IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

www.contoural.comTen Essential Elements of a Successful Electronic Records Retention and Destruction Program

Organizations today are finding themselves under increasing pressure, both legal and regulatory, to properly retain or delete documents. While policies and procedures for paper records may seem adequate, many companies find it difficult to translate those policies and requirements to electronically stored information (ESI) such as e-mail messages and electronic document files.

Read more...
 

www.contoural.comSix Critical Steps to Managing Electronically Stored Information under FRCP (Part 2)

Once an organization has become litigation ready by creating an ESI survey data map,implementing a records retention and deletion process, and establishing a litigation hold process, additional steps can be taken to further prepare for legal actions.

Read more...
 

www.contoural.comSix Critical Steps to Managing Electronically Stored Information under FRCP (Part 1)

Litigation always, has been, and will continue to be, a reality of doing business. What is changing, however, is discovery and its focus on electronically stored information (often abbreviated ESI).

Read more...
 

www.contoural.comHow Long Should Email Be Saved?

As email has become more critical in the business world, many companies are weighing the question of how long it should be retained, what should be done with it, and when it should be deleted. The answer depends on many issues, particularly when one considers the varying regulations and business situations that might demand emails to be archived for long periods of time.

Read more...
 

PCI Compliance: Are You Onboard?

This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.

Read more...
 

Accelerate results by aligning Lean Six Sigma, BPM and SOA.

There has never been a more important time to uncover process waste, reduce non-value adding activity, and increase productivity. Lean Six Sigma (LSS) produces real results, and when combined with business process management (BPM) and service oriented architecture (SOA) can position a company for growth as the economy begins to improve.

Read more...
 

 Predictive Intelligence: Identify Future Problems and Prevent Them from Happening

There is a natural progression from reactive to proactive, and ultimately predictive technology, and this progression corresponds to the maturity level of your IT organization and the tools you leverage.

Read more...
 

Information Security: It's Not an Option

Technology has helped financial institutions work harder and faster than ever before. The downside: Sensitive data is more vulnerable than ever before. Financial Insights offers ideas and solutions to improve Information Security (IS). Click to learn more on protecting your most important assets, your data.

Read more...
 

 Get Your FREE Group Project Plan Template

When putting a project into motion, you must plan from the ground up, and not miss any steps along the way. Info-Tech Research Group has developed a comprehensive Project Plan Template to help those involved prepare for the necessary steps to be taken for any project.

Read more...
 

Address PCI Requirements with IBM Solutions

The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.

Read more...
 

IBM Identity and Access Management, the key to secure access of your assets.

As products go to market quicker, employees, customers, and business partners need the ability to collaborate and access business data-when, where, and how ever they choose. Watch this illustrated demo to see how IBM offers a smarter, business-driven approach to Identity and Access Management. And how IBM's extensive integration capabilities can enhance productivity without compromising security.

Read more...
 

The PCI Data Security Standard

Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.

Read more...
 

 10 Common Misconceptions Businesses Have About Identity Proofing

There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?

Read more...
 

Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions.

Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions.

Read more...
 
Page 9 of 22

  Most Popular | All