IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

Enabling Business Agility

Live Webcast!             Learn how to protect data assets with a new data de-identification framework.

Click on the slide!

Rethinking Email Security

Live Webcast!             Learn the key concepts and best practices to protect and maintain private email…

Click on the slide!

Disaster Recovery in the Cloud

Live Webcast!             Join us on May 29th to learn how to develop a metric-driven program!

Click on the slide!

Lessons from the Target Data Breach

On-Demand               Play Now!

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
E-mail

On-DemandImplementing a Business-Driven Security Strategy

Recorded:     October 17 | 2013     Play

Today's corporate leaders face multiple challenges, including the need to innovate in extremely competitive business climates, address highly dynamic regulatory and compliance challenges, and secure the enterprise against a wide barrage of new and evolving sophisticated threats. Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed.

Read more...
 
E-mail

panelholdingtnBig Data Security in an Era of Social, Mobile and Cloud Computing

Recorded:    September 24 | 2013     Play

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. Today's expanded IT infrastructure, including Social, Mobile and Cloud Computing, is collecting more data, including sensitive data, and now significant security risks are being compounded as the data is being concentrated in large data "lakes" such as Hadoop. As a result CIOs are looking at upgrades, new technologies and new strategies to assure security while delivering the required services.

Read more...
 
E-mail

Big Data WorldManaging Security and Compliance in a Big Data World

Recorded:    August 14 | 2013     Play

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.

Read more...
 
E-mail

www.forescout.comIDC Report: Architecting a Flexible Bring Your Own Device Strategy

Written by security industry analyst Phil Hochmuth of IDC, reviews BYOD trends and risks, the mobile security landscape, policy development and control options. The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures.

Read more...
 
E-mail

www.itgrcforum.comHow to Select the Right GRC Solution for Your Organization

Recorded: May 17 | 2012    View

Governance, risk management and compliance (GRC) processes are extensive; they are how an organization is directed and managed to achieve goals, considering risks to achievement, and complying with applicable laws and regulations.

Read more...
 
Page 2 of 7
.

 

.Visionaries


.
Steve Durbin Steve Durbin Steve Durbin is Vice President of the Information Security Forum (ISF). His main areas of focus include the emerging security threat landscape, Cyber security, BYOD, Big data, Cloud security and Social media across both the corporate and personal environments. He is a regular speaker and chair at global events and is o...
 
Ed Ferrara Ed Ferrara Ed Ferrara is Principal Analyst for Security and Risk at Forrester Research. He contributes to Forrester's offerings for the Security & Risk Professional, leading the company's coverage of security metrics, security program effectiveness, security awareness, and enterprise security information architecture. Ed's re...
 
mdiamond Mark Diamond Mark Diamond is the President and CEO, Contoural, Inc. He is one of the industry thought leaders in email archiving, litigation readiness, compliance, data protection and ILM strategies and practices. As CEO of Contoural, his company helps numerous Fortune 500 companies develop and execute email and document reten...
 

More. . .