Compliance 101 Basics for Security Professionals

In today's regulatory environment, businesses can be subject to a number of industry standards and regulations, many of which include substantial penalties for non-compliance. Compliance is not voluntary and non-compliance can result in a mandatory business disruption - or even stoppage - until a compliant state is reestablished.

Spotlight

Intralinks

When teamwork and collaboration really matter – there’s Intralinks. Trusted globally for nearly two decades, we bring collaboration and document sharing that’s safe, secure, compliant and fully auditable. Whether it’s documents or files, you can get work done quickly regardless of what you’re using at your desk or on the move — all you need is a browser and a web connection. We give you complete control over your valuable information and content — even after you’ve shared files outside your network or organization. We set you free to do more, with greater productivity, and without worry. Gartner likes us too. They’ve crowned us top supplier of enterprise collaboration and social software solutions. Since we started in 1996, more than $28 trillion of transactions have passed through our cloud without a breach. We work with all manner of organizations including financial services, life sciences, high technology, oil & gas, and manufacturing.

OTHER WHITEPAPERS
news image

Systemic Cybersecurity Risk and role of the Global Community: Managing the Unmanageable

whitePaper | November 29, 2022

In February 2022, a cyberattack on commercial satellite services in Ukraine caused electricitygenerating wind farms to shut down across Central Europe. In July 2021, supermarkets in Sweden were forced to close their doors after a cyberattack on an IT services provider based in Florida, USA.

Read More
news image

What Is a Value Chain for Security

whitePaper | November 15, 2019

Cisco has architected and deploys a capability that continually assesses, monitors, and improves the security of our value chain throughout the entire lifecycle of our solutions.

Read More
news image

Cyber Security: Defending your digital business

whitePaper | November 13, 2019

Your business relies on its technology – but lurking around the corner are intruders who can disrupt or devalue your operations. This report shines a light on the sources of the problem, and how you can establish the control you need to get the best from IT. In every corner of the globe, businesses are building new capabilities thatrely on technology. Small businesses are automating previously‐manual processes and digitizing key tasks and information sources. At the same time, large enterprises are dedicating vast resources to analytics and to digital transformation – capitalizing on the reach and opportunities enabled by digitalized processes.

Read More
news image

CloudVision as-a-Service: Security and Data Protection

whitePaper | January 24, 2023

Cloud-based software delivery has increasingly become the norm in today’s world, owing to the elasticity, scalability, and economy of cloud architectures. Arista has established a leadership position in the delivery of reliable and secure cloud networking and services management through the introduction of CloudVision®, a single unified AI/ML-enabled network management platform supporting every place in the cloud – and CloudVision is now available in an “as-aService” delivery model in the cloud.

Read More
news image

HMC 1030 Connectivity Security White Paper

whitePaper | March 14, 2023

This document describes data that is exchanged between the Hardware Management Console (HMC) and the IBM Service Delivery Center (SDC). In addition, it also covers the methods and protocols for this exchange. This includes the configuration of “Call Home” (Electronic Service Agent) on the HMC for automatic hardware error reporting. All the functionality that is described herein refers to Power Systems HMC and the HMC that is used for the IBM Storage System DS8000.

Read More
news image

The State of Zero Trust Security 2022

whitePaper | September 27, 2022

The philosophy of Zero Trust security—“never trust; always verify”—has certainly struck a chord. It took decades for organizations to move past the basic castle andmoat security mindset, and to accept that in a cloud world, there is no perimeter to defend, and intruders are always on our networks.

Read More

Spotlight

Intralinks

When teamwork and collaboration really matter – there’s Intralinks. Trusted globally for nearly two decades, we bring collaboration and document sharing that’s safe, secure, compliant and fully auditable. Whether it’s documents or files, you can get work done quickly regardless of what you’re using at your desk or on the move — all you need is a browser and a web connection. We give you complete control over your valuable information and content — even after you’ve shared files outside your network or organization. We set you free to do more, with greater productivity, and without worry. Gartner likes us too. They’ve crowned us top supplier of enterprise collaboration and social software solutions. Since we started in 1996, more than $28 trillion of transactions have passed through our cloud without a breach. We work with all manner of organizations including financial services, life sciences, high technology, oil & gas, and manufacturing.

Events