IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

www.ostermanresearch.comThe Case for Outbound Content Management

This white paper focuses on the critical need to manage outbound content sent using email, instant messages, text messages, tweets, Facebook posts and the growing number of other venues from which damaging content might be sent.

Read more...
 
E-mail

www.metricstream.comBenefits of IT Risk Management Automation

Solutions for Better Business Performance. Delivering Governance, Risk, Compliance Through Software Benefits of IT Risk Management Automation Software, Services and Content

Read more...
 
E-mail

enterasyslogoAutomated Threat Mitigation - Responding at Cyber-Speed

Recorded: 28 Jan 2010   View Webinar

Presenting: Dennis Boas, Security Solutions, Enterasys Networks

In today's networked world, critical data is stolen in real time. Bots, viruses and denial of service attacks propagate at network speeds. Escalating adoption of wireless, social networking, cloud computing and virtualization technologies increases your security risk. The only effective threat mitigation strategy is an automated real time response that stops the attack and prevents the attacker from trying again. This webinar discusses effective, automated threat mitigation and IPS solutions for enterprise networks and cyber-speed threats.

Read more...
 
E-mail

IntelReducing PCI DSS Scope: The Gateway Approach

Organizations that process credit card information are confronted with the issue of PCI DSS "scope," which refers to all components of a computing network that directly or indirectly handle card data.

Read more...
 
E-mail

CA TechnologiesCA Point of view: Content-Aware Identity & Access Management

CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.

Read more...
 
E-mail

AgilianceThe Big Picture: Beyond Compliance to Risk Management

Regulatory compliance is dynamic, costly, and checking the box is no longer an option. Compliance mandates are global and require exposure by law when breaches do occur. However, many organizations do not tie risk management and compliance together. In fact, every day organizations make countless business decisions aimed to boost organizational performance. Unfortunately, most of these decisions are made without knowing the real tradeoffs against risk exposure.

Read more...
 
E-mail

corpintegrityCollaborative Accountability in Investigations: Effectively Managing Investigations Across the Enterprise

Investigations, done right, minimize or control loss, uncover systemic issues, identify risk areas, and provide information that drive continuous improvement initiatives. As a result, investigations are a critical cornerstone to governance, risk management, and compliance (GRC) efforts in the ability to find and resolve issues to reduce exposure and contain loss to the organization.

Read more...
 
E-mail

www.ostermanresearch.comConvincing Decision Makers of the Critical Need for Archiving

This white paper discusses the various reasons to archive email and other electronic content. However, it goes beyond that to provide some concrete reasons and justification for deploying and maintaining an archiving system, most of which are based on the cost savings that archiving can provide - both direct cost savings and reduced costs arising from lowered risk.

Read more...
 
E-mail

FireEyeAdvanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks

Despite spending more than $20 billion annually on IT security, over 95 percent of companies harbor advanced malware within their networks. Learn how to combat the cybercriminals that continue to outsmart older, signature-based security technologies.

Read more...
 
E-mail

www.facetime.comSocial Computing and Compliance

Thanks to the rapid growth of Web sites such as Facebook and Twitter, social computing has entered the enterprise lexicon quickly as business and IT managers seek to leverage the power of social applications to improve communications and collaboration both internally and externally.

Read more...
 
Page 10 of 18

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner
Banner
Banner
Banner