IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

DatasheetEnsuring Data Integrity through SOX Compliance

In 2004, Jeffrey Heer at UC Berkeley demonstrated a project that he had undertaken to analyze Enron's corporate email database. Using various visualization techniques and algorithms, Heer dug deep into Enron's communication network and constructed a tremendously intricate map profiling the communication between respondents.

Read more...
 

corpintegrityCollaborative Accountability in Governance, Risk, & Compliance: Creating Harmony Across Business Roles

The challenge for organizations from top to bottom is to provide harmony between silos of governance, risk, and compliance. Maintaining harmony is vital: Different roles — such as legal, risk mitigation, audit and compliance — have different and unique purposes, but must remain in tune with each other.

Read more...
 

www.metricstream.comBenefits of IT Risk Management Automation

Solutions for Better Business Performance. Delivering Governance, Risk, Compliance Through Software Benefits of IT Risk Management Automation Software, Services and Content

Read more...
 

www.metricstream.comIT Risk Management Solutions for Better Business Performance

This White Paper provides an in depth overview of how to implement Continuous Compliance and Security Monitoring and Management across the Enterprise.

Read more...
 

ISACASecuring Mobile Devices

In the complimentary new white paper titled "Securing Mobile Devices," ISACA, a leading global association for enterprise governance of information technology (IT), noted that the use of wireless networks, typically less secure than wired networks, leaves information at greater risk for interception.

Read more...
 

www.cybersource.comA Manager's Guide to Comparing the Cost of Payment Security Strategies

This guide will help you assess and compare the cost of managing payment security via an on-premises or hosted operations model. Topics include:

Read more...
 

www.isaca.orgSocial Media: Business Benefits and Security, Governance and Assurance Perspectives

Initiated as a consumer-oriented technology, social media is increasingly being leveraged as a powerful, low-cost tool for enterprises to drive business objectives such as enhanced customer interaction, greater brand recognition and more effective employee recruitment.

Read more...
 

www.facetime.comThe Impact of New Communications Tools For Firms in the Energy Industry

Why You Should Read This White Paper - The energy industry is among the largest and most important industries worldwide. For example:

Read more...
 

www.facetime.comSocial Computing and Compliance

Thanks to the rapid growth of Web sites such as Facebook and Twitter, social computing has entered the enterprise lexicon quickly as business and IT managers seek to leverage the power of social applications to improve communications and collaboration both internally and externally.

Read more...
 

www.facetime.comThe Impact of New Communication Tools for Financial Services Firms

Why You Should Read This White Paper - Securities traders, banks, investment advisors and others in the finacial services industry have long embraced new communication tools. Email, for example, and more recently instant messaging can provide individuals within these firms with a distinct competitive advantage by providing information more quickly and allowing them to make more well-informed decisions.

Read more...
 

www.ostermanresearch.comThe Concise Guide to E-Discovery

The goal of this white paper is to provide an introduction to the key areas involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process.

Read more...
 

www.ostermanresearch.comThe Case for Outbound Content Management

This white paper focuses on the critical need to manage outbound content sent using email, instant messages, text messages, tweets, Facebook posts and the growing number of other venues from which damaging content might be sent.

Read more...
 

www.lumension.comPractical Steps to Ensure GCSX Code of Connection Compliance and Beyond

The GCSX Code of Connection is an important step along the journey to provide a secure infrastructure for public sector business. At the time of writing most, if not all, work in local authorities to achieve compliance with the Code of Connection has been completed.

Read more...
 

www.lumension.comDon't Wave the White Flag Over Red Flags Rule

The Red Flags Rule, designed to mandate businesses that extend credit to customers to pay attention to the danger signs that could signal fraudulent activity as a result of identity theft, is enforceable as of June 1, 2010.

Read more...
 
Page 9 of 26

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner
Banner
Banner
Banner
Banner