You've requested...

Best Practices in Performance Measurement and Reporting: Understanding the Global Investment Performance Standards

If a new window did not open, click here to view this asset.

Download this next:

Looking ahead to 2021 – The consequences of Covid

Wednesday 16th December at 1pm (GMT) Dr Tarun Gupta, our new Group Protection Medical Officer, will be drawing upon his background as a senior NHS GP, Clinical Commissioner for Mental Health and Occupational Physician in the private sector to explore what opportunities lie ahead in 2021 for GIP and the wider workplace. Dr Tarun will be joined by our Rehabilitation Lead Charlotte Bray to discuss the key issues effecting long Covid sufferers and the likely impact on employers and insurers in 2021. We will also be discussing how Legal & General, alongside our partners, have put in place a new support programme for those members who are struggling with fatigue and wanting to get back to work as a consequence of long Covid. At the end there will be an opportunity to ask both Tarun and Charlotte your questions around their thoughts heading into next year.

These are also closely related to: "Best Practices in Performance Measurement and Reporting: Understanding the Global Investment Performance Standards"

  • Chief Medical Officer Report – Second Edition Insights

    We’re excited to invite you to our upcoming webinar on Wednesday 3 July at 2pm, where our Chief Medical Officer, Dr Tarun Gupta and guests will be discussing the insights coming out of the second edition of our Chief Medical Officer Report on Equity and Inclusion. In today’s workplace, equity and inclusion are critical for a thriving workforce and business success. Starting from the premise that “Good work is beneficial for health,” we recognise that thriving workplaces and productive businesses rely on diversity, equity, and inclusion. Feeling a sense of fairness, purpose, and belonging is essential for overall wellbeing. In this report, we focus on the E (equity) and the I (inclusion), assuming that diversity (D) is relatively well-established in most organisations. In this webinar, our speakers will be exploring how Group Income Protection (GIP) can address the current barriers to equity and inclusion, and contribute to a productive workplace We look forward to seeing you online on 3 July.

  • How Crédit Agricole Group consolidated output management tools from 5 to 3

    Credit Agricole Group partnered with Rocket Software to evolve its output management infrastructure, aiming to reduce mainframe footprint and costs by migrating documents to an open-source environment.

    Using Rocket Mobius enterprise content management, Credit Agricole:

    • Enhanced user experience with modern interfaces
    • Securely migrated mainframe reports and documents
    • Consolidated output management solutions from 5 to 3
    • And more

    The implementation allowed Credit Agricole to extend Rocket Mobius to subsidiaries, transferring over 65 TB of documents. Read the case study to understand how Mobius could benefit your company.

Find more content like what you just read:

  • How Crédit Agricole Group consolidated output management tools from 5 to 3

    Crédit Agricole Group leveraged Rocket Mobius to modernize its output management, reduce mainframe costs, and enhance user experience. Learn how this open-source solution helped the company transform its IT infrastructure in this Case Study.

    Download

  • Accelerate enterprise-wide automation with a strategic approach

    Discover how to accelerate enterprise-wide automation with a 5-step journey. Learn to build a foundation, extend success, and optimize an automation-focused culture. Get started with guidance from Red Hat Services. Read the full white paper.

    Download

  • 10 Key Insights to Ensure DORA Compliance in the Financial Sector

    The Digital Operational Resilience Act (DORA) is vital for EU financial firms and third-party providers. So, how can you ensure your company complies? View this infographic to gain 10 insights for attaining DORA compliance.

    Download

  • How Firms are Implementing CFR Requirements

    By the end of this year, advisory firms must comply with the principles-based guidelines around KYC, KYP, and suitability. The deadline to implement these regulator-mandated client focused reforms is fast approaching, and firms must adopt new processes and technologies to ensure adherence. How are they doing it? Join us for the second Morningstar Executive Forum of 2021, as we discuss the challenges and opportunities that firms must navigate. Panelists: Sarah Asals, Compliance Manager, MFDA Anthony Giglio, VP, Wealth CFR Transformation, TD Wealth John O'Donnell, Compliance Manager, MFDA Susan Silma, Head, Risk and Regulatory Practices, Sun Life Financial Investment Services Moderator: Ian Tam, Director of Investment Research, Morningstar Canada

    Download

  • Ensure your backups meet compliance standards

    In the event of a data breach or cyberattack, you never want a client to lose their valuable data. That’s why backup monitoring is crucial for maintaining security and compliance. Read on to learn about best practices for meeting compliance standards and mitigating risk for your clients and your organization.

    Download

  • Compliance Field Guide: Reducing Costs in an Increasingly Regulated World

    This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.

    Download

  • Winning the Regulatory APJ Compliance Battle by Securing Your Identities

    This whitepaper explores the diverse cybersecurity regulations in fourteen major APJ countries and how organizations can effectively comply with them using an integrated identity security strategy. Download the whitepaper to learn more.

    Download

  • Compliance Bootcamp: NIST and CMMC Essentials

    Implementing compliance can be challenging. As a security focused team having to comply with so many policies and regulations, where do you begin? With risk auditors and security compliance officers hovering behind you all the time, how do you keep them officers happy? NIST and CMMC are the two most popular and comprehensive regulations that act as a solid base for your compliance journey. Introducing SecPod’s Compliance Bootcamp, where we talk about the essential A-Zs of understanding and implementing NIST & CMMC compliance. Join our live webinar where we dig deeper into, - Understanding the basics of compliance management - The ins and outs of NIST and CMMC compliance - Easily implementing the compliance policies

    Download

  • PCI DSS 4.0 Cybersecurity Best Practices Webinar

    Any organization that accepts credit cards in the U.S. must comply with the new Payment Card Industry Data Security Standard (PCI DSS) v4.0. The consequences for non-compliance include: • Fines up to $100,000 per month • Increased transaction fees • Termination of merchant agreements • Fees and penalties for data loss • Costs for potential lawsuits • Brand damage and customer loss Join us for a fireside chat with Gene Yoshida, Risk Consultant with a leading Financial Services Firm, on Tue Oct 17 at 8 AM PT to hear about key insights into the latest requirements under v4.0 and how you can ensure cybersecurity compliance. Here’s what you’ll learn by attending: • PCI DSS 4.0 timeline and recommended milestones • New v4.0 mandates as compared to previous versions • Which industries are affected and how • How compliance, IT, and security teams can collaborate to comply • Which solutions will be effective to avoid audit failures, which won’t, and why

    Download

  • Computer Weekly Buyer's Guide to EU General Data Protection Regulation

    In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.

    Download

  • Compliance and risk management on Wall Street

    Compliance and risk management on Wall Street is vitally important to the health of a well-functioning economy and its financial markets. Regulation across all sectors of Wall Street, from broker-dealers to registered investment advisor firms to hedge funds and other financial service firms, has become increasingly more robust and stringent over the past decades. This presentation will discuss practical ways that firms can improve their compliance and risk management strategies to mitigate the many risks to their clients and to the firms themselves that can arise from lax and ineffective compliance and risk management strategies. This presentation will be given by Dr. Paul Wendee, a 40-year veteran of Wall Street who has owned and/or managed several Wall Street firms (broker-dealers, investment banking firms, investment advisory firms, and hedge funds). Here are some of the topics attendees can expect: 1. Why is compliance and risk management on Wall Street important? 2. Compliance and risk management for securities broker-dealers. 3. Compliance and risk management for registered investment advisors. 4. Compliance and risk management for investment banks. 5. Compliance and risk management for hedge funds. 6. Compliance and risk management for other financial service firms. 7. Some interesting examples of frauds that have been perpetrated on Wall Street.

    Download

  • Best Practices: 3 tips to keep RingCentral voice communications compliant now and in the future

    As regulatory oversight increases, organizations struggle to adopt cloud unified communications (UC) systems while maintaining compliance. Discover how Theta Lake and RingCentral can help you capture, archive, and manage voice communications to ensure compliance and mitigate risks. Read the white paper to learn more.

    Download

  • NIS2 Compliance - an Identity-based Approach

    As the deadline for NIS2 compliance across the EU rapidly approaches, organizations are moving to update their security posture to comply before the mandates go into effect in October 2024. This Live Session Replay will provide a summary of NIS2 Compliance Requirements and how to achieve compliance, with special emphasis on how Xage Security supports the requirements, including: Identity and access management and multi-factor authentication Architecture and deployment of security measures Compliance and incident response Zero Trust Remote Access

    Download

  • NIS2 Compliance - an Identity-based Approach

    As the deadline for NIS2 compliance across the EU rapidly approaches, organizations are moving to update their security posture to comply before the mandates go into effect in October 2024. This Live Session Replay will provide a summary of NIS2 Compliance Requirements and how to achieve compliance, with special emphasis on how Xage Security supports the requirements, including: Identity and access management and multi-factor authentication Architecture and deployment of security measures Compliance and incident response Zero Trust Remote Access

    Download

  • How to Be PCI DSS Compliant: Tips, Tools, and Processes

    PCI DSS is a set of security policies that protects credit card data and transactions. If your business processes credit card payments, you are likely required to comply. Demonstrating your PCI DSS compliance is no easy feat, but it can be made a lot easier with the right tools and processes in place. Join Mikiann McIntosh, Risk & Compliance Engineer, and Kyle Dimitt, Compliance Research Engineer, for this on-demand webinar outlining everything you need to know for your PCI DSS compliance efforts. Through their conversation, you’ll learn: • What PCI DSS compliance is and an overview of requirements • Actionable steps to become PCI compliant • How to demonstrate PCI compliance with a SIEM

    Download

  • 7 free GRC tools for compliance professionals

    All organisations need to meet a variety of regulatory compliance requirements, such as General Data Protection Regulation (GDPR), but they don't all have the budget for GRC software. In this e-guide, learn about the free, open source options.

    Download

  • Meet the GRC challenges of the cloud head-on

    Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.

    Download

  • Financial markets regulatory outlook 2017

    Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.

    Download

  • Compliance Risk In a New Paradigm

    Since the COVID pandemic began, many organisations have identified a need to make changes in their compliance processes. Regulators still expect institutions comply with their requirements, and keep on top of changes – which is difficult when everything is fast-paced and often changing on a daily basis. During this webinar, Dun & Bradstreet outline how to approach compliance risk in the new paradigm, including streamlining your compliance processes and improving resilience – ultimately helping you manage the risk associated with whom you’re doing business.

    Download

  • The Cloud Influence on GRC

    Cloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.

    Download

  • Landing Safely on the TSA Cybersecurity Compliance Runway

    In early March 2023, the US. Transportation Security Administration (TSA) issued a cybersecurity emergency action amendment for certain regulated airport and aircraft operators. The new Action Rule can have significant impacts on IT, security, and compliance teams in this industry. If your organization is subject to this new action, this webinar, featuring a compliance industry expert and a sr. Director of product Management from Qualys, will provide you with detailed information about all four action requirements and how Qualys can help you easily and quickly take off, land, and comply safety. In this fireside chat we'll discuss: *The four TSA action requirements and how they impact organizations *Consequences for failing to comply with the new mandates *HOW current solutions may not be adequate to ensure compliance *Best practices to ensure you're always ready for takeoff *Specific solutions that address all four requirements *Why a single agent and platform can reduce risks and costs

    Download

  • Why your audit team shouldn’t be working in spreadsheets

    McKinsey reports that 60% of the audit process can be partly or fully automated, reducing error rates (up to 16%) and saving analysts 26 hours per week. In this e-book, learn how to avoid fines, fees, and human error while achieving faster, scalable results by automating 5 key processes.

    Download

  • How to Build a Proactive Compliance Program with Identity Security

    This eBook reviews nearly 20 global regulations and frameworks, with details on their security-focused requirements. This includes:NIS2 directiveDORANIST Special Publication 800-207 on Zero Trust ArchitectureDownload the eBook and learn how you can streamline compliance initiatives.

    Download

  • Guide: How To Train Employees On Email Safety And Compliance

    For your organization's email communications to comply with HIPAA, all your employees must be trained. To learn how to educate your workforce, review this guide.

    Download

  • What Cost Plus Drugs uses for HIPAA email compliance

    For your organization's email communications to comply with HIPAA, all your employees must be trained. To learn how to educate your workforce, review this guide.

    Download

  • Overcoming security and compliance challenges in finance

    Financial systems must follow certain rules that may seem the same on the surface, but in practice have significant differences. Financial institutions are highly regulated entities, which are required to comply with various statutory regulations. Many of these compliance rules pertain to cybersecurity. One might assume that compliance with these rules will make a company secure. While compliance is necessary, that alone is rarely sufficient to guard against tomorrow’s security threats. Compliance are rules based on the past; effective cybersecurity must anticipate the future. Tune into this webinar from industry expert Jerald Murphy (Nemertes Consulting) will discuss actions organizations can take to overcome hurdles to ensure companies can be compliant, with maximum agility in dealing with the latest cybersecurity threats.

    Download

  • Overcoming security and compliance challenges in finance

    Financial systems must follow certain rules that may seem the same on the surface, but in practice have significant differences. Financial institutions are highly regulated entities, which are required to comply with various statutory regulations. Many of these compliance rules pertain to cybersecurity. One might assume that compliance with these rules will make a company secure. While compliance is necessary, that alone is rarely sufficient to guard against tomorrow’s security threats. Compliance are rules based on the past; effective cybersecurity must anticipate the future. Tune into this webinar from industry expert Jerald Murphy (Nemertes Consulting) will discuss actions organizations can take to overcome hurdles to ensure companies can be compliant, with maximum agility in dealing with the latest cybersecurity threats.

    Download

  • Infographic: Gartner AI and compliance spending forecast

    More than 60 jurisdictions around the world have proposed or are drafting postmodern privacy and data protection laws as a result. This infographic shows Gartner AI and compliance spending forecast.

    Download

  • Implementing China's Personal Information Protection Law for enterprises

    The presentation will provide the background and the main points of the China Personal Information Protection Law (PIPL). It will also identify the compliance requirements that enterprises need to comply with. A comparison of the differences between PIPL and GDPR will also be shared.

    Download

  • Operational Risk in the Financial Sector: Lessons Learned

    Mitigating digital infrastructure risk is critical for financial services organizations. In response to high-profile outages at major financial services firms and increasingly complex hybrid IT architectures in Europe and across the world, regulators have implemented new requirements designed to encourage more effective risk management practices. Failure to comply with the new requirements could result in sanctions and financial penalties. Join our webinar to explore the lessons learned from the financial sector and how the financial sector has taken the lead in mitigating digital infrastructure risk and managing regulatory compliance.

    Download

  • Top IT security priorities: Addressing risk management and compliance

    In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

    Download

  • How the Companies can Measure their LGPD Level? #cybernotes

    The LGPD will take effect in August. But to what extent does your company comply with the law? In the last cyber notes' episode, Dr. Patricia Peck addresses this issue so that you know how to comply with the LGPD and not suffer from legal penalties, avoiding losing money due to it. Watch the video and learn more. Take advantage and download our whitepaper on the LGPD and ensure your company's compliance. https://bit.ly/3jvmTcB

    Download

  • Automation and the Future of IT Security, Compliance, and Software Development

    For IT security and compliance teams, the paradigm for supporting resilient and secure organizations has shifted. Teams have moved away from application developers and IT operations getting approvals in “high ceremony” handoffs to IT security and compliance to now embedding into the daily work of development and operations. In this session, Gene Kim will describe why this “shift-left” phenomenon has happened, and how the new patterns that have emerged allow organizations to more quickly and effectively comply with frameworks and increase their cyber resilience by leveraging automation, compliant-by-design, and security-by-design principles. Gene will describe theory and practice, including many examples from industry of how IT and compliance leaders have used these practices to help their organizations win, while dramatically increasing security, compliance, and agility. CPE: This is a webinar recording. Credits are not offered for on-demand viewing.

    Download

  • Reducing the Pain of Compliance Audits

    Experiencing the pain of complying with operationally challenging regulatory mandates? Does the fear of a failed compliance audit put a knot in your stomach? Take a deep cleansing breath, and exhale all your worries about regulations, fines, and legal liabilities. We’ve got you covered! Join us to explore: -Processes to reduce the pain of compliance audits -Predictable access to apps, data and services based on Identity -Enforcing policies through automation -Tracking access to apps and data to simplify audits -Case Study: Drastic reduction in the risk of internal threats and vulnerabilities Best practices for reducing risk and ensuring compliance standards are met

    Download

  • Cybersecurity Regulations 101: What Rules Your Company Should Follow and Why

    Determining which rules and regulations apply to an organization is not easy undertaking. Oftentimes, companies need to comply with multiple controls and regulations, many of which have overlapping statutes along with stiff penalties for non-compliance. Watch our on-demand webinar as Duncan McAlynn demystifies common cybersecurity frameworks and regulatory requirements to help organizations improve their security posture and achieve compliance. Key takeaways: * Compliance versus security and how to recognize the difference * Know which regulations are related to your company or industry * How to keep up with the ever-changing state regulations * What to do and who to notify when you’ve suffered a security incident * How to establish a security roadmap for your organization Learn more by viewing now.

    Download

  • Cybersecurity Regulations 101: What Rules Your Company Should Follow and Why

    Determining which rules and regulations apply to an organization is not easy undertaking. Oftentimes, companies need to comply with multiple controls and regulations, many of which have overlapping statutes along with stiff penalties for non-compliance. Watch our on-demand webinar as Duncan McAlynn demystifies common cybersecurity frameworks and regulatory requirements to help organizations improve their security posture and achieve compliance. Key takeaways: * Compliance versus security and how to recognize the difference * Know which regulations are related to your company or industry * How to keep up with the ever-changing state regulations * What to do and who to notify when you’ve suffered a security incident * How to establish a security roadmap for your organization Learn more by viewing now.

    Download

  • Cybersecurity Regulations 101: What Rules Your Company Should Follow and Why

    Determining which rules and regulations apply to an organization is not easy undertaking. Oftentimes, companies need to comply with multiple controls and regulations, many of which have overlapping statutes along with stiff penalties for non-compliance. Watch our on-demand webinar as Duncan McAlynn demystifies common cybersecurity frameworks and regulatory requirements to help organizations improve their security posture and achieve compliance. Key takeaways: * Compliance versus security and how to recognize the difference * Know which regulations are related to your company or industry * How to keep up with the ever-changing state regulations * What to do and who to notify when you’ve suffered a security incident * How to establish a security roadmap for your organization Learn more by viewing now.

    Download

  • Case Study: Tackling FTC Safeguards Rule

    In this case study, you'll learn how Continental Automotive Group avoided FTC Safeguards Rule penalties of up to $100k per infraction by implementing AutoElevate by CyberFOX. Read on now to discover how the solution helped them optimize IT operations and ensure regulatory compliance.

    Download

  • Turn DORA Distress into Compliance Success

    Banking, financial, and insurance companies must comply with DORA. How can you ensure you’re audit-ready? The Digital Operational Resilience Act (DORA) framework is designed to help strengthen the resilience of European financial institutions and their critical third-party technology service providers against Information Communication Technologies (ICT)-related incidents and disruptions. However, it can be complex, difficult to implement, and challenging to ensure full compliance. In this fireside chat with Dr. Rois Ni Thuama, PhD and DORA compliance expert, we will cover DORA compliance details, requirements, and audit failure red flags. Here’s what you’ll learn in this informative and entertaining event: - What is the DORA framework and which organizations are affected? - What are the five DORA key pillars and how do they relate to Information Communication Technologies (ICTs)? - When does DORA take effect and how can organizations prepare? - How can you ensure an audit-ready dashboard, customized reports, and ICT-centric compliance? - What are five primary red flags auditors will look for, and how do you avoid these? - Which compliance and security solutions are required to ensure full DORA compliance?

    Download

  • ESG Regulation: What and How to Prepare in 2024

    Explore the variety of ESG-related regulations coming into effect or on the horizon in 2024 (e.g., California Climate Disclosure Laws, CSRD, SEC) and learn from the advisory professionals supporting organizations in their preparation for compliance. Join us to learn how governance, strategy, risk management, and robust metrics help organizations comply with regulatory mandates, improve operational efficiency, identify new business opportunities, and take advantage of competitive differences. After this event you’ll be able to: -Understand the major ESG-related regulations -Identify steps to prepare for compliance with ESG-related regulations -Learn how cross-functional teams are contributing to ESG regulatory compliance

    Download

  • Masterclass addresses 3 compliance challenges and how to close the gap

    Remaining on pace with compliance is ever more critical, as data breaches are up 68% YoY across industries, with MSPs that support highly regulated industries increasingly vulnerable. Tune in to overcome 3 common challenges and ascertain 4 ways to kick-start compliance with ControlMap.

    Download

  • All You Need to Know about NYC Cyber Regulations

    New regulations announced this year will ensure that within New York State, there will be ‘minimum security standards’ that financial services firms will be obliged to meet. The intention of these measures is to encourage organizations to keep pace with changes in technology and ensure a cybersecurity program that ‘is adequately funded and staffed’. In this opening keynote, we will look at the over-arching obligations of the NYC Cyber Regulations and evaluate what the minimum standards will be and how businesses will need to adapt to fit into this framework. What exactly are the NYC Cyber Regulations? How can businesses comply and what could the penalties be for non-compliance? Will this spread to other states, like DC and Massachusetts, or even California? How does this effect national companies who operate in all different States, including NYC?

    Download

  • Simplifying Compliance: Secrets Management for DORA, C5, and NIS2

    In an increasingly complex regulatory environment, organizations must prioritize effective secrets management to protect sensitive information and comply with frameworks like the Digital Operational Resilience Act (DORA), Cloud Computing Compliance Controls Catalog (C5), and the Network and Information Systems Directive (NIS2). This webinar will explore the critical role of secrets management in maintaining operational integrity, enhancing security postures, and meeting compliance requirements. Industry experts will discuss best practices for implementing secrets management solutions, including access controls, encryption, and monitoring. Participants will gain actionable insights on navigating the compliance landscape while safeguarding their organizations against potential threats.

    Download

  • How A Major Airline Stays PCI Compliant - Even At 35,000 Feet

    This case study showcases how a major airline partnered with VikingCloud to achieve PCI compliance, secure customer payment data, and transition from a reactive to proactive cybersecurity approach. Learn more by reading the full case study.

    Download

  • Compliance Gateway Upstream Reconciliation

    Highly regulated verticals, such as financial services firms, actively monitor and surveil digital communications to ensure they meet FINRA and SEC compliance regulations. How do firms ensure accuracy so that what they have in their archive or data store is comprehensive? The first of its kind in the industry, Proofpoint Compliance Gateway (version 2.16), can provide a complete audit trail and corroborate chain of custody for rules of evidence and forensics during litigation. Join our experts to learn how Proofpoint Compliance Gateway is an assurance solution for customers who require the strictest levels of regulatory compliance around their messages and digital communications. In this 20-minute session, we’ll discuss: - How captured communications are validated from the upstream source applications and received by downstream services - Flexible options for filtering and routing content to multiple geo destinations or lines of business with complex rules - How to demonstrate compliance and complete capture through reconciliation reports, source manifest and audit logs

    Download

  • A battle of the 2024 data regulation giants: DORA vs. NIS2

    2024 is the year where we will see organisations throw everything they have at building much stronger cyber resilience defences in order to combat ransomware attacks and comply with new data regulations. In this insightful session with Field CISO Richards Cassidy and ESG Analyst Jack Poller, you’ll gain expert insights into two of the big data regulation giants with deadlines fast approaching; Digital Operational Resilience Act (DORA) and Security of Networks & Information Systems Regulations (NIS2). You’ll learn why there is a rush to comply and where organisations need to focus their resources to close compliance gaps. You’ll learn about: What the similarities and differences between DORA and NIS2 data regulations are Closing the gap on compliance: How to analyse your need for data security investments Regulations vs. ransomware: Which one will your board care about the most?

    Download

  • How Ubuntu enables your compliance with FedRAMP, FISMA, FIPS, and DISA-STIG

    Complying with the US government security standards such as FISMA, FIPS, FedRAMP or DISA-STIG is crucial not only for government agencies, but also for enterprises that provide solutions that comply with the strictest of the US government security requirements. At the same time, the operating system is the cornerstone of a compliance program. It provides the foundation for compliance for data protection with certified cryptography such as FIPS 140, hardening profiles for military applications such as DISA-STIG, and enables continuous vulnerability management. Canonical’s Ubuntu is well positioned not only to address the US government requirements for enterprise workloads, but also provide the foundation for any successful solution. Complying with FISMA, FedRAMP, FIPS, and DISA-STIG with Ubuntu In this webinar, we will: - Provide an introduction to the US government security standards and highlight common challenges - Provide a breakdown of the standards in terms of software requirements and OS requirements - Explain how 3rd party applications can follow the US government standards with Ubuntu - Discuss how Ubuntu provides a secure platform for government agencies to build, operate and innovate with open source applications and technologies

    Download