IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

www.facetime.comSocial Computing and Compliance

Thanks to the rapid growth of Web sites such as Facebook and Twitter, social computing has entered the enterprise lexicon quickly as business and IT managers seek to leverage the power of social applications to improve communications and collaboration both internally and externally.

Read more...
 
E-mail

corpintegrityCompliance Risk Management in the 21st Century: From Finding and Fixing Problems to Compliance Risk Management 

Regulations, ethics, and integrity are challenging the organization like never before. Governments are increasing scrutiny of organizations, stakeholders demand transparency, clients want assurance the organization is reputable and upholds their values, and business partners require commitments to compliance and ethics.

Read more...
 
E-mail

DatasheetChallenges to PCI compliance

With the burgeoning popularity of online shopping and banking, credit card transactions are flourishing. Consequently, credit card fraud is on the rise.To combat this growing menace, the Payment Card Industry Data Security Standard (PCI DSS) was developed.

Read more...
 
E-mail

CHASE PaymentechBeyond the PCI Checkbox:  Establishing a Foundation for Security that Protects the Organization 

Recorded: October 13 | 2011    View Webcast

The Payment Card Industry Data Security Standard (PCI DSS) provides data protection requirements for organizations that process card payments. These requirements have even been adopted as law by some US states (e.g., Minnesota, Nevada, Washington). While organizations that fully comply with PCI DSS are considered compliant credit-card processors, compliance and security are not one in the same.

Read more...
 
E-mail

www.itgrcforum.comAligning GRC Technology with your GRC Program

Recorded: October 12 | 2011    View Webcast

Today, enterprises around the globe operate IT processes covering areas such as security, availability, infrastructure and IT project management. These processes support the core business processes that organizations use to operate successfully.

Read more...
 
E-mail

www.cybersource.comWhat is PCI Compliance Really Costing You?

On-Demand    View Webinar

Manage payment data on premises? Or have it hosted externally? Tokenization? End-to-end encryption? These are all hot topics in the world of PCI. If you've ever been asked to explore the costs of adopting these payment security approaches, this webinar is for you.

Read more...
 
E-mail

mxnewIs E-Mail Evil?

Recorded: Sept 11 2009   View Webinar

Presenting: Mark Diamond, President & CEO,Contoural, Nate Fitzgerald, Product Manager of Message Archiving, MX Logic

Many people believe that email is evil, and that it should be restricted, suppressed and deleted. Others - including many users - take the opposite view and attempt to save all email forever. What's an organization to do? This webinar will review the risks and costs of email, including litigation readiness and compliance. It will review strategies for balancing these risks with a save-it-forever mentality. Join us for what is sure to be a lively discussion!

Read more...
 
E-mail

CA TechnologiesThe role of identity and access management in achieving "continuous compliance"

There's a tremendous focus today on complying with regulatory mandates, keeping IT systems secure, and ensuring privacy for confidential enterprise and customer information.

Read more...
 
E-mail

www.lumension.comGoing Beyond Checkbox Compliance: How to Make Compliance Improve Your Security

Recorded: June 4 2010   View Webinar

In today's highly regulated environment, many organizations address compliance as one-off projects where the goal is to ‘get the box checked' by the auditor. This inefficient approach results in time- and resource-intensive work to pour through as many as 40,000 spreadsheets just for one compliance initiative* that provides little value back to the organization. This multiplies exponentially when dealing with multiple regulations.

Read more...
 
E-mail

www.metricstream.comBenefits of IT Risk Management Automation

Recorded: 25 August 2010   View Webinar 

Automating the IT Risk Management process is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

Read more...
 
Page 10 of 17

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner