IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

Best Practices for eGRC

Live Webcast!             Join us as we identify the best practices for eGRC program implementation

Click on the slide!

Payment Breach Prevention

Live Webcast!             Join us to gain insights and some key steps to prevent payment card breaches across…

Click on the slide!

The Elements of Privacy Risk

Click above to download this GRC Illustration!             

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
E-mail

Live Webcast!A Best Practice Blueprint for eGRC

When:    May 26 | 2015       Attend

With the increased regulation and scrutiny of the past decade, it is important for organizations to implement best practices in order to maintain control and achieve compliance with evolving regulatory requirements.

Read more...
 
E-mail

GRC IllustratedThe Elements of Privacy Risk – GRC Illustration    icon Download

Organizations that handle personal information face increasingly complex challenges to effectively manage privacy risk and compliance. The impact of these challenges covers the entire information life cycle.

Read more...
 
E-mail

Live WebcastUnderstanding EMV, End-to-end encryption, and Tokenization

Recorded:    March 19 | 2015       Play!

Data breaches are a widespread problem with over 1.1 billion records compromised in the last 10 years. According to the Verizon 2014 Data Breach Investigations Report, the vast majority of breaches occurred against small to mid-sized companies.

Read more...
 
E-mail

Live WebcastPreparing for PCI DSS 3.0 and VISA Mandates

Recorded:   February 19 | 2015      On-Demand!

The clock is ticking for enterprises that have not yet upgraded their payment card processing systems to be compliant with Payment Card Industry Data Security Standard (PCI DSS) 3.0. As the Jan. 1, 2015 mandatory deadline approaches, there is increasing urgency to not only understand the most important changes in PCI DSS 3.0, but also to be ready for a rigorous QSA assessment against those changes. Since PCI 3.0 is bigger, harder and more expensive than the previous iteration, merchants have their work cut out for them.

Read more...
 
E-mail

Live WebinarTop Guidelines for Hadoop Security and Governance in 2015

Recorded:   January 21 | 2015      Play

In 2015 the size of the digital universe will be tenfold what it was in 2010. Large-scale data breaches are on the rise across all sectors, and enterprise data security initiatives must evolve to address new and growing threats. Consumer transactions, personally identifiable information, customer records, and the like, all flowing together into the Hadoop 'data lake', will enable critical business insights but also means Hadoop installations will be a rich target for cyber-crime.

Read more...
 
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  Next 
  •  End 
  • »
Page 1 of 8

 

.Visionaries


.
Branden Williams Branden Williams Branden Williams has over fifteen years of experience in technology and information security with a formidable background in the majority of the technologies that drive today's businesses. Branden has experience working for startups and the Fortune 10, and the reason why some of the best companies in the world rely on ...
 
Rebecca Herold Rebecca Herold Rebecca Herold, CISM, CISSP, CISA, CIPP, FLMI. Rebecca is an information privacy, security and compliance consultant, author and instructor who has provided assistance, advice, services, tools and products to organizations in a wide range of industries during the past two decades. Rebecca is a widely recognized an...
 
Brandon Dunlap Brandon Dunlap Brandon Dunlap is the Managing Director of research at Brightfly. He has more than 15 years of experience managing business technology risk in large and small organizations. He has served in a variety of roles across heavily regulated industries, successfully leading all aspects of IT security programs, inclu...
 

More. . .