If you’re looking to reduce the effort, time and cost of assessing systems throughout your network to maintain compliance and increase security, you won’t want to miss this informative webcast.
Join us to learn a straight-forward way to build an automated compliance program at your organization by following key best practices and critical tasks for setting up and automating your control assessment program including:
• Selecting industry best practice standards
• Customizing controls for your organizations needs
• Automating assessment and reporting and more
GDPR compliance designed to protect personal information of EU citizens will be a complex and time-consuming undertaking for most organizations. The challenge is interpreting the regulation and incorporating the appropriate processes and technologies to protect personal data of EU employees. The discussions will start with establishing a Privacy program to support data strategy and drive a compliance roadmap. In this webinar, Templar Shield’s Ilanko Subramaniam and LockPath’s Shane Westrup will discuss the basic tenets of the General Data Protection Regulation, building out a data privacy and security program, and utilizing tools to help your organization establish the necessary framework to comply with this regulation.
Disclaimer/No Attorney-Client Relationship/No Legal Advice
The information presented is not legal advice or a legal opinion, and it may not necessarily reflect the most current legal developments. You should seek the advice of legal counsel of your choice before acting upon any of the information presented
Perimeterless IT infrastructure and its security is now an integral part of the operational strategies of India’s financial institutions. But the number, frequency, and impact of cyber attacks on Indian financial institutions have increased substantially, underlining the urgent need for banks to develop robust cyber security measures, and assess their security posture on a continuous basis.
The RBI Guidelines for Cyber Security assist financial institutions to achieve this through a new-era preventative security baseline.
During this webcast, Shailesh Athalye, Qualys Senior Manager, Compliance Research and Analysis, will discuss how financial institutions can easily address both the technical & procedural elements of the RBI Guidelines for Cyber Security in an automated manner using the highly scalable Qualys Cloud Platform.
This webcast will include a live Q&A session.
Heather Hinton, CTO for IBM Security and Compliance Architecture & Innovation, Sesh Murthy, Cloud Raxak CTO, and Raghuram Yeluri, Intel Security Architect, will discuss how to secure applications across the hybrid cloud through automated compliance. Automated security compliance can reduce cloud security costs up to 50% while also reducing the risk of a security breach. They will discuss the best ways to leverage cloud computing, while staying compliant with the security requirements of regulated industries including financial services, retail, healthcare, and more.
The Hybrid cloud is being embraced by a majority of enterprises of all sizes. A recent survey shows that 74% of enterprises have a hybrid cloud strategy, and 94% of enterprises are using some form of XaaS--software, platform, and infrastructure as a service.
The challenge in moving workloads to the Cloud, has been the cost and complexity of ensuring initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical to maintaining positive ROI.
Raxak Protect is an automated security compliance SaaS platform and managed service, that enables cloud apps to be deployed securely, quickly, cost-effectively, and without human error, across both private and public clouds.
In this webinar, IBM and Cloud Raxak will describe how:
1. To secure IBM dedicated and shared hybrid cloud solutions using Raxak Protect automated compliance.
2. To deliver audit-ready evidence of security compliance for any workload including regulated workloads in finance (FFIEC), healthcare (HIPAA) and Retail (PCI).
3. Raxak Protect leverages hardware features like Intel Cloud Integrity Technology to create an immutable root of trust for assured compliance.
Reserve your seat today!
The most critical first steps for mid-size banks, financial and insurance firmsRead more >
The emerging practice of Information governance (IG) is becoming increasingly important to the role of compliance personnel—much in the same way that cyber-security has in recent years. In the first survey of its kind, Hewlett Packard Enterprise, in conjunction with Compliance Week, examined the costs, challenges, and opportunities facing IG compliance and would like to share this data with you.
Join Compliance Week editor-in-chief Bill Coffin and John Pepe, Hewlett Packard Enterprise eDiscovery, compliance, and analytics specialist, as they discuss the results and implications of this survey. They’ll look at the nature of IG risk organizations face; the average annual economic cost resulting from IG non-compliance; what resources organizations devote toward IG; and what organizations felt they needed to manage IG more efficiently. They’ll further share the IG nuances between those organizations that reported fines and sanctions and those who received none.
Please note: CPE credit is not available with this recording.
E-invoicing is a rapidly expanding technology. Whereas Latin American and many European and Asian countries are already considerably advanced in this field, a vast majority of organisations have not yet decided upon one system or service.
Join Bruno Koch, the author of the Billentis report, Markus Hornburg, VP Global Product Compliance at Coupa and Wim Goossens, Manager Global Purchase to Pay Project at Philip Morris International for a lively discussion on these 5 key areas that are being addressed in the most recent 2017 Billentis report.
Safe Harbour. EU GDPR, Privacy Shield. Brexit. Model Contract Clauses. And that’s just the international data. HIPAA, SOC2, ISO 270001, PCI.
You’re just trying to keep the systems running and it seems like regulations are changing every day. And, if you’re like 60% of businesses, conservatively, that get audited each year, this may be your lucky year to open those IT books and prove you’ve been compliant all along.
Quickly, your cloud footprint becomes critical. Whether running workloads on the cloud or ensuring your DRaaS meets compliance needs, this extension to your operating environment could land you in trouble if you’re not prepared.
How can you set yourself up for success?
Understand the rules up front – and the ways you can operate within them
Set yourself up with the right documentation to address auditor questions
Arm yourself with a team that has your back
Don’t be the one caught in the audit net. iland’s Director of Compliance, Frank Krieger, has done everything from HIPAA attestations, international Privacy Shield structuring to Model Contract clauses and works with customers every day to ensure their cloud is always audit-ready. He’s joining us in a webinar!
In the age of the customer and data hacks a brand’s reputation can come down to their ability to protect customer data. The transparency that will develop between brand and consumer with the upcoming General Data Protection Regulation (GDPR) will provide organizations with an opportunity to empower and build trust with their customer.
Armed with a unified and single view of the customer, brands will be able to truly personalize the customer journey while maintaining compliance and securing customer data.
Hear from Lewis Barr and David Fowler as they discuss how to turn the GDPR into business opportunity while focusing on the following topics:
- Heightened consent requirements and consent lifecycle management
- Expanded privacy notice requirements
- Data subject access rights (SARs) and fulfillment requirements
- Business exposure and liability for failing to meet these GDPR requirements
- Practical next steps to achieve operational readiness
About the Presenters:
Lewis manages Janrain’s legal compliance and privacy functions as the company continues its international expansion. He brings more than 15 years of leadership in a wide range of legal and privacy-related matters for growing technology companies. Lewis also utilizes his diverse background as a litigator in private practice, federal appeals court staff attorney, and teacher.
David is the Head of Digital Compliance at Act-On Software and is responsible for all issues pertaining to digital compliance, including email deliverability, privacy compliance, and industry stewardship in regard to our customers and our corporate objectives. David has over 20 years’ experience providing senior leadership in the marketing industry. In the last nine years, he has been strictly focused on issues associated with email marketing, deliverability, digital marketing, and privacy compliance.
A poor animal welfare program can derail your preclinical research. Join Chris Dillon as he examines the importance of animal welfare as it relates to drug development costs, compliance, and factors for considerations when outsourcing preclinical programs.Read more >
Does meeting stringent compliance requirements keep you up at night? Do you worry about having the right audit trails in place as proof?
In this session, you will learn why building security in from the beginning saves you time (and painful retrofits) later, how to gather and retain audit evidence for instances that are only up for minutes or hours, and how to meet many compliance requirements and ensured that Amazon EC2 instances are immediately protected as they come online.
Do you know what it takes?
Cloud adoption amongst European enterprises is rising - while IT compliance requirements are also increasing. These 2 trends can seem like opposing forces - but don't need to be. With the right people, processes and technology in place, IT leaders can leverage the cloud to help achieve ISO 27001 compliance - even more easily than they could achieve it with on-premise infrastructure.
Join this webinar to learn what it takes to achieve and maintain ISO 27001 compliance while using cloud services to drive agility and reduce costs across your enterprise. We'll cover key focus areas for ISO 27001 compliance including:
· Achieving organizational alignment
· Ensuring cloud platform security requirements
· Reporting essentials for auditing success
Don't miss this opportunity to learn what it takes to confidently move forward with cloud initiatives while achieving ISO 270001 compliance.
With healthcare regulations evolving to account for the explosion of mobile devices (BYOD) being used at work, HIPAA compliance is critical for all healthcare organizations who are facing security breaches and hefty fines.
Michelle Caswell, Senior Director of Legal & Compliance at Clearwater Compliance, reviews HIPAA, violations and effective compliance. Having worked as a HIPAA Investigator at the Office for Civil Rights, Michelle brings first-hand understanding and passion to the discussion, focusing on the future of HIPAA and how BYOD solutions affect healthcare organizations’ compliance and patient record safety.
This webinar is hosted by Eli Bronner, Co-founder of Lua - the leading HIPAA compliant messaging solution, and will conclude with a Q&A. Don’t miss the most informative webinar on mobile HIPAA compliance this year!
Is your compliance strategy working for you? Or, are you still a bundle of nerves wondering if your organization is the next target for a highly visible breach?
Join BMC and guest Forrester Research in this webinar and learn about the Security and Operations (SecOps) gap and how it affects your compliance strategy. Find out how to:
· Achieve your security and compliance goals without disrupting business users and operations
· Make security and compliance routine, safe and comprehensive
· Ensure that end-to-end governance is applied to the entire process by connecting detection and remediation activities
Register now and discover how to close the SecOps gap in your organization.
What to do after Safe Harbor?
Navigating constantly changing compliance requirements can be challenging for IT organizations – and cloud computing brings another level of complexity. Join iland and HyTrust in this webinar where we’ll take a look at the regulatory landscape faced by IT today; including implications for the recently nullified EU Safe Harbor regulation.
WE’LL COVER WHAT IT TAKES TO NAVIGATE THIS EU RULING AND REMAIN COMPLIANT INCLUDING:
- How IT operations for US and UK companies are impacted
- What’s required to build a foundation for compliance using industry frameworks
- How to verify that your cloud services provider can support the compliance you need
For Safe Harbor and beyond, this webinar will give you the insight you need to meet IT compliance requirements in the cloud.
How secure is your data center? How painful is your compliance process? It only takes one breach and the cost to your organization can spiral out of control.
Watch this webinar and learn how to:
· Continuously assess risk and compliance
· Proactively prevent problems from recurring
· Cost-effectively automate remediation, including exceptions
· Establish a hassle-free governance and compliance strategy
Plus, hear success stories about organizations that caught vulnerabilities and compliance issues early – and saved millions.
What, Why, How, & When to comply with the
Dept. of Financial Services 23 NYCRR 500 – Cybersecurity Requirements