The Sarbanes-Oxley Act of 2002 is a United States federal law passed in response to a number of major corporate and accounting scandals including those affecting Enron, Tyco International, and WorldCom (now MCI). These scandals resulted in a decline of public trust in accounting and reporting practices. The Act also covers issues such as auditor independence, corporate governance and enhanced financial disclosure.
This summit is a unique learning opportunity and offers the ability to connect and be face-to-face with the nation's top HIT thought leaders. The discussions will feature thought leaders and industry experts. *Fee Required*
Spreadsheets have become one of the most prevalent software applications used by businesses. They are used for everything from simple calculations to impromptu databases. While inherently useful, spreadsheets are frequently used for tasks in which they are ill-suited. In fact, too many companies overlook the importance of accurate fixed asset tracking and rely on spreadsheets to track value, depreciation, and tax calculations. Unwittingly, this results in the direct loss of money and time.
Here’s a riddle: What have you used for a very long time, occasionally pulled your hair out over, contains lots of cells with mathematical formulas, and is very stressful to update whenever a tax law or GAAP principle changes?
As of January 2011 there were 600 million Facebook users and 200 million Twitter users. Many millions use social services, from sharing photos via Instagram to sharing files via Box.net to via SlideShare. So how many of your employees use social media? A lot. That’s because social has become a normal tool used to manage and organize our lives. Social tools are flexible, efficient, effective and easy to adapt for personal and business uses.
Email encryption is fast becoming the must-have technology to achieve regulatory compliance, secure corporate assets, and protect privacy. Effective, affordable, and easy-to-use encryption was once unheard of. Now businesses can have it all.
How can a professional services firm grow profitably while providing clients with the higher-quality service and rock-bottom project pricing they demand? The firm must rely on leading best-practice solutions to gain control over every aspect of its business – from business development to resource planning to client billing.
This webinar will discuss the challenges in designing a workable change management process, defining approval workflows, and conforming to IT governances such as Sarbanes-Oxley and SAS70. This webinar will also show you how quickly Numara FootPrints Change Management can help you effectively and easily manage change, ensure compliance in IT, as well as other functional areas of your business. Learn more today!
ITIL Version 3 Best Practices has expanded the concept of IT service delivery from day-to-day operations of those services to the Service Lifecycle. ITIL Version 3 Best Practices includes five lifecycle phases (each with its own guidebook): Strategy, Design, Transition (which covers implementation and change), Operations and Continual Improvement.
IT and business leaders today can no longer look at IT simply as a cost center, it is now a vital part of business success. Improving the efficiency of IT and improving the measurement of its impact on business performance are at the forefront of managers' concerns. Access to ITIL books can be instrumental in providing the methodology for IT improvement. Learn more today!
Learn the reasons why a holistic view of risk in your company is essential in times of financial turbulence - and how many companies are adding value through governance, risk, and compliance (GRC) initiatives. (Economist Intelligence Unit, 2009)
Working together, the major payment card providers have developed a set of data security standards and created a council for enforcing them. Although the Payment Card Industry Data Security Standard (PCI DSS) has become a global requirement, many organizations are lagging in compliance.
This paper explains SAP’s vision for a cross-enterprise governance, risk and compliance (GRC) solution and the benefits it can provide, defines key terms, and discusses what to look for when evaluating GRC software options.
Information security policy development should not be a one-time event. In order to effectively reduce risk and maintain a proper governance structure, organizations must periodically update written security policies as part of an ongoing management process.