IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

Live WebcastDon't Be the Next Headline: Data Security Best Practices for 2015 and Beyond

When: November 4 | 2014     Attend

Albert Einstein once observed: "Technological progress is like an axe in the hands of a pathological criminal." His words were eerily prophetic of the continuous news of data breaches in the retail sector.

Read more...
 
E-mail

Live Webcast!Securing Hadoop – the Data-Centric Approach

Recorded:   October 1 | 2014       Play

If you're embarking on Hadoop adoption you know that sensitive customer and corporate data will be in the ecosystem – transactional data, intellectual property, customer files, and more. As Adrian Lane of Securosis has noted, "High quality data produces better analysis results—which is why a key ingredient is sensitive data." Now the question becomes how to keep sensitive data secure as it moves into and beyond Hadoop, and—most importantly—how to protect the data but still make it accessible by many different users with varying analytic needs and ad-hoc processes.

Read more...
 
E-mail

Live Webcast!The Case for Building Your Own Secure, Compliant Cloud

Recorded:   September 24 | 2014      Play

What is driving expansion to the cloud? In most cases, it's cost. But for many enterprise IT organizations, it is about agility, efficiency, and productivity.

Read more...
 
E-mail

Live Panel Discussion!Panel: Why EMV is Not the Only Answer to Payment Security

Recorded:   September 16 | 2014      Play

2013 was the worst year yet in terms of data breaches, with over 740 million records exposed, and 2014 is shaping up to be more of the same. Security analysts estimate the costs of the data breach that hit U.S. retailer Target are approaching half a billion dollars for the company. The total cost of the breach including losses incurred by banks, consumers and others–could easily reach into the billions of dollars, and the incidents continue in the food industry, state government, and other sectors.

Read more...
 
E-mail

Live WebcastCompliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection

Recorded:   August 20 | 2014      Play

With the emergence of big data healthcare analytics, electronic health information exchange, clinical data warehousing, and other technologies for optimizing patient care, the healthcare industry has never been more reliant on electronic data and the strict requirements associated with the data. The advances in business processes, technology and regulations require that data security initiatives evolve to address new and growing threats. Coincidentally, in a recent survey, 69% of organizations felt that provisions of the Affordable Care Act (ACA) have the effect of increasing or significantly increasing risks to patient privacy and security.

Read more...
 
E-mail

Live WebcastEMV & Payment Security: Evolving Beyond the Mag Stripe

Recorded:   July 15 | 2014     Play

Everything changed six months ago. The Target data breach caused us all to rethink payment security. The U.S. transition to EMV chip and pin cards, is around the corner. Tune into this webinar for a complete update on where EMV is today – lessons learned from Europe and Canada's experience of EMV adoption, and the latest about the liability shift in the U.S. How and when will EMV be augmented by new approaches to card data in mobile wallets, online, and at the point of sale?

Read more...
 
E-mail

Live Webcast!Data Is the Heart of Your Organization. Keep It Safe in the Cloud with the Right DR Strategy

Recorded:   May 29 | 2014     Play

The state of business continuity and disaster recovery planning is dismal in most organizations and nonexistent in many. Most plans in place simply don't work. This is not surprising since disaster recovery hasn't been a priority among CIOs, until now, as cloud for disaster recovery is now a viable and more cost-effective option for organizations.

Read more...
 
E-mail

panelholdingtnA New IT Approach to GRC for Business Innovation

When:   July 23 | 2014       Attend

The burden of the existing day-to-day IT workload has never been greater and continues to grow. The recent financial scandals and high profile data breaches have raised scrutiny to unprecedented levels. This scrutiny, together with new legislative changes, has resulted in an array of new compliance measures and related challenges, which have led to a melting pot of complexity that has seen organizations increase spend simply to 'keep the IT maintenance lights on'.

Read more...
 
E-mail

Coming Up!Rethinking Email Security: Best Practices to Protect and Maintain Private Communications

Recorded:   May 6 | 2014      Attend

2014 has been called "The Year of Encryption." The recent data breaches, personal identity theft cases, email snooping concerns, and a serious, far-reaching software vulnerability (i.e., Heartbleed) have put a spotlight on the importance of protecting sensitive data, both inside and outside the enterprise. Email is invaluable to enterprises. It's the easiest mode of communication which also makes it an easy target for data theft.

Read more...
 
E-mail

Live Webcast!The New Data De-identification: Enabling Business Agility while Protecting Data Assets

Recorded:   April 23 | 2014     Attend

Let's face it, there's unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is 'How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?' With the advanced threats that are pervasive today, it's becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

Read more...
 
E-mail

Live WebcastLessons Learned From the Target Data Breach

Recorded:   March 18 | 2014     Play

In December 2013, US retailer Target suffered a high profile data breach at the hands of a cybercriminal group, who infected its point-of-sale (PoS) terminals with malware to steal the details of around 110 million customers. Marcus Group's systems were also compromised recently and crooks made off with customer card details, while several other merchants are reported to be preparing to go public with their own breaches.

Read more...
 
E-mail

panelholdingtnThird-Party Compliance: Managing Website Data to Reduce Corporate Risk 

Recorded:   February 5 | 2014      Play

Providing services and features to website visitors often requires deploying many third party service providers for analytics, marketing, payment processing, and data management. Managing risk from these third parties is vitally important in a landscape filled with new threats and regulations. The nature of these relationships requires that information be shared, and risk accrues whenever sensitive information is shared with or processed by third parties.

Read more...
 
E-mail

Live WebcastHow to Achieve Compliance and Secure the Public and Private Cloud

Recorded:    December 5 | 2013     View

New initiatives such as cloud computing are imposing significant security risks on the corporation, network, IT and the day to day activities of the business. How do businesses maintain compliance, control and ownership of sensitive data as they move from the physical environment to a cloud world? The distribution of data onto devices may not be completely controlled by the data owner, and there is liability confusion as cloud service providers take on a larger role. As a result CIOs are looking at technologies and strategies to assure security while delivering the required services.

Read more...
 
E-mail

PCI DSS 3.0PCI DSS 3.0 - What the Changes Mean for Your Organization 

Recorded:   January 21 | 2014      Play

The official release of PCI DSS v3.0 is here, now what? Voltage Security have invited a PCI DSS QSA to assist you with your PCI challenges by providing recommendations on how to execute a seamless upgrade from PCI DSS version 2.0 to 3.0. Find out why it's no longer acceptable to strive for compliance over real-time security. And learn how the new standard brings a whole new meaning to 'business as usual'.

Read more...
 
E-mail

Navigating PCI Security Mountains in the Cloud Panel Discussion: Navigating PCI Security Mountains in the Cloud 

Recorded:   November 6 | 2013      View

Organizations outsourcing card data to the cloud face significant security risks. Storing, processing and transmitting cardholder data in the cloud brings the cloud environment into scope for the PCI Data Security Standard (PCI DSS). And as soon as an organization adds other players to the offsite card-management mix, ensuring compliance with the PCI DSS becomes increasingly challenging.

Read more...
 
E-mail

On-DemandImplementing a Business-Driven Security Strategy

Recorded:     October 17 | 2013     Play

Today's corporate leaders face multiple challenges, including the need to innovate in extremely competitive business climates, address highly dynamic regulatory and compliance challenges, and secure the enterprise against a wide barrage of new and evolving sophisticated threats. Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed.

Read more...
 
E-mail

panelholdingtnBig Data Security in an Era of Social, Mobile and Cloud Computing

Recorded:    September 24 | 2013     Play

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. Today's expanded IT infrastructure, including Social, Mobile and Cloud Computing, is collecting more data, including sensitive data, and now significant security risks are being compounded as the data is being concentrated in large data "lakes" such as Hadoop. As a result CIOs are looking at upgrades, new technologies and new strategies to assure security while delivering the required services.

Read more...
 
E-mail

Big Data WorldManaging Security and Compliance in a Big Data World

Recorded:    August 14 | 2013     Play

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.

Read more...
 
E-mail

Navigating PCI Security Mountains in the CloudNavigating PCI Security Mountains in the Cloud 

Recorded:   May 15 | 2013     Play

Organizations outsourcing card data to the cloud face significant security risks. As soon as an organization adds other players to the offsite card-management mix, ensuring compliance with the PCI Data Security Standard becomes increasingly challenging. Cloud users and cloud service providers need to understand what their roles and responsibilities are when it comes to protecting this data. Storing, processing and transmitting cardholder data in the cloud brings the cloud environment into scope for PCI-DSS. 

Read more...
 
E-mail

RoundtableEnterprise Risk Management: a Holistic Approach

When:   April 4 | 2013      Play!

Organizations are suffering from volatility across all risk types, and need to re-think their enterprise risk strategy. In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders in all sectors, and gaining a complete view of an organization's risk exposure is increasing in complexity.

Read more...
 
E-mail

april2tnUsing Auto-Classification to Improve Your Information Governance Practices

Recorded:   April 2 | 2013     Play!

Information Governance is an essential element to your compliance planning and execution. With evolving regulatory demands and increased litigation, the imperative to gain control over business content has never been more critical. Experts know that managing the retention and disposition of business information reduces litigation risk and legal discovery costs. But with the best of plans, there are challenges to face and decisions to make. Add in the maturation of technology and security issues, and the challenges seem to grow exponentially.

Read more...
 
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  10 
  •  Next 
  •  End 
  • »
Page 1 of 14

Most Popular | Summits | All 

 

.

Featured Webcasts


www.itgrcforum.com How to Select the Right GRC Solution for Your Organization How to Select the Right GRC Solution for Your Organization Recorded: May 17 | 2012    Vie...
 
www.itgrcforum.com Aligning GRC Technology with your GRC Program Aligning GRC Technology with your GRC Program Recorded: October 12 | 2011    View We...
 
www.agiliance.com Tackling Compliance in a Multi-Regulatory World: Best Practices Revealed Tackling Compliance in a Multi-Regulatory World: Best Practices Revealed Recorded: August 11 | ...
 
ANX Top Requirements for Successfully Automating SOX Quarterly Self-Assessments: Vol. 2 Top Requirements for Successfully Automating SOX Quarterly Self-Assessments: Part 2 Recorded: April 27 |...
 
Social Media Risk v Opps Social media in your business: The Risks vs. The Opportunities Social media in your business: The Risks vs. The Opportunities Recorded: April 13 | 2011  &nbs...
 

More. . .