IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

www.cybersource.comA Manager's Guide to Comparing the Cost of Payment Security Strategies

This guide will help you assess and compare the cost of managing payment security via an on-premises or hosted operations model. Topics include:

Read more...
 
E-mail

paneltn2Enterprise IT-GRC Best Practices    Listen to Podcast

In this Executive Podcast Discussion Aberdeen Group's GRC Analyst Stephen Walker conducts an intriguing dialogue with 3 leading IT-GRC Vendor's; CA's Chris Fox, eFortresses John Dimaria and Aline's Roland Mosimann. The discussion covers the recent Aberdeen Group IT-GRC survey results and looks at some best practices and cost effective measures organizations can take to overcome the issues. Gain leading Market Intelligence by listening to this podcast.

Read more...
 
E-mail

www.boxtone.comEnforce enterprise security in the new mobile world: Mobile security compliance for personal device use and apps

This technical white paper drills down on how IT organizations can use BoxTone's enterprise-grade capabilities in addition to IT GRC (Governance, Risk management and Compliance) and SIEM (Security Incident and Event Management) systems to mitigate security risks, prevent data breaches, and block unauthorized access to corporate networks via iPhone, iPad, Android and other mobile devices.

Read more...
 
E-mail

www.ostermanresearch.comThe Case for Outbound Content Management

This white paper focuses on the critical need to manage outbound content sent using email, instant messages, text messages, tweets, Facebook posts and the growing number of other venues from which damaging content might be sent.

Read more...
 
E-mail

corpintegrityVendor Spotlight: SAP - When GRC Means Business

Published: August 2009 - Governance, risk management, and corporate compliance (GRC) is a business journey, not a destination. The business world is dynamic: Organizations are constantly reacting to an evolving risk and compliance landscape of pressure and control. Organizations tackle GRC as an integrated business collaboration and architecture to drive toward:

Read more...
 
E-mail

www.cybersource.comWhat is PCI Compliance Really Costing You?

On-Demand    View Webinar

Manage payment data on premises? Or have it hosted externally? Tokenization? End-to-end encryption? These are all hot topics in the world of PCI. If you've ever been asked to explore the costs of adopting these payment security approaches, this webinar is for you.

Read more...
 
E-mail

www.metricstream.comCase Study: A Leading Financial Services Organization Enables a Fully Unified, Streamlined, and Consistent Process for Threat and Vulnerability Management

Overview: As business operations scale up and become increasingly dependent on Information Technology (IT), IT environments will continue to become more complex, exposing organizations to a wide array of risks, threats, and vulnerabilities that have a direct impact on the performance of the enterprise.

Read more...
 
E-mail

FireEyeAdvanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks

Despite spending more than $20 billion annually on IT security, over 95 percent of companies harbor advanced malware within their networks. Learn how to combat the cybercriminals that continue to outsmart older, signature-based security technologies.

Read more...
 
E-mail

mxnewIs E-Mail Evil?

Recorded: Sept 11 2009   View Webinar

Presenting: Mark Diamond, President & CEO,Contoural, Nate Fitzgerald, Product Manager of Message Archiving, MX Logic

Many people believe that email is evil, and that it should be restricted, suppressed and deleted. Others - including many users - take the opposite view and attempt to save all email forever. What's an organization to do? This webinar will review the risks and costs of email, including litigation readiness and compliance. It will review strategies for balancing these risks with a save-it-forever mentality. Join us for what is sure to be a lively discussion!

Read more...
 
E-mail

IntelReducing PCI DSS Scope: The Gateway Approach

Organizations that process credit card information are confronted with the issue of PCI DSS "scope," which refers to all components of a computing network that directly or indirectly handle card data.

Read more...
 
Page 10 of 17

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner
Banner
Banner