IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Coming Up!Rethinking Email Security: Best Practices to Protect and Maintain Private Communications

When:   May 6 | 2014      Attend

2014 has been called "The Year of Encryption". The recent data breaches, personal identity theft cases, and email snooping concerns have put a spotlight on the importance of protecting sensitive data, both inside and outside the enterprise. Email is invaluable to enterprises. It's the easiest mode of communication which also makes it an easy target for data theft.


Live WebcastLessons Learned From the Target Data Breach

Recorded:   March 18 | 2014     Play

In December 2013, US retailer Target suffered a high profile data breach at the hands of a cybercriminal group, who infected its point-of-sale (PoS) terminals with malware to steal the details of around 110 million customers. Marcus Group's systems were also compromised recently and crooks made off with customer card details, while several other merchants are reported to be preparing to go public with their own breaches.


On-DemandImplementing a Business-Driven Security Strategy

Recorded:     October 17 | 2013     Play

Today's corporate leaders face multiple challenges, including the need to innovate in extremely competitive business climates, address highly dynamic regulatory and compliance challenges, and secure the enterprise against a wide barrage of new and evolving sophisticated threats. Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed.


panelholdingtnBig Data Security in an Era of Social, Mobile and Cloud Computing

Recorded:    September 24 | 2013     Play

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. Today's expanded IT infrastructure, including Social, Mobile and Cloud Computing, is collecting more data, including sensitive data, and now significant security risks are being compounded as the data is being concentrated in large data "lakes" such as Hadoop. As a result CIOs are looking at upgrades, new technologies and new strategies to assure security while delivering the required services.


MDM Security and ComplianceEnabling Your Mobile Security Strategy for eGRC

Recorded: June 20 | 2012     View

The rapid evolution of consumer devices and a growing demand from employees are changing the ways in which organizations deliver mobility solutions to the workforce. There are any number of new mobile devices and emerging technologies to help today's professionals do their jobs in any location, and these technologies bring a range of new challenges, from security, compliance and risk management, to cost and human capital management.


QuocircaEndpoint Security – The Right Protection in the Right Place

When: Dec 07 2010

Presenting:  Bob Tarzey, Analyst & Director, Quocirca

In IT the term end point is broad, covering everything from servers at a fixed location inside the firewall to smartphones that may move from one side of the globe to another in a matter of hours.

  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  Next 
  •  End 
  • »
Page 1 of 8

Subscribe via Email

 Your Email: