IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

www.facetime.comSocial Computing and Compliance

Thanks to the rapid growth of Web sites such as Facebook and Twitter, social computing has entered the enterprise lexicon quickly as business and IT managers seek to leverage the power of social applications to improve communications and collaboration both internally and externally.

Read more...
 

www.facetime.comThe Impact of New Communication Tools for Financial Services Firms

Why You Should Read This White Paper - Securities traders, banks, investment advisors and others in the finacial services industry have long embraced new communication tools. Email, for example, and more recently instant messaging can provide individuals within these firms with a distinct competitive advantage by providing information more quickly and allowing them to make more well-informed decisions.

Read more...
 

www.ostermanresearch.comThe Concise Guide to E-Discovery

The goal of this white paper is to provide an introduction to the key areas involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process.

Read more...
 

www.ostermanresearch.comThe Case for Outbound Content Management

This white paper focuses on the critical need to manage outbound content sent using email, instant messages, text messages, tweets, Facebook posts and the growing number of other venues from which damaging content might be sent.

Read more...
 

www.lumension.comPractical Steps to Ensure GCSX Code of Connection Compliance and Beyond

The GCSX Code of Connection is an important step along the journey to provide a secure infrastructure for public sector business. At the time of writing most, if not all, work in local authorities to achieve compliance with the Code of Connection has been completed.

Read more...
 

www.lumension.comDon't Wave the White Flag Over Red Flags Rule

The Red Flags Rule, designed to mandate businesses that extend credit to customers to pay attention to the danger signs that could signal fraudulent activity as a result of identity theft, is enforceable as of June 1, 2010.

Read more...
 

www.lumension.comSix Critical Elements to Achieve Economies in NERC CIP Compliance

Utilities are under increasing pressure for accountability bearing down from several angles. The calls to manage IT risk and compliance forces them to rethink how they approach compliance economically and strategically.

Read more...
 

contouralth10 Best Practices for Archiving

Although data privacy and identity theft have a higher profile in the minds of consumers, data retention issues can have a far greater financial impact on businesses. Every company, whether public or private, large or small, must have a policy and enforcement system to deal with the messages and files generated by the organization every day.

Read more...
 

SAPGovernance, Risk, and Compliance Management: Realizing the Value of Cross-Enterprise Solutions

This paper explains SAP's vision for a cross-enterprise governance, risk and compliance (GRC) solution and the benefits it can provide, defines key terms, and discusses what to look for when evaluating GRC software options.

Read more...
 

IBMProfiting from PCI Compliance

Working together, the major payment card providers have developed a set of data security standards and created a council for enforcing them. Although the Payment Card Industry Data Security Standard (PCI DSS) has become a global requirement, many organizations are lagging in compliance.

Read more...
 

SAPIncreasing Business Agility: An Integrated Approach to Governance, Risk, and Compliance Management

This SAP Executive Insight focuses on helping executives determine: What are the consequences of today's typical GRC approaches?

Read more...
 

CyberSourceEnterprise Payment Security 2.0

There's no doubt protecting payment information during transmission, processing and storage is a business imperative. But, the current "lock-down" approach, which focuses on encrypting payment data within your environment, has proven inadequate, unmanageable, or both. Think about it.

Read more...
 

CyberSource2010 Payment Management Project Guide

As the economy begins to show signs of a pending recovery, medium and large businesses continue to shift their attention from payment processing to payment processing management-meaning, there's an increasing emphasis on improving the process of managing payments throughout the entire order acceptance lifecycle, not just transacting a payment at the time of sale.

Read more...
 

CyberSource2010 CyberSource Fraud Report

This report is based on a survey of U.S. and Canadian online merchants. Decision makers who participated in this survey represent a blend of small, medium and large-sized organizations based in North America. Merchant experience levels range from companies in their first year of online transactions to some of the largest e-retailers and digital distribution entities in the world.

Read more...
 
Page 5 of 22

  Most Popular | All