IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

enterasyslogoAutomated Threat Mitigation - Responding at Cyber-Speed

Recorded: 28 Jan 2010   View Webinar

Presenting: Dennis Boas, Security Solutions, Enterasys Networks

In today's networked world, critical data is stolen in real time. Bots, viruses and denial of service attacks propagate at network speeds. Escalating adoption of wireless, social networking, cloud computing and virtualization technologies increases your security risk. The only effective threat mitigation strategy is an automated real time response that stops the attack and prevents the attacker from trying again. This webinar discusses effective, automated threat mitigation and IPS solutions for enterprise networks and cyber-speed threats.

Read more...
 
E-mail

IntelReducing PCI DSS Scope: The Gateway Approach

Organizations that process credit card information are confronted with the issue of PCI DSS "scope," which refers to all components of a computing network that directly or indirectly handle card data.

Read more...
 
E-mail

www.ostermanresearch.comConvincing Decision Makers of the Critical Need for Archiving

This white paper discusses the various reasons to archive email and other electronic content. However, it goes beyond that to provide some concrete reasons and justification for deploying and maintaining an archiving system, most of which are based on the cost savings that archiving can provide - both direct cost savings and reduced costs arising from lowered risk.

Read more...
 
E-mail

www.facetime.comSocial Computing and Compliance

Thanks to the rapid growth of Web sites such as Facebook and Twitter, social computing has entered the enterprise lexicon quickly as business and IT managers seek to leverage the power of social applications to improve communications and collaboration both internally and externally.

Read more...
 
E-mail

FireEyeAdvanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks

Despite spending more than $20 billion annually on IT security, over 95 percent of companies harbor advanced malware within their networks. Learn how to combat the cybercriminals that continue to outsmart older, signature-based security technologies.

Read more...
 
E-mail

paneltn2Enterprise IT-GRC Best Practices    Listen to Podcast

In this Executive Podcast Discussion Aberdeen Group's GRC Analyst Stephen Walker conducts an intriguing dialogue with 3 leading IT-GRC Vendor's; CA's Chris Fox, eFortresses John Dimaria and Aline's Roland Mosimann. The discussion covers the recent Aberdeen Group IT-GRC survey results and looks at some best practices and cost effective measures organizations can take to overcome the issues. Gain leading Market Intelligence by listening to this podcast.

Read more...
 
E-mail

www.lumension.comGoing Beyond Checkbox Compliance: How to Make Compliance Improve Your Security

Recorded: June 4 2010   View Webinar

In today's highly regulated environment, many organizations address compliance as one-off projects where the goal is to ‘get the box checked' by the auditor. This inefficient approach results in time- and resource-intensive work to pour through as many as 40,000 spreadsheets just for one compliance initiative* that provides little value back to the organization. This multiplies exponentially when dealing with multiple regulations.

Read more...
 
E-mail

www.cybersource.comA Manager's Guide to Comparing the Cost of Payment Security Strategies

This guide will help you assess and compare the cost of managing payment security via an on-premises or hosted operations model. Topics include:

Read more...
 
E-mail

corpintegrityVendor Spotlight: SAP - When GRC Means Business

Published: August 2009 - Governance, risk management, and corporate compliance (GRC) is a business journey, not a destination. The business world is dynamic: Organizations are constantly reacting to an evolving risk and compliance landscape of pressure and control. Organizations tackle GRC as an integrated business collaboration and architecture to drive toward:

Read more...
 
E-mail

www.corp-integrity.comAchieve GRC Value: Efficient Business Process and Application Monitoring

Business today requires agility and efficiency to stay competitive. Organizations must respond rapidly to changing conditions, while managing financial and human capital costs.

Read more...
 
Page 10 of 17

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner
Banner
Banner
Banner