IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

BrainloopEnterprise Information Security Options for 2012

As organizations increasingly participate in a collaborative economy, sharing documents becomes ever more crucial. Documents travel farther and wider than ever before due to expanding corporate ecosystems and increasingly virtualized business networks encompassing more partners, joint ventures, and collaborative projects.
Read more...
 

BrainloopTen Questions to Identify Compliance Risks When Sharing Information

Corporate and regulatory compliance policies have forced companies to ensure that information flows are documented, auditable, and highly secure. Yet in order to conduct their business, companies must share sensitive information outside the firewall, introducing serious potential information risk.

Read more...
 

Tokenization PerspectiveTokenization is About More Than PCI Compliance – It's a Strategic Business Decision

Heightened merchant concerns over securing sensitive cardholder information, as well as new Payment Card Industry (PCI) security mandates, have driven demand for integrated card data protection solutions. These concerns are well justified.

Read more...
 

Ccombat Fraud and Protect Your Bottom LineCombat Fraud and Protect Your Bottom Line

Fraud in the insurance industry is nothing new; however, the growth of both telephone and Web-based sales channels provides fraudsters with greater opportunity to take advantage of insurance companies.

Read more...
 

MEGAEnterprise Architecture (EA) as an enabler for GRC

Many organisations' governance, risk management and compliance (GRC) practices have not changed for years. The result is organisations are struggling to keep up with the complex regulatory environment and meet external stakeholders' expectations. Many organisations, no matter what sector they trade in are seeking to become more flexible and profitable while increasing internal controls and reducing risk. These objectives appear to be contradictory, but one way large organisations can unite them is by improving their approach to GRC.

Read more...
 

Chase PaymentechSeven Steps to Merchant Success in Recurring Payments

For businesses that accept recurring payments, customer relationships last well beyond a single transaction. For these merchants and billers, it's critical to utilize payment tools that can minimize billing disruptions and maintain service continuity. This can reduce processing costs, maximize revenues, and strengthen customer satisfaction.

Read more...
 

2011 PS Report2011 Payment Security Practices and Trends Report

Managing payment security is an ongoing challenge for organizations. To help businesses understand management trends and practices among peer groups, CyberSource and Trustwave, in partnership with the Merchant Risk Council (MRC), commissioned the Payment Security Practices and Trends Survey. The report summarizes the findings and provides insights and industry benchmarks, as well as industry trends.

Read more...
 

www.agiliance.comPreparing for PCI DSS 2.0   

On January 1, 2011 the Payment Card Industry (PCI) Data Security Standard (DSS) version 2.0 took effect. The new requirements represent a daunting task when it comes to improving an organization's existing security policies to include virtualized environments, policy governance, risk remediation, and 100% asset coverage.

Read more...
 

BrainloopManaging Information Risk in the Extended Enterprise: Why Corporate Compliance and IT Security Must Join Forces

One of the biggest sources of information risk companies face today is collaboration with externals. New tools have made document collaboration much easier and more accessible, but how does business take advantage of the benefits of online document collaboration tools, while avoiding the compromise of confidentiality of critical business information?

Read more...
 

www.protegrity.comProtegrity Data Security Platform Executive Summary

The Protegrity Data Security Platform design is based on a hub and spoke deployment architecture. The Enterprise Security Administrator (ESA) enables the authorized Security Officer to determine and set a unique enterprise wide Data Security Policy, and is the management tool (console) for the central control over policy, keys, and reporting.

Read more...
 

www.protegrity.comProtegrity Tokenization - Securing Sensitive Data for PCI, HIPAA and Other Data Security Initiatives

Protegrity has invented a new tokenization technology that simplifies and dramatically lowers the cost of deploying this mode of data protection. Tokens are cost effective because they don't require security controls for protection – they're not sensitive data, they only represent that data. Yet tokens are transparent to most applications and business processes.

Read more...
 

www.intel.comIntel® Expressway Tokenization Broker Data Sheet

Details how organizations can reduce PCI DSS scope and lower costs, by leveraging Intel® Expressway Tokenization Broker to manage Primary Account Number (PAN) data. Tokenization Broker is offered in conjunction with our industry-leading Intel® Expressway Service Gateway.

Read more...
 

AgilianceContinuous Compliance: A Better, Faster, Cheaper Way to Comply

Businesses today are under increased pressure to cut costs, optimize performance, and reduce risk. The need to meet these challenges is particularly apparent in the area of regulatory compliance. Historically, businesses responded to emerging regulatory requirements by assigning a dedicated team to handle every new mandate, each with its own specific team, mission, and project scope. But as regulations continue to proliferate and evolve, this approach is directly at odds with business requirements to improve performance, reduce costs, and more effectively manage risk. But what is the alternative, given the amount of effort required to manage compliance in a rapidly changing and increasingly complex regulatory landscape?

Read more...
 

www.intel.comPCI Solution Brief: Reducing PCI DSS Scope: The Gateway Approach

Organizations that process credit card information are confronted with the issue of PCI DSS "scope", which refers to all components of a computing network that directly or indirectly handle card data. These network components are a primary focus of PCI DSS regulation, compliance, and assessment.

Read more...
 
Page 4 of 22

  Most Popular | All