Compliance Tag Directory

Browse Alphabetically:

Featured Compliance Questions

  • What is the best way to implement a risk assessment in an IT department that will align COBIT controls with risks?

    A compliance officer in Europe could use some advice from fellow IT professionals and executives. His IT budget is being scrutinized, as is the case in every organization in 2009; he needs targets to get things done more efficiently but without taking on more risk. His department is evaluating...

    AlexanderHoward15 pointsBadges:
  • How to perform network audit or assessment

    How can I perform a network audit or assessment?

    Apalani20045 pointsBadges:
  • Is Outlook 2007 IRM HIPAA compliant?

    Trying to figure out if by using Permissions in Outlook 2007 to encrypt and password protect information--it that considered HIPAA compliant?

    ITKE352,395 pointsBadges:
  • Industry standard SOX audit checklist?

    Working through SOX compliance issues with updated infrastructure, documented interfaces, reviewed controls and on and on -- but is there an industry SOX audit checklist to show exactly what auditors are looking for concerning compliance? If so, would someone point me to it? Thank you. Moderator...

    BrentSheets6,925 pointsBadges:
  • Free IT Book: Stealing the Network

    This week's free IT book is a little bit different than the ones we usually feature. Stealing the Network from Sygress contains fictional stories of real life possibilities meant to inspire security and technology pros alike to wonder and muse on the what ifs of security vulnerabilities. For a...

    MelanieYarbrough6,345 pointsBadges:
  • Auditing Feature

    Anyone know the best source (Slides,Simulation,Graphical representation) from which I totally get guideline how to use auditing and Even viewers feature in Windows Server 2003. Thanks Muhammad Usman

    Muhammad usman125 pointsBadges:
  • Checklists for Router, Firewall and Switch security

    I have recently been shifted to Information security audit department. I need some checklists to check the security compliance for Router, Switch, and Firewall. Please provide me some checklists to audit the same.

    ISMS130 pointsBadges:
  • HIPAA Compliant Server in Amazon EC2

    Hi, I have an instance in Amazon EC2 and need to be HIPAA compliant. I have two doubts, 1. Should I need to do a block level encryption of the database storage. 2. Should I need to encrypt sensitive data before storing in the database. 3. Best database software to handle with the encryption Any...

    Rinshad5 pointsBadges:
  • Security Audit

    what form or procedeure would you use for a final security Audit after the Avaya system is installed?

    HubeHube20 pointsBadges:
  • Information on IT Auditing

    Where can I get the information on IT auditing from this site? Thank You.

    ss38135 pointsBadges:
  • PDCA with conflicting laws

    Hello, I'm a student at the University of Advancing Technology (UAT) and this week we've been learning about the Plan, Do, Check, Act methodology for implementing an information management security system. Our reading explains about PDCA and how an organization should use it to obtain an ISO 27001...

    Griff137130 pointsBadges:
  • Governance of IT Assets

    I'm looking for example templates that could be used to provide an IT Governance Board with the assurance that it's IT assets are being managed appropriately and not exposed to any unnecessary risks.

    MarkCarlyle5 pointsBadges:
  • EU security directive

    Where can I find implementation details for complying with EU directive 95/46/ec?

    InfPB5 pointsBadges:
  • Windows Foundation Server 2008 R2 License and Domain issues

    We have joined 2 Foundation servers to an existing domain as members in a Forest to a Server 2008 R2 Standard DC as the parent.Regularly on startup we get a message "Check for Licensing Compliance is Incomplete".I need to know how serious this error is? and are we going to experience problems if...

    GazzaBot10 pointsBadges:
  • virus malware spyware

    I want to how to conduct a risk assessment to protect our pcs, networks

    M20085 pointsBadges:
  • Hercules 4.5 Compliance Check

    We currently use Hercules 4.5 to back up our SCCM for audits and remediations.  When using Hercules audit, the customer receives a pop-up in the bottom right hand of their screen telling them that a compliance check is about to be performed on their system.  The reaction of the customers are...

    Harisheldon19601,420 pointsBadges:
  • Data Protection Act [UK]

    Hi, Can anyone point me in the direction of an up-to-date summary [in layman's terms] of this act? Thanks in advance

    Mattaux0 pointsBadges:
  • AS400 System Value Settings Help?

    In our AS400 environment there are several individuals who has *SECADM and *ALLOBJ authority due to some reason, we are trying to investigate few incidents of system value settings which were changed but we don't who did it, any help or workaround which can lead us to the right path?

    ZahoorHyder5 pointsBadges:
  • Inbound traffic is coming from router IP, not internet IP. Why?

    Hello, thank you for your time. I have recently noticed a strange occurence going on with inbound traffic. The other day, I helped my friend set up his network. icmp ping was good. while sniffing, I first noticed inbound tcp traffic to me was not coming from my friend's IP address, but coming from...

    Robert5795 pointsBadges:
  • SAS-70 certification

    I have a quick question regarding SAS-70 Certification. If my company completes a SAS-70 audit, does that automatically make us certified or are there additional steps for certification? also when we get certified how long does that certification last before it will need to be renewed? any...

    JohnDough5 pointsBadges:

Browse Alphabetically:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following