IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

CA TechnologiesThe role of identity and access management in achieving "continuous compliance"

There's a tremendous focus today on complying with regulatory mandates, keeping IT systems secure, and ensuring privacy for confidential enterprise and customer information.

Read more...
 
E-mail

www.cybersource.comWhat is PCI Compliance Really Costing You?

On-Demand    View Webinar

Manage payment data on premises? Or have it hosted externally? Tokenization? End-to-end encryption? These are all hot topics in the world of PCI. If you've ever been asked to explore the costs of adopting these payment security approaches, this webinar is for you.

Read more...
 
E-mail

www.isaca.orgSocial Media: Business Benefits and Security, Governance and Assurance Perspectives

Initiated as a consumer-oriented technology, social media is increasingly being leveraged as a powerful, low-cost tool for enterprises to drive business objectives such as enhanced customer interaction, greater brand recognition and more effective employee recruitment.

Read more...
 
E-mail

www.lumension.comGoing Beyond Checkbox Compliance: How to Make Compliance Improve Your Security

Recorded: June 4 2010   View Webinar

In today's highly regulated environment, many organizations address compliance as one-off projects where the goal is to ‘get the box checked' by the auditor. This inefficient approach results in time- and resource-intensive work to pour through as many as 40,000 spreadsheets just for one compliance initiative* that provides little value back to the organization. This multiplies exponentially when dealing with multiple regulations.

Read more...
 
E-mail

mxnewIs E-Mail Evil?

Recorded: Sept 11 2009   View Webinar

Presenting: Mark Diamond, President & CEO,Contoural, Nate Fitzgerald, Product Manager of Message Archiving, MX Logic

Many people believe that email is evil, and that it should be restricted, suppressed and deleted. Others - including many users - take the opposite view and attempt to save all email forever. What's an organization to do? This webinar will review the risks and costs of email, including litigation readiness and compliance. It will review strategies for balancing these risks with a save-it-forever mentality. Join us for what is sure to be a lively discussion!

Read more...
 
E-mail

AgilianceContinuous Compliance: A Better, Faster, Cheaper Way to Comply

Businesses today are under increased pressure to cut costs, optimize performance, and reduce risk. The need to meet these challenges is particularly apparent in the area of regulatory compliance. Historically, businesses responded to emerging regulatory requirements by assigning a dedicated team to handle every new mandate, each with its own specific team, mission, and project scope. But as regulations continue to proliferate and evolve, this approach is directly at odds with business requirements to improve performance, reduce costs, and more effectively manage risk. But what is the alternative, given the amount of effort required to manage compliance in a rapidly changing and increasingly complex regulatory landscape?

Read more...
 
E-mail

www.metricstream.comBenefits of IT Risk Management Automation

Recorded: 25 August 2010   View Webinar 

Automating the IT Risk Management process is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

Read more...
 
E-mail

www.protegrity.comProtegrity Data Security Platform Executive Summary

The Protegrity Data Security Platform design is based on a hub and spoke deployment architecture. The Enterprise Security Administrator (ESA) enables the authorized Security Officer to determine and set a unique enterprise wide Data Security Policy, and is the management tool (console) for the central control over policy, keys, and reporting.

Read more...
 
E-mail

enterasyslogoAutomated Threat Mitigation - Responding at Cyber-Speed

Recorded: 28 Jan 2010   View Webinar

Presenting: Dennis Boas, Security Solutions, Enterasys Networks

In today's networked world, critical data is stolen in real time. Bots, viruses and denial of service attacks propagate at network speeds. Escalating adoption of wireless, social networking, cloud computing and virtualization technologies increases your security risk. The only effective threat mitigation strategy is an automated real time response that stops the attack and prevents the attacker from trying again. This webinar discusses effective, automated threat mitigation and IPS solutions for enterprise networks and cyber-speed threats.

Read more...
 
E-mail

www.metricstream.comCase Study: A Leading Financial Services Organization Enables a Fully Unified, Streamlined, and Consistent Process for Threat and Vulnerability Management

Overview: As business operations scale up and become increasingly dependent on Information Technology (IT), IT environments will continue to become more complex, exposing organizations to a wide array of risks, threats, and vulnerabilities that have a direct impact on the performance of the enterprise.

Read more...
 
Page 10 of 16

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner
Banner