IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

DatasheetChallenges to PCI compliance

With the burgeoning popularity of online shopping and banking, credit card transactions are flourishing. Consequently, credit card fraud is on the rise.To combat this growing menace, the Payment Card Industry Data Security Standard (PCI DSS) was developed.

Read more...
 

CA TechnologiesThe role of identity and access management in achieving "continuous compliance"

There's a tremendous focus today on complying with regulatory mandates, keeping IT systems secure, and ensuring privacy for confidential enterprise and customer information.

Read more...
 

DatasheetHow to Secure IT Assets with a Business Continuity Management Plan

In 2005, an American broadband and telecommunications company faced a major service outage in Los Angeles, California. A computer system's problem led to the corruption of the company's main software services environment. Over 150,000 customers lost land-line, Internet and some mobile phone and 911 services.

Read more...
 

CA TechnologiesCA Point of view: Content-Aware Identity & Access Management

CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.

Read more...
 

DatasheetExpanding Regulatory Norms Present New Compliance Challenges for the Healthcare Industry

The US healthcare industry is rigorously monitored against stringent regulatory norms. The industry needs to comply with a variety of standards including the Health Insurance Portability and Accountability Act (HIPAA), Centers for Medicare and Medicaid Services (CMS), American Society for Testing and Materials (ASTM), International Conference on Harmonization (ICH), International Electrotechnical Commission (ISO/IEC), and Joint Commission on Accreditation of Healthcare Organizations (JCAHO).

Read more...
 

DatasheetBuilding Stronger Information Security with NIST

In 2009, the FBI began investigating a breach of confidential records from the State of Virginia's Prescription Monitoring Program. Hackers had allegedly broken into the system, stolen 8.3 million patient records and were demanding a $10 million ransom to return the data. 1 Earlier that year, the U.S. Federal Aviation Administration had reported a similar incident wherein one of its systems had been hacked into, compromising the personal information of 45,000 employees.

Read more...
 

SAPImproving SAP Security with CA Identity and Access Management

Beyond these important benefits for SAP installations, CA IAM can provide important additional benefits to your enterprise. It helps reduce risk and improve the security of your SAP and non-SAP applications and data.

Read more...
 

DatasheetEnsuring Data Integrity through SOX Compliance

In 2004, Jeffrey Heer at UC Berkeley demonstrated a project that he had undertaken to analyze Enron's corporate email database. Using various visualization techniques and algorithms, Heer dug deep into Enron's communication network and constructed a tremendously intricate map profiling the communication between respondents.

Read more...
 

corpintegrityCollaborative Accountability in Governance, Risk, & Compliance: Creating Harmony Across Business Roles

The challenge for organizations from top to bottom is to provide harmony between silos of governance, risk, and compliance. Maintaining harmony is vital: Different roles — such as legal, risk mitigation, audit and compliance — have different and unique purposes, but must remain in tune with each other.

Read more...
 

www.metricstream.comBenefits of IT Risk Management Automation

Solutions for Better Business Performance. Delivering Governance, Risk, Compliance Through Software Benefits of IT Risk Management Automation Software, Services and Content

Read more...
 

www.metricstream.comIT Risk Management Solutions for Better Business Performance

This White Paper provides an in depth overview of how to implement Continuous Compliance and Security Monitoring and Management across the Enterprise.

Read more...
 

ISACASecuring Mobile Devices

In the complimentary new white paper titled "Securing Mobile Devices," ISACA, a leading global association for enterprise governance of information technology (IT), noted that the use of wireless networks, typically less secure than wired networks, leaves information at greater risk for interception.

Read more...
 

www.cybersource.comA Manager's Guide to Comparing the Cost of Payment Security Strategies

This guide will help you assess and compare the cost of managing payment security via an on-premises or hosted operations model. Topics include:

Read more...
 

www.isaca.orgSocial Media: Business Benefits and Security, Governance and Assurance Perspectives

Initiated as a consumer-oriented technology, social media is increasingly being leveraged as a powerful, low-cost tool for enterprises to drive business objectives such as enhanced customer interaction, greater brand recognition and more effective employee recruitment.

Read more...
 
Page 5 of 23

  Most Popular | All