compliance Easier

    2015-11-02T16:45:00Z Provided by Dell

    Key components of regulatory compliance include being able to demonstrate the use of appropriate IT-related internal controls that mitigate fraud risk, and the implementation of necessary safeguards for legally protected information that’s electronically stored and transmitted. Read this Dell white paper for a look at PCI DSS security compliance from ...

  • Resource

    GRC Capabilities Illustrated Series: Perform GRC Actions and Controls for Principled Performance

    2015-11-02T11:45:00Z Provided by

    Principled performance is all about being able to reliably achieve objectives while addressing uncertainty and acting with integrity. You need to address threats, opportunities, and requirements by encouraging desired conduct and conditions and preventing what is undesired. Performing the right management actions and controls over business operations, risk, and compliance ...

  • Resource

    e-Book: Making the Leap From Compliance to ERM

    2015-10-30T15:45:00Z Provided by

    For compliance and audit executives, deciding on the right enterprise risk management (ERM) structure can be a challenge—especially as the risk landscape continues to evolve with a fierce focus on anti-corruption, anti-money laundering, and cyber-security. The trick is moving from the compliance routines of today to a more coherent ERM ...

  • Resource

    Managing the Insider Threat with Active Directory Security

    2015-10-29T10:15:00Z Provided by Dell

    Active directory is a prime target for attackers due to its importance in authentication and authorization for all users. Unfortunately, these breaches don’t always originate from the outside. Read this white paper to explore how a typical insider threat unfolds, and how to use best security practices to defend your ...

  • Resource

    Challenged by the OFAC 50% Rule?

    2015-10-26T15:30:00Z Provided by

    Is your organization depending on self-reported data to onboard, monitor, and assess risk? Updated Office of Foreign Assets Control (OFAC) guidance from the Department of Treasury has pushed businesses to have rigorous due diligence measures in place to understand the corporate ownership structure of their partners, third parties, customers, and ...

  • Resource

    e-Book: Purging Vendor IT Risk

    2015-10-16T15:00:00Z Provided by

    Third-party risk management continues to confound many companies, with compliance officers feeling frustrated that the strategies and processes necessary to keep pace with these risks are evolving faster than their companies can manage. At the same time, technology is becoming increasingly difficult to navigate and can leave businesses vulnerable to ...

  • Resource

    The Need for Third-Party Archiving in Office 365

    2015-10-09T13:00:00Z Provided by Actiance

    Do you use, or potentially have plans to use, Office 365? If so, remember that your responsibility to archive email remains. You will still need to respond to litigation, routine discoveries, and pervasive regulations. Will Office 365’s email archiving capabilities meet your needs or will you need a better archiving ...

  • Resource

    GRC Illustrated Series: Align Your Business for Principled Performance

    2015-10-05T14:15:00Z Provided by

    Principled performance is all about being able to reliably achieve objectives while addressing uncertainty and acting with integrity. That means you need to develop objectives based on a full understanding of the context in which your organization operates and design strategies for operations, risk management, and compliance that are effective ...

  • Resource

    e-Book: The Evolving Era of Big Data

    2015-09-30T09:30:00Z Provided by ACL-Voltage

    Data has broken free from the confines of computers and mobile devices, making it hard for pretty much anyone to control what is collected, how it is aggregated, and how it can be used. To make matters worse, a new breed of connected devices is becoming a far more difficult ...

  • Resource

    Actionable Insights from the 2015 World's Most Ethical Companies®

    2015-09-25T17:15:00Z Provided by Ethisphere

    It’s clear that just as regulatory oversight has never been more complex, public expectations about transparency, corporate culture, and business behavior are part of everyday conversation. These factors, among others, have led to an expansion in the field of ethics and compliance. Leading practices of prior years have become today’s ...

  • Resource

    Epic Data Fails: How Companies Can Lose 20% of Their Value in 10 Minutes

    2015-09-21T14:30:00Z Provided by Novaworks

    Data security is paramount, and inadvertent data exposure (either due to malicious intent or human error) can cost companies millions of dollars. Every day, we engage in mundane activities that could be placing sensitive data at risk without our knowledge. Novaworks’ white paper, Epic Data Fails: How Companies Can Lose ...