IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

QuocircaTo Lose One Set of Data May Be Regarded As Misfortune...

When: Aug 05 2010

Presenting: Clive Longbottom, Business Processes Facililitation, Quocirca

The paraphrasing of Oscar Wilde may seem apposite, but in actuality, the loss of even one set of data will look more like carelessness - and will have legal and brand ramifications.

Read more...
 
E-mail

www.metricstream.comBenefits of IT Risk Management Automation

When: 25 August 2010 @ 2pm EST  

Automating the IT Risk Management process is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

Read more...
 
E-mail

www.cybersource.comUnderstand The Requirements of PCI Data Security Standards

On-Demand    View Webinar

Getting your US and global business operations compliant with Payment Card Industry Data Security Standards (PCI-DSS) is a must-do. The first step is to understand what the 12 requirements mean. In this on-demand webinar, experts from CyberSource and Trustwave will explore the following topics:

Read more...
 
E-mail

www.itgrcforum.comSocial Media: Time for Control, Governance & Compliance?

Recorded: July 14 2010

Presented by: Michael Rasmussen and Eric Young

500 million on Facebook, 75 million on LinkedIn. Many of these users are actively utilizing social media for business purposes - as increasingly the usage of social media is about communications, collaboration and communities - your users are bringing these tools into the workplace - to connect with customers, prospect new business and collaborate with partners.

Read more...
 
E-mail

QuocircaMoving towards a Compliance Orientated Architecture

When: Aug 05 2010 4:00 am

Presenting: Clive Longbottom, Business Process Analysis, Quocirca

Moving towards a Compliance Orientated Architecture.

Read more...
 
E-mail

ISAFBest Practices: Preventing Converged Threats

When: Aug 05 2010 6:00 am

Presenting: Dr. David King, Founder & Chair, Information Security Awareness Forum (ISAF)

David is the head of the London branch of the Institute of Information Security Professionals. David has over 25 years of experience in security. He was the former Head of Group Information Security at Aviva and previously a VP and Chief Security Architect at JP Morgan Chase. He has also worked for CapGemini and ICL Defence Systems.

Read more...
 
E-mail

KTN Digital SystemsPreventing Data Loss within Cloud Environments

When: Aug 05 2010 9:00 am

Presenting: Emma Webb-Hobson, KTN Digital Systems

Preventing Data Loss within Cloud Environments.

Read more...
 
E-mail

M86 SecurityData Loss Prevention Doesn't Need to be Daunting

When: Aug 05 2010 10:00 am

Presenting: Bradley Anstis, VP Technical Strategy, M86 Security

Reported data breaches continue to increase year on year and regulatory requirements which aim to stem the tide of data leaks don't seem to be preventing this ever-growing problem.

Read more...
 
E-mail

NokiaProtecting What Matters: The Era of Fences is Over

When: Aug 05 2010 12:00 pm

Presenting: Jay Leek, Nokia, Global Manager, Corporate IT Security

It was not too many years ago when companies thought they were secure by simply deploying a firewall or other network security related solutions. Then came other infrastructure related security solutions, followed by the application security related buzz.

Read more...
 
E-mail

www.aberdeen.comContent-Aware: Aberdeen's 2010 Data Loss Prevention Report

When: Aug 05 2010 4:00 pm

Presenting: Derek E. Brink, CISSP; Aberdeen Group, Vice President and Research Fellow

Aberdeen's fourth annual study on data loss prevention -published on June 30, 2010 - presents the challenges, strategies, best practices and year-over-year comparisons of Best-in-Class organizations in safeguarding their sensitive data using content-aware data loss prevention technologies.

Read more...
 
E-mail

www.TruArx.comExpand Compliance Coverage: How to Identify and Manage Compliance with All of Your Data Security and Privacy Obligations

When: Wednesday, 26 May @ 12PM EST

Presenting: Chris Noell, Executive Vice President, Product Management, TruArx

In this 1-hour webcast, Chris Noell, TruArx EVP of Product Management, discusses why it's important to uncover ALL the data security and privacy regulations which affect your business. Chris will then review obstacles which prevent organizations from managing compliance obligations against more than a handful of regulations.

Read more...
 
E-mail

www.lumension.comGoing Beyond Checkbox Compliance: How to Make Compliance Improve Your Security

When: June 4 @ 11am EST

In today's highly regulated environment, many organizations address compliance as one-off projects where the goal is to ‘get the box checked' by the auditor. This inefficient approach results in time- and resource-intensive work to pour through as many as 40,000 spreadsheets just for one compliance initiative* that provides little value back to the organization. This multiplies exponentially when dealing with multiple regulations.

Read more...
 
E-mail

FiservAutomating Risk Management; When, Why, and How

Held: Jul 22 2010 10:00 am

Presenting: Simon Goldstein; Fiserv, Director, Risk Management, CISA, CISM

Regulations, examiners, internal and external auditors, as well as customers increasingly probe your business for details about your risk management practices.

Read more...
 
E-mail

Value Bridge5 Key Insights for IT Risk 2.0:Making Best Practices Work for YOU

Held: Jul 22 2010 11:00 am

Presenting: Brian Barnier; Value Bridge Advisors, Principal

IT Risk 2.0!? Am I ready? OMG, did I even do IT Risk 1.0? "Risk Management" has skyrocketed on both business and IT leader's priority lists - financial crisis, gulf oil spill, cyber-attacks, network failures, product liability.

Read more...
 
E-mail

OrbitzUnderstand Your Compliance Risks & What IT Risks Are Worth Taking

Held: Jul 22 2010 12:00 pm

Presenting: Jeramy Cooper-Leavitt, Orbitz World Wide, Director of Compliance

Compliance laws and new technologies can have a great impact on the business infrastructure and business process that we support as security and compliance professionals.

Read more...
 
E-mail

WhiteHat SecurityWeb Security Religions and Risk Windows

Held: Jul 22 2010 5:00 pm

Presenting: Jeremiah Grossman, WhiteHat Security, CTO and Founder

Information security threats are way up, fraud losses continue to rise, regulatory fines are increasingly common, and budgeted dollars to solve these myriad of problems are in short supply.

Read more...
 
E-mail

techtargetWhat's the Future for Intrusion Prevention? Key 2011 Trends

Held: Jul 08 2010 4:00 am

Presenting: Ron Condon, UK Bureau Chief, TechTarget

Ron Condon has been writing about developments in the IT industry for more than 30 years. In that time, he has charted the evolution from big mainframes, to minicomputers and PCs in the 1980s, and the rise of the Internet over the last decade or so.

Read more...
 
E-mail

ISACAIntrusion Prevention, are we Joking?

Held: Jul 08 2010 6:00 am

Presenting: Mark Henshaw, Director ISACA London, Chairman ISACA Winchester

Intrusion Prevention- are we joking?
- When your business is a target, can you really prevent sponsored intrusion?

Read more...
 
E-mail

SecureWorksBest Practices for Managing Intrusion Prevention Effectively

Held: Jul 08 2010 7:00 am

Presenting: Paul Pearston,Senior Security Engineer, SecureWorks

Best Practices for Managing Intrusion Prevention Effectively.

Read more...
 
E-mail

VodafoneTop Risks Associated with Implementing IPS

Held: Jul 08 2010 10:00 am

Presenting: Marco Ermini: Vodafone Group Services, Network Security Manager

Marco will share his experiences, and the top risks he faced when implementing IPS at Vodafone.

Read more...
 
E-mail

NetworkComputingNetwork Intrusion Prevention vs. Anomaly Detection

Held: Jul 08 2010 12:00 pm

Presenting: Mike Fratto; Network Computing, Editor

Before you can prevent an attack, you have to detect it. Traditional signature based IDS's are prone to false positives and can only detect malicious traffic it has signatures for.

Read more...
 
Page 4 of 14

Most Popular | Summits | All 

 

.

Featured Webcasts


www.itgrcforum.com How to Select the Right GRC Solution for Your Organization How to Select the Right GRC Solution for Your Organization Recorded: May 17 | 2012    Vie...
 
www.itgrcforum.com Aligning GRC Technology with your GRC Program Aligning GRC Technology with your GRC Program Recorded: October 12 | 2011    View We...
 
www.agiliance.com Tackling Compliance in a Multi-Regulatory World: Best Practices Revealed Tackling Compliance in a Multi-Regulatory World: Best Practices Revealed Recorded: August 11 | ...
 
ANX Top Requirements for Successfully Automating SOX Quarterly Self-Assessments: Vol. 2 Top Requirements for Successfully Automating SOX Quarterly Self-Assessments: Part 2 Recorded: April 27 |...
 
Social Media Risk v Opps Social media in your business: The Risks vs. The Opportunities Social media in your business: The Risks vs. The Opportunities Recorded: April 13 | 2011  &nbs...
 

More. . .