IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

Advanced ReliabilityAdvanced Reliability & Scalability for Mission-Critical Computing

Held: Jun 24 2010 11:00 am

Presenting: Robert Shiveley, Mission-Critical Platform Marketing Manager, Data Center

Over the past decade dramatic changes have been taking place in the datacenter. Long gone are the days when Sun was the "dot" in .com and companies were scrambling to put in place e-Commerce strategies and place their businesses on the Internet super highway.

Read more...
 
E-mail

Fusion Risk ManagementManaging an Operational Risk Management Program

Held: Jun 24 2010 12:00 pm

Presenting: Daniel A. Dec; Fusion Risk Management, SVP, Information Security

This presentation will discuss the challenges and benefits of developing and managing an Operational Risk Management Program (ORMP).

Read more...
 
E-mail

SonicWALLHow to Vaccinate Your Business from Disruptions and Disasters

Held: Jun 24 2010 3:00 pm

Presenting: Matt Dieckman; SonicWALL, Product Manager

At the beginning of this 2010, the harsh winter storms raging across the US brought many businesses to their knees - including even the most prepared of organizations like the Federal Government.

Read more...
 
E-mail

OracleBC/DR - What Changes in Technology Have Affected Our Plans

Held: Jun 24 2010 5:00 pm

Presenting: Frank Leonetti, Oracle Professional Services, Practice Manager: BC/DR

Frank has been a featured and keynote speaker at several North American conferences including: DRJ, DRIE, CPM, CIO Forum, InfoWorld, Marcus Evans BC/Security Conference and several ACP events.

Read more...
 
E-mail

www.itgrcforum.comSocial Media: Time for Control, Governance & Compliance?

When: July 14 @ 3PM EST

Presented by: Michael Rasmussen and Eric Young

500 million on Facebook, 75 million on LinkedIn. Many of these users are actively utilizing social media for business purposes - as increasingly the usage of social media is about communications, collaboration and communities - your users are bringing these tools into the workplace - to connect with customers, prospect new business and collaborate with partners.

Read more...
 
E-mail

CoDRIMProtecting Your Organization Against Supplier Failure

When: Jun 24 2010 10:00 am

Presenting: Colin Ive, Principal Consultant, CoDRIM

Program TBC

Read more...
 
E-mail

Iron MountainBackup + Cloud = Simplified Business Continuity

When: Jun 24 2010 9:00 am

Presenting: Stephan Haux, Senior Product Manager EMEA, Iron Mountain

Every IT application protected by Business Continuity (BC) plans needs to include backup. In any BC plan, backup itself must be protected with at least high a level as the application if is supposed to protect.

Read more...
 
E-mail

The EconomistMeasuring Supply Chain Business Continuity Capability

When: Jun 24 2010 8:00 am

Presenting: Vicki Gavin, Head of Business Continuity, The Economist Group

Program TBC

Read more...
 
E-mail

cloud_risksCloud Risks in Business Continuity

When: Jun 24 2010 6:00 am

Presenting: Jorge Sebastiao, BD Manager Managed Service, ICT & InfoSec Guru

With over 25 years of "Information and Communication Technology"-ICT experience, covering, managed services, outsourcing, security, business continuity, disaster recovery, vendor management, networking, infrastructure management, virtualization financial sector and telecom.

Read more...
 
E-mail

.COMMUNICATERun IT as a Service Business!

When: Jun 11 2010 10:00 am

Presenting: Martin Palmgren, IT Strategy & Transformation Executive of .COMMUNICATE.

Martin Palmgren is a senior consultant of Swedish origins and the IT Strategy & Transformation Executive of .COMMUNICATE. Engage live with Martin as he presents "Run IT as a Service Business".

Read more...
 
E-mail

www.BrightTALK.comDeciphering Service Portfolio Management

When: Jun 10 2010 4:00 pm

Presenting: Ian Clayton, Principal, Service Management

Join Ian Clayton as he deciphers the myths and uncovers the truths of Service Portfolio Management

Read more...
 
E-mail

itSMFITSM Implementations - Patterns, Trends and Lessons

When: Jun 10 2010 12:00 pm

Presenting: Dhiraj Gupta, Professional in Service Management

In this presentation, Dhiraj presents a thorough analysis of current patterns and emerging trends in ITSM Implementations. Specifically, Dhiraj discusses the reasons ITSM implementations are initiated, where ITSM lives within the IT organizations, the structure of the team delivering the project and various models for implementation.

Read more...
 
E-mail

OpTierWhat Your Application Monitoring Tools Aren't Telling You

When: Jun 10 2010 9:00 am

Presenting: Linh Ho, Director of Product Marketing, OpTier

With many traditional monitoring and management tool solutions on the market today, IT professionals are left holding the bag on how to piece together the solutions to deliver the data they need. And now new technologies are changing the way you manage IT and what you should expect from IT management solutions.

Read more...
 
E-mail

SDIEHow May I Support You?

When: Jun 10 2010 4:00 am

Presenting: Howard Kendall, SDI Europe; Don Page, Marval Group, Louise McDonald, Swinton Group

Getting the right people, creating the culture where you are keeping them motivated, business relevant, informed, continually improving and cost effective, is only truly viable with the development of service based skills and understanding across IT Services.

Read more...
 
E-mail

managing_an_incidentManaging an Incident; No Room for Democracy

When: Jun 24 2010 2:00 pm

Presenting: David Hutcheson, Managing Director, Glen Abbot Ltd

This presentation will give clear and practical advice on how to run an incident, what to make sure your Incident Management plan covers and how to pick your team.

Read more...
 
E-mail

www.lumension.comGoing Beyond Checkbox Compliance: How to Make Compliance Improve Your Security

Recorded: June 4 2010

In today's highly regulated environment, many organizations address compliance as one-off projects where the goal is to ‘get the box checked' by the auditor. This inefficient approach results in time- and resource-intensive work to pour through as many as 40,000 spreadsheets just for one compliance initiative* that provides little value back to the organization. This multiplies exponentially when dealing with multiple regulations.

Read more...
 
E-mail

www.TruArx.comExpand Compliance Coverage: How to Identify and Manage Compliance with All of Your Data Security and Privacy Obligations

Recorded: 26 May 2010

Presenting: Chris Noell, Executive Vice President, Product Management, TruArx

In this 1-hour webcast, Chris Noell, TruArx EVP of Product Management, discusses why it's important to uncover ALL the data security and privacy regulations which affect your business. Chris will then review obstacles which prevent organizations from managing compliance obligations against more than a handful of regulations.

Read more...
 
E-mail

www.TruArx.comExtending Your Risk and Compliance Program: Vendor Management Best Practices

When: Wednesday, July 21st @ 2pm EST

Presented By: Michael Rasmussen, Corporate Integrity, and Chris Noel, TruArx.

In today's economic climate, many organizations outsource parts of their business to take advantage of cost savings and solution-expertise. However, as vendor relationships increase, it becomes more difficult to manage them. The risks assumed by outsourcing can be significant without a vendor management program.

Read more...
 
E-mail

TruArxPodcast | Top 5 Compliance Management Pitfalls to Avoid in 2010

Short Summary: In this 12-minute podcast, Chris Noell, TruArx EVP of Product Management, discusses the five most common pitfalls when managing a successful and effective compliance program.

Read more...
 
E-mail

lumension 6 keysSix Keys to Healthcare IT Security and Compliance

Recorded: 7 April 2010

Presenting: Michael Rasmussen, Corporate Integrity; Chris Meritt, Lumension

Safeguarding electronic protected health information (ePHI) has proved quite challenging for many healthcare organizations. In fact, 80 percent of responding healthcare organizations had experienced at least one incident of lost or stolen electronic health information in the past year*.

Read more...
 
E-mail

OWASPTop 10 Risks in Application Security

When: Jun 04 2010 8:00 am

Presenting: Sebastien Giora, French Chapter Leader, OWASP

The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are.

Read more...
 
Page 5 of 14

Most Popular | Summits | All 

 

.

Featured Webcasts


www.itgrcforum.com How to Select the Right GRC Solution for Your Organization How to Select the Right GRC Solution for Your Organization Recorded: May 17 | 2012    Vie...
 
www.itgrcforum.com Aligning GRC Technology with your GRC Program Aligning GRC Technology with your GRC Program Recorded: October 12 | 2011    View We...
 
www.agiliance.com Tackling Compliance in a Multi-Regulatory World: Best Practices Revealed Tackling Compliance in a Multi-Regulatory World: Best Practices Revealed Recorded: August 11 | ...
 
ANX Top Requirements for Successfully Automating SOX Quarterly Self-Assessments: Vol. 2 Top Requirements for Successfully Automating SOX Quarterly Self-Assessments: Part 2 Recorded: April 27 |...
 
Social Media Risk v Opps Social media in your business: The Risks vs. The Opportunities Social media in your business: The Risks vs. The Opportunities Recorded: April 13 | 2011  &nbs...
 

More. . .