IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

corpintegrityGRC Reference Architecture – Understanding the Landscape of GRC Software

While GRC is ultimately about collaboration and communication between business roles and processes, technology provides the backbone that enables GRC. To describe this technology, Corproate Integrity has defined the GRC Reference Architecture2 (this is closely aligned to the second version of the Open Compliance & Ethics Group (OCEG) GRC Technology Blueprint).

Read more...
 
E-mail

www.corp-integrity.comSix Critical Elements to Effective PCI DSS Compliance and Beyond

The Payment Card Industry Data Security Standard (PCI DSS), developed by the Payment Card Industry Security Standards Council, which consists of vendors such as VISA, Master Card, American Express, Discover and JCB, provides payment card data protection requirements for organizations that process card payments.

Read more...
 
E-mail

corpintegrityCollaborative Accountability in the Extended Enterprise: Managing Risk & Compliance Across Business Relationships

No company is an island unto itself: Organizations are a complex and diverse system of processes and business relationships. Risk and compliance challenges do not stop at traditional organizational boundaries. Organizations today struggle to identify, manage, and control governance, risk management and compliance (GRC) across extended business relationships.

Read more...
 
E-mail

corpintegrityAnti-Corruption: Efficient and Effective Compliance with U.K. Bribery Act, U.S. FCPA, and OECD Good Practices

The distributed and dynamic nature of business makes ethics and compliance a challenge. How does an organization validate it is current with legal, regulatory, and other obligations within an ever-changing business environment? Global compliance in the context of a complex and dynamic business environment is particularly challenging as organizations face broadening anti-corruption laws and regulations. Ultimately, the best offense is a good defense.

Read more...
 
E-mail

SDG CorpThe Value of a Unified Security Platform

Businesses today have a multitude of security tools and technologies spread across the enterprise. As a result, most IT organizations must work with a security posture cobbled together from so many individual solutions that it is impossible to get a unified view at any given point in time. Given the amount of data generated by security tools, vulnerability tools, policy violations, highly privileged access reviews, and more, organizations need a structured way to understand their security posture.

Read more...
 
E-mail

www.forescout.comNetwork Security in the Age of *Any* Computing

Risks and Options to Control Mobile, Wireless and Endpoint Devices

Written by distinguished security industry analyst Mike Rothman of Securosis

Read more...
 
E-mail

HISPIAuditing the Cloud; what is the necessary comfort level?

Recorded: February 1 | 2012    View       

Cloud Computing has been hailed as the long sought after answer of low cost computing , where users can remotely store their data into the cloud and enjoy the on-demand high quality applications and services from a shared platform of computing resources. By outsourcing their data storage, users can be relieved from the burden of local data storage and maintenance, in some cases eliminating IT departments all together.

Read more...
 
E-mail

corpintegrityCollaborative Accountability in Investigations: Effectively Managing Investigations Across the Enterprise

Investigations, done right, minimize or control loss, uncover systemic issues, identify risk areas, and provide information that drive continuous improvement initiatives. As a result, investigations are a critical cornerstone to governance, risk management, and compliance (GRC) efforts in the ability to find and resolve issues to reduce exposure and contain loss to the organization.

Read more...
 
E-mail

corpintegrityCollaborative Accountability in Policy Management: Effectively Managing Policies Across the Enterprise

Most organizations fail to manage the lifecycle of policy, resulting in policies that are out-of-date, ineffective, and not aligned to business needs. It opens the doors of liability, as an organization may be held accountable for policy in place that is not appropriate or properly enforced. Organizations require a consistent process to develop, communicate, monitor, and maintain corporate policy and procedures.

Read more...
 
E-mail

corpintegrityRegulatory Intelligence: Approaching Regulatory Change in a Consistent Process

The old paradigm of regulatory change management is clearly a recipe for disaster given the volume, pace of change and the broader operational impact of today's laws and regulations. Just as the CFO needs a financial system or the sales department needs CRM, legal and compliance need regulatory intelligence.

Read more...
 
Page 13 of 15

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner