IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

VoltageUse Case: Data De-Identification

Neutralize data breaches: a new breed of cyber attacks—advanced malware, exploitation networks, and motivated insiders—are stealing sensitive data from vulnerable ecosystems. But companies can neutralize data breaches by rendering the data valueless, de-identifying data through encryption, tokenization, and data masking.


VoltageUse Case: Advancing Medical Research by Sharing Big Data in the US Government

By 2017, Big Data Technology will be the norm for data management.


White PaperEnough is Enough: Fight Back Against Cybercrime

The recently-publicized data breaches are indeed a wake-up call. While the risks have been there all along and baseline control programs have largely been in place, it is now clear that we must do more to protect our customers, our systems and our companies.


Use CaseUse Case Brief: PCI Compliance and Scope Reduction

Achieve Rapid Compliance, Reduce PCI DSS Audit Scope and Cost, Neutralize Breaches End-to-end. The Payment Card Industry (PCI) Data Security Standard (DSS) guidelines indicate that organizations processing and storing credit card data must comply with a set of well-defined audit requirements in twelve areas of cardholder data management and privacy.


White PaperTop 5 Questions for a CISO

Thankfully, most organizations now have a Chief Information Security Officer. The CISO's primary function is to stand in the gap between the business and all the IT related risks that surround the modern-day organization. He or she may have a staff of trained security professionals, or perhaps your leader has engaged third party service providers for many of the necessary controls. Regardless, the CISO is the where 'the buck stops' when it comes to IT risk management.


White PaperSEC Cyber Risk Disclosure Guidance

This guidance provides the Division of Corporation Finance's views regarding disclosure obligations relating to cyber security risks and cyber incidents. The statements in this CF Disclosure Guidance represent the views of the Division of Corporation Finance. This guidance is not a rule, regulation, or statement of the Securities and Exchange Commission.


www.TRUSTe.comTRUSTe 2014 US Consumer Confidence Privacy Report

As part of our commitment to helping companies to safely collect and use consumer data to power their businesses, we wanted to get behind the headlines and find out what effect the events of 2013 have had on consumer privacy concerns and provide an accurate picture of the potential impact this could have on businesses in the year ahead.


www.metricstream.comSolution Brief: MetricStream Vendor Risk Management

Enabling a streamlined, automated, and collaborative approach to vendor risk management with MetricStream.

Introduction: Corporations often depend on hundreds of vendors to fulfill their business processes. Single sourcing puts institutions at risk by making them too dependent on one vendor. On the other hand, multiple sourcing dilutes vendor accountability, and makes vendor collaboration and coordination much more challenging.


www.metricstream.comIT Risk Is Not About IT – It's About the Business

Introduction: Information technology risk teams know well that the scope of IT risks can be very broad – ranging from technical security risk, to IT operations risk, through to operational risk and enterprise risk.


www.voltage.comVoltage Secure Stateless Tokenization (SST) Technology Data Sheet

Enterprises, merchants and payment processors face severe, ongoing challenges securing their networks and high value sensitive data such as payment cardholder data, to comply with the Payment Card Industry Data Security Standard (PCI DSS) and data privacy laws. Voltage SST Technology Delivers Advanced Protection for Sensitive Corporate Data.


www.metricstream.comCase Study: A Leading Financial Services Organization Enables a Fully Unified, Streamlined, and Consistent Process for Threat and Vulnerability Management

Overview: As business operations scale up and become increasingly dependent on Information Technology (IT), IT environments will continue to become more complex, exposing organizations to a wide array of risks, threats, and vulnerabilities that have a direct impact on the performance of the enterprise.


www.voltage.comVoltage Customer Success Story - Regional Air Carrier

A growing regional air carrier needed a way to protect its customer data and achieve compliance at both level-1 and level-2 classifications. The Voltage Security solution combines the following technologies to deliver a simple and cost-effective solution across the entire company: Voltage Secure Stateless Tokenization (SST) technology, Voltage Format-Preserving Encryption (FPE), and Voltage Page-Integrated Encryption (PIE).


VoltageMeeting Data Residency and Compliance Challenges in Global Enterprises

In today's global business environment, companies are increasingly finding their employees, business practices, and IT systems stretched across international boundaries. However, one element of a global enterprise remains surprisingly local: how to effectively manage data residency requirements and data privacy regulations.


VoltageAchieving PCI DSS 2.0 Compliance with Voltage Security

The Payment Card Industry (PCI) Data Security Standard (DSS) 2.01 dictates that organizations processing and storing credit card data just comply with a set of well-defined audit requirements in twelve areas of cardholder data management and privacy. Compliance with PCI DSS 2.0 can be expensive, challenging, time-consuming, and disruptive, as cardholder data is often stored, transmitted, and used in many different applications within an organization, sometimes even beyond the organization's IT firewalls.

  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  10 
  •  Next 
  •  End 
  • »
Page 1 of 22

  Most Popular | All