IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

www.metricstream.comBenefits of IT Risk Management Automation

Solutions for Better Business Performance. Delivering Governance, Risk, Compliance Through Software Benefits of IT Risk Management Automation Software, Services and Content

Read more...
 
E-mail

AgilianceThe Big Picture: Beyond Compliance to Risk Management

Regulatory compliance is dynamic, costly, and checking the box is no longer an option. Compliance mandates are global and require exposure by law when breaches do occur. However, many organizations do not tie risk management and compliance together. In fact, every day organizations make countless business decisions aimed to boost organizational performance. Unfortunately, most of these decisions are made without knowing the real tradeoffs against risk exposure.

Read more...
 
E-mail

CA TechnologiesCA Point of view: Content-Aware Identity & Access Management

CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.

Read more...
 
E-mail

enterasyslogoAutomated Threat Mitigation - Responding at Cyber-Speed

Recorded: 28 Jan 2010   View Webinar

Presenting: Dennis Boas, Security Solutions, Enterasys Networks

In today's networked world, critical data is stolen in real time. Bots, viruses and denial of service attacks propagate at network speeds. Escalating adoption of wireless, social networking, cloud computing and virtualization technologies increases your security risk. The only effective threat mitigation strategy is an automated real time response that stops the attack and prevents the attacker from trying again. This webinar discusses effective, automated threat mitigation and IPS solutions for enterprise networks and cyber-speed threats.

Read more...
 
E-mail

IntelReducing PCI DSS Scope: The Gateway Approach

Organizations that process credit card information are confronted with the issue of PCI DSS "scope," which refers to all components of a computing network that directly or indirectly handle card data.

Read more...
 
E-mail

www.ostermanresearch.comConvincing Decision Makers of the Critical Need for Archiving

This white paper discusses the various reasons to archive email and other electronic content. However, it goes beyond that to provide some concrete reasons and justification for deploying and maintaining an archiving system, most of which are based on the cost savings that archiving can provide - both direct cost savings and reduced costs arising from lowered risk.

Read more...
 
E-mail

FireEyeAdvanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks

Despite spending more than $20 billion annually on IT security, over 95 percent of companies harbor advanced malware within their networks. Learn how to combat the cybercriminals that continue to outsmart older, signature-based security technologies.

Read more...
 
E-mail

www.facetime.comSocial Computing and Compliance

Thanks to the rapid growth of Web sites such as Facebook and Twitter, social computing has entered the enterprise lexicon quickly as business and IT managers seek to leverage the power of social applications to improve communications and collaboration both internally and externally.

Read more...
 
E-mail

VoltageAchieving PCI DSS 2.0 Compliance with Voltage Security

The Payment Card Industry (PCI) Data Security Standard (DSS) 2.01 dictates that organizations processing and storing credit card data just comply with a set of well-defined audit requirements in twelve areas of cardholder data management and privacy. Compliance with PCI DSS 2.0 can be expensive, challenging, time-consuming, and disruptive, as cardholder data is often stored, transmitted, and used in many different applications within an organization, sometimes even beyond the organization's IT firewalls.

Read more...
 
E-mail

paneltn2Enterprise IT-GRC Best Practices    Listen to Podcast

In this Executive Podcast Discussion Aberdeen Group's GRC Analyst Stephen Walker conducts an intriguing dialogue with 3 leading IT-GRC Vendor's; CA's Chris Fox, eFortresses John Dimaria and Aline's Roland Mosimann. The discussion covers the recent Aberdeen Group IT-GRC survey results and looks at some best practices and cost effective measures organizations can take to overcome the issues. Gain leading Market Intelligence by listening to this podcast.

Read more...
 
Page 10 of 18

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner
Banner
Banner
Banner