IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

www.lockpath.comUnlock the Power of the UCF to Solve Complex Compliance Issues

Managing compliance is tedious, time consuming and complex. Organizations are required to comply with multiple sets of external regulations encompassing hundreds, if not thousands, of individual controls scoped with varying applicability across multiple geographic locations and business units. To add to the confusion, this compliance is a constantly shifting target. The Unified Compliance Framework (UCF) eases the burden by giving organizations a defined set of common "harmonized" controls covering more than 500 separate regulations.

Read more...
 

IntelReducing PCI DSS Scope: The Gateway Approach

Organizations that process credit card information are confronted with the issue of PCI DSS "scope," which refers to all components of a computing network that directly or indirectly handle card data.

Read more...
 

www.forescout.comIDC Report: Architecting a Flexible Bring Your Own Device Strategy

Written by security industry analyst Phil Hochmuth of IDC, reviews BYOD trends and risks, the mobile security landscape, policy development and control options. The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures.

Read more...
 

www.fixmo.comMobile Security and Risk Management

The proliferation of smartphones, tablets, mobile apps and BYOD policies are revolutionizing the way we work, but are also exposing organizations to increased operational risk and a growing range of security threats. Read this white paper for a comprehensive approach to mobile security, risk management and compliance for the new era of mobile computing and BYOD in the workplace.

Read more...
 

www.boxtone.comEnforce enterprise security in the new mobile world: Mobile security compliance for personal device use and apps

This technical white paper drills down on how IT organizations can use BoxTone's enterprise-grade capabilities in addition to IT GRC (Governance, Risk management and Compliance) and SIEM (Security Incident and Event Management) systems to mitigate security risks, prevent data breaches, and block unauthorized access to corporate networks via iPhone, iPad, Android and other mobile devices.

Read more...
 

www.forescout.comNetwork Security in the Age of *Any* Computing

Risks and Options to Control Mobile, Wireless and Endpoint Devices

Written by distinguished security industry analyst Mike Rothman of Securosis

Read more...
 

www.fixmo.comMobile Risk Management: Executive Overview

This executive presentation gives an overview on how to protect your devices, defend your data, maintain and prove regulatory compliance, and manage your risks while embracing a wide range of mobile devices and apps.

Read more...
 

www.boxtone.comCISO Handbook: Enterprise iPhone & iPad Security & Compliance

Focused on protecting corporate information as your workforce goes mobile, this CISO Handbook explains:

Read more...
 

www.fixmo.comMobile Risk Insider

The Mobile Risk Insider newsletter is designed for Fixmo's customers and partners, as well as anyone in the industry that cares about mobile security, risk management and compliance. It will offer insights and editorial on the latest news and headlines from Fixmo as well as the worlds of mobile risk management and mobile security. Each issue will provide a snapshot of Fixmo's recent product announcements and updates, the top rated posts from our online blog, elevant industry news and more.

Read more...
 

www.lockpath.comEnabling ISO/IEC 31000 Adoption with the LockPath Keylight Platform

An increasingly common question is "How do I implement ISO 31000 with your Governance, Risk and Compliance (GRC) platform?" This white paper introduces in broad strokes the purpose and approach of ISO 31000.

Read more...
 

www.lockpath.comLeveraging GRC for PCI DSS Compliance

Historically, one of the biggest problems with Payment Card Industry Data Security Standard (PCI DSS) compliance initiatives has been conducting it as a one-off security effort, treating the standard as a unique and independent set of requirements instead of integrating the requirements into a holistic GRC program.

Read more...
 

Software AGHow to Implement Effective Enterprise Risk Management

Over the past few years, organizations are more focused on "being in control." They are increasingly—often forced by regulations—building and implementing processes that underpin the company's "In Control Statement". The inevitable extra costs and efforts are often seen as a burden, distracting people from what they should focus on: doing business!

Read more...
 

SDG CorpHow to Effectively Manage the Compliance Lifecycle

In today's world of high uncertainty, rapid economic changes, and increasingly complex regulations, compliance has become a permanent part of doing business. Juggling the requirements of industry regulations, data privacy laws, and government mandates is no easy task, and maintaining ongoing compliance is complicated by constant changes, amendments, and overlaps. What's more, as regulations increase, the resources needed to comply with them increase as well – and so do the stakes.

Read more...
 

Software AGAnalyzing the effects of risks and controls in business processes

Despite its growing maturity, simulation is still regarded by some as being complicated and impractical from a management perspective, even through the downfalls in static analysis of risk positions pertaining to business processes, projects, insurances or trading are well documented. Simulation is still perceived by some as an approach which involves too much data, too much expertise, and specialist skill sets to implement.

Read more...
 
Page 3 of 22

  Most Popular | All