IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

The Threat of Identity Theft: How Identity Verification and Authentication Work as a Team

Consumers and business alike are faced with the ever-growing threat of identity theft. In 2007 alone, the total amount of all identity theft and fraud losses was over $1.2 billion. There were over a quarter of a million complaints of identity theft filed by consumers that year, and that number, while daunting, still does not give a true sense of the scope of the problem.

Read more...
 

Take a holistic approach to business-driven security

Take a business-level view of security and risk management, so you can prioritize security activities and focus on those that make the most strategic sense. With this white paper, learn to direct resources to mitigate risk and costs.

Read more...
 

Secure Your Domains. Secure Your Business.

Hackers have recently turned to a new attack vector: hijacking site addresses. Attacks against domain name registration accounts and the hijacking of domain name system records are profoundly disruptive and dangerous to business.

Read more...
 

New data protection strategies

As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging.

Read more...
 

Trust but verify.managing and auditing privileged users

Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.

Read more...
 

Drive Down Your Costs Through Security Consolidation

Hear real-world examples of how companies like yours consolidated their security to lower their total cost of ownership, optimized existing resources, increased their security and dramatically improved productivity!

Read more...
 

www.contoural.comTen Essential Elements of a Successful Electronic Records Retention and Destruction Program

Organizations today are finding themselves under increasing pressure, both legal and regulatory, to properly retain or delete documents. While policies and procedures for paper records may seem adequate, many companies find it difficult to translate those policies and requirements to electronically stored information (ESI) such as e-mail messages and electronic document files.

Read more...
 

www.contoural.comSix Critical Steps to Managing Electronically Stored Information under FRCP (Part 2)

Once an organization has become litigation ready by creating an ESI survey data map,implementing a records retention and deletion process, and establishing a litigation hold process, additional steps can be taken to further prepare for legal actions.

Read more...
 

www.contoural.comSix Critical Steps to Managing Electronically Stored Information under FRCP (Part 1)

Litigation always, has been, and will continue to be, a reality of doing business. What is changing, however, is discovery and its focus on electronically stored information (often abbreviated ESI).

Read more...
 

www.contoural.comHow Long Should Email Be Saved?

As email has become more critical in the business world, many companies are weighing the question of how long it should be retained, what should be done with it, and when it should be deleted. The answer depends on many issues, particularly when one considers the varying regulations and business situations that might demand emails to be archived for long periods of time.

Read more...
 

PCI Compliance: Are You Onboard?

This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.

Read more...
 

Accelerate results by aligning Lean Six Sigma, BPM and SOA.

There has never been a more important time to uncover process waste, reduce non-value adding activity, and increase productivity. Lean Six Sigma (LSS) produces real results, and when combined with business process management (BPM) and service oriented architecture (SOA) can position a company for growth as the economy begins to improve.

Read more...
 

 Predictive Intelligence: Identify Future Problems and Prevent Them from Happening

There is a natural progression from reactive to proactive, and ultimately predictive technology, and this progression corresponds to the maturity level of your IT organization and the tools you leverage.

Read more...
 

Information Security: It's Not an Option

Technology has helped financial institutions work harder and faster than ever before. The downside: Sensitive data is more vulnerable than ever before. Financial Insights offers ideas and solutions to improve Information Security (IS). Click to learn more on protecting your most important assets, your data.

Read more...
 
Page 9 of 22

  Most Popular | All