IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

www.ostermanresearch.comThe Concise Guide to E-Discovery

The goal of this white paper is to provide an introduction to the key areas involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process.


www.ostermanresearch.comThe Case for Outbound Content Management

This white paper focuses on the critical need to manage outbound content sent using email, instant messages, text messages, tweets, Facebook posts and the growing number of other venues from which damaging content might be sent.


www.lumension.comPractical Steps to Ensure GCSX Code of Connection Compliance and Beyond

The GCSX Code of Connection is an important step along the journey to provide a secure infrastructure for public sector business. At the time of writing most, if not all, work in local authorities to achieve compliance with the Code of Connection has been completed.


www.lumension.comDon't Wave the White Flag Over Red Flags Rule

The Red Flags Rule, designed to mandate businesses that extend credit to customers to pay attention to the danger signs that could signal fraudulent activity as a result of identity theft, is enforceable as of June 1, 2010.


www.lumension.comSix Critical Elements to Achieve Economies in NERC CIP Compliance

Utilities are under increasing pressure for accountability bearing down from several angles. The calls to manage IT risk and compliance forces them to rethink how they approach compliance economically and strategically.


contouralth10 Best Practices for Archiving

Although data privacy and identity theft have a higher profile in the minds of consumers, data retention issues can have a far greater financial impact on businesses. Every company, whether public or private, large or small, must have a policy and enforcement system to deal with the messages and files generated by the organization every day.


SAPGovernance, Risk, and Compliance Management: Realizing the Value of Cross-Enterprise Solutions

This paper explains SAP's vision for a cross-enterprise governance, risk and compliance (GRC) solution and the benefits it can provide, defines key terms, and discusses what to look for when evaluating GRC software options.


IBMProfiting from PCI Compliance

Working together, the major payment card providers have developed a set of data security standards and created a council for enforcing them. Although the Payment Card Industry Data Security Standard (PCI DSS) has become a global requirement, many organizations are lagging in compliance.


SAPIncreasing Business Agility: An Integrated Approach to Governance, Risk, and Compliance Management

This SAP Executive Insight focuses on helping executives determine: What are the consequences of today's typical GRC approaches?


CyberSourceEnterprise Payment Security 2.0

There's no doubt protecting payment information during transmission, processing and storage is a business imperative. But, the current "lock-down" approach, which focuses on encrypting payment data within your environment, has proven inadequate, unmanageable, or both. Think about it.

Page 6 of 26

  Most Popular | All