IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

Best Practices for eGRC

Live Webcast!             Join us as we identify the best practices for eGRC program implementation

Click on the slide!

Securing Payments in 2015

On-Demand               Play now and learn how to implement EMV, End-to-end encryption (E2EE), and Tokenization.

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks

Latest News

41 Bank chiefs frightened by cyber risks - PwC
42 Only a quarter of financial decision makers completely trust their data, BlackLine survey finds
43 Hackers nab $1 billion in global cyber heist
44 Obama to push cybersecurity threat sharing
45 Visa ramps up tokenisation effort
46 More than half of US POS terminals to be EMV-capable by end of 2015 - Aite report
47 More than one billion records compromised by data breaches in 2014
48 Identity Management to Reach Tipping Point in 2015
49 Cybersecurity Concerns Rise as a Risk Factor for Board Members and Senior Executives in 2015
50 Authorised Access: the ‘Trojan Horse’ of Cyber Security
51 IT priorities and regulatory environment have asset managers focused on risk management and efficiencies
52 UK’s tech businesses set to grow four times faster than GDP in 2015 - Barclays
53 Front Office Survey shows reliance on manual processes impacting investment performance
54 Global bank IT spending to hit $196 billion in 2015
55 Contactless and US EMV adoption drives global smart card growth
56 SEC warns of cybersecurity risks to online investment accounts
57 Visa appoints Vasant Prabhu CFO
58 UK Government launches call for evidence on banking APIs
59 Tech firms dealing with Chinese banks face tough new rules
60 North American bank IT spending to reach $62.2 billion in 2015 - Celent
 
Page 3 of 32

 

.

Featured Webcasts


EMV & Payment Security: Evolving Beyond the Mag Stripe EMV & Payment Security: Evolving Beyond the Mag Stripe EMV & Payment Security: Evolving Beyond the Mag Stripe Recorded:   July 15 | 2014   &...
 
Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection Recorded:   Augus...
 
Panel Discussion: Why EMV is Not the Only Answer to Payment Security Panel Discussion: Why EMV is Not the Only Answer to Payment Security Panel: Why EMV is Not the Only Answer to Payment Security Recorded:   September 16 | 2014 &nbs...
 
Top Security Guidelines for EMV and Mobile Payments in 2015 Top Security Guidelines for EMV and Mobile Payments in 2015 Top Security Guidelines for EMV and Mobile Payments in 2015 Recorded:   December 4 | 2014 &nbs...
 

More. . .