RecruitingBlogscom

Follow Us:

 

regulatory

Results 1 - 25 of 483Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Oct 15, 2019
The asset and fund management industry has grown signifcantly in the last decade, with surveys indicating about 65 percent growth since 2007, to over USD 80 trillion in assets under management worldwide. As its importance to the world financial system – linking those with money to invest with enterprises and activities that require funding – is increasingly recognized, so both the industry and the regulators that police the sector become more prominent. The industry and regulators are coming under pressure from a range of “external” voices – demanding investors and consumer groups, clamoring political and economic needs, changing priorities and hopes of civil society, an increasingly noisy press, the explosion in social media and the rapid growth of new technologies. This sea of voices is directly influencing the regulatory agenda and increasing expectations on the industry. A fundamental rethink of firms’ mindset and investment offerings is required.
Tags : 
    
KPMG
Published By: Box     Published Date: Nov 06, 2019
Digital transformation is forcing businesses to rethink how collaboration and process occurs across their extended enterprise, blurring the definitions of “back office” and “front office.” It’s also making it increasingly important to get more value out of their content, while also addressing modern security and regulatory requirements. Although legacy enterprise content management systems helped manage the most sensitive content, they were never designed to accommodate the new mobile, highly agile business processes of the digital age. A new strategy is needed.
Tags : 
    
Box
Published By: KPMG     Published Date: Jun 10, 2019
Forces such as consumerisation, expanding regulatory requirements and the shift to outcome-based pricing are all compelling procurement leaders to re-evaluate strategies. Read this briefing to find out: • the key disruptors shaping the future of procurement • how to develop an agenda to deal with disruption • seven key areas of difference between current and future procurement models • essential questions to inform your strategic thinking.
Tags : 
    
KPMG
Published By: Nextgen     Published Date: Sep 25, 2019
Your practice can save time and money by delivering on patient expectations. You can better keep up with regulatory demands and reporting requirements—and avoid unsatisfied and unresponsive patients—when you employ best practices that address patient needs. In this eBook, you’ll learn strategies to avoid missed revenue and save staff effort by using smart efficiency improvements, such as checking insurance information up front. You’ll also learn how you can get back to caring for patients, not chasing payments—and the secret to achieving strong financial outcomes. Finally, you’ll discover how you can get paid quickly, easily, and fully—all while addressing your patient demands for an improved, more efficient experience.
Tags : 
    
Nextgen
Published By: Dell EMC     Published Date: Oct 30, 2019
Midmarket firms face many of the same data center security risks as their enterprise counterparts with far fewer resources at their disposal to mitigate them. Downtime, data theft, and regulatory non-compliance all pose existential threats to these organizations and as they drive for continuous innovation and advantage in an increasingly competitive landscape, they must ensure valuable data and IT assets are secure, protected, and available at all times. How can midmarket organizations succeed in the face of these challenging market dynamics? This Research Insights report shows that the success organizations have enjoyed varies greatly, and further that organizations enjoying the greatest success demonstrate a clear organizational commitment to prioritizing security and operate fundamentally more secure data center environments. Download this report from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Avetta     Published Date: Sep 17, 2019
On January 23, 2019, OSHA put into effect its 2019 Annual Adjustment that raised the penalties of violation by approximately 2.5% over the 2015 revised amounts. The consequences of non-compliance with OSHA regulations extend beyond the financial penalties imposed by the regulatory authority, with the biggest risk that an organization runs is that of reputational damage. In this whitepaper you’ll learn: • The most cited occupational hazards over the last year • How to be proactive in preventing occupational hazards in your workplace • The importance of pre-qualifying third party contractors in order to mitigate risk in your organization
Tags : 
    
Avetta
Published By: Rackspace - VMware     Published Date: Oct 24, 2019
As an IT leader, we know you have the desire to help the business deliver more and do better. Yet, it’s a tough and often a complex journey. There is no doubt you’ve heard of Hybrid Cloud, but do you know what outcomes it can deliver for your business? The fact remains, Hybrid Cloud strategy implementation is challenging – there are no two ways about it. But what it offers are cost simplification, increased flexibility, reliability, and assurances around security and regulatory compliance. However, this assumes hybrid cloud has been planned and implemented in the correct way, which almost certainly requires outside help. If you’re considering Hybrid Cloud, tick off the right boxes to build your business case; learn about how to make the next move, the right one.
Tags : 
    
Rackspace - VMware
Published By: CheckMarx     Published Date: Sep 12, 2019
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Published By: AppZen     Published Date: Oct 21, 2019
Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations. How do you know if you have these violations hiding in your organization's expenses, contracts, or invoices? It’s not easy to weed them out, and if you don’t have an automated, systematic approach, doing so is prohibitively time consuming.
Tags : 
    
AppZen
Published By: Adobe     Published Date: Oct 24, 2019
Electronic signatures can have a dramatic impact on your organization’s digital transformation initiatives, helping to increase productivity, accelerate sales, strengthen collaboration and simplify a wide range of processes across all departments. However to truly leverage e-signatures, you must ensure that your solutions adhere to the most stringent guidelines for security and regulatory compliance. Here are the most important and pertinent questions to ask potential vendors about security.
Tags : 
    
Adobe
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
The European Union’s new regulatory framework for data protection laws, the General Data Protection Regulation (GDPR), became enforceable on 25 May, 2018. Under GDPR, organisations have new obligations to improve the security and privacy practices for the personal data they collect and use. With these new obligations comes the potential for heavier fines and penalties. Fortunately, Amazon Web Services (AWS) can help guide your organisation toward compliance under the new requirements. Take advantage of our services, resources, and experts as you navigate these changes.
Tags : 
    
Amazon Web Services APAC
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: StoryDesk     Published Date: Mar 28, 2012
How can you use the iPad in your organization? What's the formula for a successful iPad deployment? What do you need to know about regulatory requirements, security, HTML5, and custom apps?
Tags : 
emerging marketing, enterprise applications, sales
    
StoryDesk
Published By: HPE & Intel®     Published Date: Oct 10, 2016
In the financial services industry (FSI), high-performance compute infrastructure is not optional; it’s a prerequisite for survival. No other industry generates more data, and few face the combination of challenges that financial services does: a rapidly changing competitive landscape, a complex regulatory environment, tightening margin pressure, exponential data growth, and demanding performance service-level agreements (SLAs).
Tags : 
    
HPE & Intel®
Published By: HERE Technologies     Published Date: Oct 23, 2019
Marketers are using more location data than ever, but consumer privacy concerns and an evolving regulatory landscape have raised new challenges. There is a need for more consideration and transparency about around collecting and using geolocation data. Watch this webinar to learn about: • The various ways marketers are using location data today • How consumers feel about location sharing • How new government regulations may impact data collection Besides the two eMarketer Analysts, Hervé Utheza, Head of Media, Advertising & Telco at HERE Technologies joins the conversation and gives valuable insight on how to improve campaign performance through real world geometry. View the webinar now on demand.
Tags : 
    
HERE Technologies
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Coupa     Published Date: Dec 14, 2018
Financial services firms are turning to Business Spend Management (BSM) as a Strategic Solution Beset by competitors and burdened by ever-shifting regulatory requirements, financial services firms are turning to cloud-based technology to gain better control over—and visibility into—spending. In the process, they are becoming fiercer competitors. Download this ebook for insights into how you can improve your organization's financial health and how: A cloud complete-BSM solution can track and measure all purchasing activities, identifying patterns that provide opportunities for negotiating discounts, and better managing risk To increase savings across source-to-contract, procure-to-pay, travel & expense management, as well as risk and supplier management Modern technology enables the finance function to take cost-management to a deeper level—without investing in IT infrastructure
Tags : 
    
Coupa
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
An optimized hybrid IT infrastructure enables innovative business outcomes—but rapid IT transformation also creates new risks, threats and vulnerabilities. Coupled with increasingly sophisticated cyberattacks and complex regulatory pressures, managing risk in today’s digital environment becomes even more critical to the enterprise. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Commvault     Published Date: Jul 06, 2016
Unsanctioned file sharing creates serious security and regulatory compliance issues. Read this infographic to learn how to sync, share and control data securely!
Tags : 
commvault, data security, protecting corporate data, commvault file sharing, virtual host costs, virtualization, networking, security, it management, data management
    
Commvault
Published By: FICO     Published Date: May 11, 2017
Competing in telecommunications markets is becoming extremely complicated. Responding to disruptive change from many directions, telecom companies are experimenting with new business models and offering new types of services. With this comes the potential to draw new waves of regulatory oversight, further complicating the picture.
Tags : 
customer experience, customer management, telecom, customers, finance
    
FICO
Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM
Published By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
    
Dome9
Published By: SAP     Published Date: Oct 11, 2018
Life sciences is an industry on the move. Driven by regulatory changes, manufacturing capacity, and margin pressures, the industry’s supply chain and procurement leaders are relying heavily on contract manufacturing organizations (CMOs). These relationships require new ways of managing product quality and costs across the supply network. Learn how a true digital strategy can optimize internal and external processes – and extend them beyond the enterprise – so you can excel in today’s complex market.
Tags : 
    
SAP
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top