IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

paneltn2Enterprise IT-GRC Best Practices    Listen to Podcast

In this Executive Podcast Discussion Aberdeen Group's GRC Analyst Stephen Walker conducts an intriguing dialogue with 3 leading IT-GRC Vendor's; CA's Chris Fox, eFortresses John Dimaria and Aline's Roland Mosimann. The discussion covers the recent Aberdeen Group IT-GRC survey results and looks at some best practices and cost effective measures organizations can take to overcome the issues. Gain leading Market Intelligence by listening to this podcast.

Read more...
 
E-mail

www.metricstream.comBenefits of IT Risk Management Automation

Recorded: 25 August 2010   View Webinar 

Automating the IT Risk Management process is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

Read more...
 
E-mail

www.TruArx.comExtending Your Risk and Compliance Program: Vendor Management Best Practices

Recorded: July 21 2010   View Webinar

Presented By: Michael Rasmussen, Corporate Integrity, and Chris Noel, TruArx.

In today's economic climate, many organizations outsource parts of their business to take advantage of cost savings and solution-expertise. However, as vendor relationships increase, it becomes more difficult to manage them. The risks assumed by outsourcing can be significant without a vendor management program.

Read more...
 
E-mail

BrainloopManaging Information Risk in the Extended Enterprise: Why Corporate Compliance and IT Security Must Join Forces

One of the biggest sources of information risk companies face today is collaboration with externals. New tools have made document collaboration much easier and more accessible, but how does business take advantage of the benefits of online document collaboration tools, while avoiding the compromise of confidentiality of critical business information?

Read more...
 
E-mail

enterasyslogoAutomated Threat Mitigation - Responding at Cyber-Speed

Recorded: 28 Jan 2010   View Webinar

Presenting: Dennis Boas, Security Solutions, Enterasys Networks

In today's networked world, critical data is stolen in real time. Bots, viruses and denial of service attacks propagate at network speeds. Escalating adoption of wireless, social networking, cloud computing and virtualization technologies increases your security risk. The only effective threat mitigation strategy is an automated real time response that stops the attack and prevents the attacker from trying again. This webinar discusses effective, automated threat mitigation and IPS solutions for enterprise networks and cyber-speed threats.

Read more...
 
E-mail

2011 PS Report2011 Payment Security Practices and Trends Report

Managing payment security is an ongoing challenge for organizations. To help businesses understand management trends and practices among peer groups, CyberSource and Trustwave, in partnership with the Merchant Risk Council (MRC), commissioned the Payment Security Practices and Trends Survey. The report summarizes the findings and provides insights and industry benchmarks, as well as industry trends.

Read more...
 
E-mail

www.itgrcforum.comSocial Media: Time for Control, Governance & Compliance?

Recorded: July 14 2010   View Webinar

Presented by: Michael Rasmussen and Eric Young

500 million on Facebook, 75 million on LinkedIn. Many of these users are actively utilizing social media for business purposes - as increasingly the usage of social media is about communications, collaboration and communities - your users are bringing these tools into the workplace - to connect with customers, prospect new business and collaborate with partners.

Read more...
 
E-mail

BrainloopEnterprise Information Security Options for 2012

As organizations increasingly participate in a collaborative economy, sharing documents becomes ever more crucial. Documents travel farther and wider than ever before due to expanding corporate ecosystems and increasingly virtualized business networks encompassing more partners, joint ventures, and collaborative projects.
Read more...
 
E-mail

www.cybersource.comWhat is PCI Compliance Really Costing You?

On-Demand    View Webinar

Manage payment data on premises? Or have it hosted externally? Tokenization? End-to-end encryption? These are all hot topics in the world of PCI. If you've ever been asked to explore the costs of adopting these payment security approaches, this webinar is for you.

Read more...
 
E-mail

Social Media Risk v OppsSocial media in your business: The Risks vs. The Opportunities

Recorded: April 13 | 2011    View Webinar

The widespread private use by employees is embraced by many businesses in their communications. The policies and procedures on the proper business use of social media should address the protection of intellectual property, but also consider and respect the interest of preserving the public domain and fair use/dealing, of stimulating fair competition and innovation.

Read more...
 
Page 10 of 15

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner