IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

corpintegrityVendor Spotlight: SAP - When GRC Means Business

Published: August 2009 - Governance, risk management, and corporate compliance (GRC) is a business journey, not a destination. The business world is dynamic: Organizations are constantly reacting to an evolving risk and compliance landscape of pressure and control. Organizations tackle GRC as an integrated business collaboration and architecture to drive toward:

Read more...
 
E-mail

Prime FactorsPrime Factors WP: Best Practices for Anonymizing Data in Development and QA Testbeds

Practices for IT development and quality assurance have foundations that extend much further back than the original invention of information technology.

Read more...
 
E-mail

paneltn2Enterprise IT-GRC Best Practices    Listen to Podcast

In this Executive Podcast Discussion Aberdeen Group's GRC Analyst Stephen Walker conducts an intriguing dialogue with 3 leading IT-GRC Vendor's; CA's Chris Fox, eFortresses John Dimaria and Aline's Roland Mosimann. The discussion covers the recent Aberdeen Group IT-GRC survey results and looks at some best practices and cost effective measures organizations can take to overcome the issues. Gain leading Market Intelligence by listening to this podcast.

Read more...
 
E-mail

FireEyeAdvanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks

Despite spending more than $20 billion annually on IT security, over 95 percent of companies harbor advanced malware within their networks. Learn how to combat the cybercriminals that continue to outsmart older, signature-based security technologies.

Read more...
 
E-mail

www.facetime.comSocial Computing and Compliance

Thanks to the rapid growth of Web sites such as Facebook and Twitter, social computing has entered the enterprise lexicon quickly as business and IT managers seek to leverage the power of social applications to improve communications and collaboration both internally and externally.

Read more...
 
E-mail

mxnewIs E-Mail Evil?

Recorded: Sept 11 2009   View Webinar

Presenting: Mark Diamond, President & CEO,Contoural, Nate Fitzgerald, Product Manager of Message Archiving, MX Logic

Many people believe that email is evil, and that it should be restricted, suppressed and deleted. Others - including many users - take the opposite view and attempt to save all email forever. What's an organization to do? This webinar will review the risks and costs of email, including litigation readiness and compliance. It will review strategies for balancing these risks with a save-it-forever mentality. Join us for what is sure to be a lively discussion!

Read more...
 
E-mail

corpintegrityCompliance Risk Management in the 21st Century: From Finding and Fixing Problems to Compliance Risk Management 

Regulations, ethics, and integrity are challenging the organization like never before. Governments are increasing scrutiny of organizations, stakeholders demand transparency, clients want assurance the organization is reputable and upholds their values, and business partners require commitments to compliance and ethics.

Read more...
 
E-mail

www.metricstream.comCase Study: A Leading Financial Services Organization Enables a Fully Unified, Streamlined, and Consistent Process for Threat and Vulnerability Management

Overview: As business operations scale up and become increasingly dependent on Information Technology (IT), IT environments will continue to become more complex, exposing organizations to a wide array of risks, threats, and vulnerabilities that have a direct impact on the performance of the enterprise.

Read more...
 
E-mail

DatasheetChallenges to PCI compliance

With the burgeoning popularity of online shopping and banking, credit card transactions are flourishing. Consequently, credit card fraud is on the rise.To combat this growing menace, the Payment Card Industry Data Security Standard (PCI DSS) was developed.

Read more...
 
E-mail

www.itgrcforum.comAligning GRC Technology with your GRC Program

Recorded: October 12 | 2011    View Webcast

Today, enterprises around the globe operate IT processes covering areas such as security, availability, infrastructure and IT project management. These processes support the core business processes that organizations use to operate successfully.

Read more...
 
Page 10 of 17

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner