IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

configChange Management

Recorded: 19 May 2010

About this summit
Change Management must successfully integrate with multiple data sources and participants to track changes and maintain accurate, secure data for business decision making. This summit will shed light into a complicated configuration that, when done right with low cost of adoption and well-integrated data discovery, can effectively manage the IT environment, improve business process, and drive efficiency. Case studies combined with industry experts and analysts will demonstrate best practices for implementing and managing complete and accurate configuration and change management systems. Go to Summit

 
E-mail

ptidentityIdentity and Access Management

Recorded: 6 May 2010

About this summit
This summit focuses on aligning an IAM framework to the Enterprise architecture to meet business needs, reduction complexity and increase employee productivity. Leading industry leaders cover a wide range of topics including: IAM frameworks, identity audits, security investments to safe-guard information, accommodating future legislations, and more. Go to Summit

 
E-mail

btermEmail Security & Compliance

Recorded: 29 April 2010

About this summit
Proper handling of all electronic communications is important in meeting regulatory compliance. This summit will feature industry leaders covering the changing security landscape of email, as well as best practices in administrating and monitoring a company's email system to meet the compliance needs of today's complex regulations. Go to Summit

 
E-mail

bsmiconBusiness Service Management

Recorded: 15 April 2010

About this summit
This one day online event delves deep into how IT Service Management is evolving to meet modern business requirements for lean, socially connected, innovative information technology and service delivery. At the summit, industry thought leaders, analysts and end-users will present best practices for achieving business value through service management while also describing high-impact emerging trends. Go to Summit

 
E-mail

btsecureData Privacy

Recorded: 8 April 2010

About this summit
How do companies ensure consumer and businesses' data are secure and safe from misuse and malware-related data breach? This summit will focus on minimizing leakage from people, devices and data on the move, keeping consumer and businesses' data secure and safe from misuse and malware-related data breach. Go to Summit

 
Page 4 of 9