IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

corpintegrityCollaborative Accountability in Governance, Risk, & Compliance: Creating Harmony Across Business Roles

The challenge for organizations from top to bottom is to provide harmony between silos of governance, risk, and compliance. Maintaining harmony is vital: Different roles — such as legal, risk mitigation, audit and compliance — have different and unique purposes, but must remain in tune with each other.

Read more...
 
E-mail

www.fixmo.comMobile Security and Risk Management

The proliferation of smartphones, tablets, mobile apps and BYOD policies are revolutionizing the way we work, but are also exposing organizations to increased operational risk and a growing range of security threats. Read this white paper for a comprehensive approach to mobile security, risk management and compliance for the new era of mobile computing and BYOD in the workplace.

Read more...
 
E-mail

Data SheetData Sheet: Bringing GRC Federation into IT Security

GRC, by definition, involves bringing together governance, risk and compliance disciplines from across an increasingly complex, extended enterprise with deep interlocks to customer and supplier eco-systems. While it's not realistic to expect organizations to converge on a common set of GRC processes across this complex landscape, there is huge value in taking a federated approach to GRC that leverages the common risk elements from each business unit, IT and security teams, and management of third parties.

Read more...
 
E-mail

Prime FactorsPrime Factors WP: PINs: PIN Technology and Management

PINs (Personal Identification Numbers) are those ubiquitous numbers we all know. They are used to authenticate cardholders, protecting personal accounts and issuers from fraudulent activities. The technology used in the creation, use, and management of PINs can be overwhelming and confusing.

Read more...
 
E-mail

www.itgrcforum.comImplementing a Risk Management Framework for Continuous Compliance

Recorded: March 23 | 2012    View

Senior management at all levels are pressured to improve their organizations risk management capabilities. In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders in all sectors.

Read more...
 
E-mail

www.lockpath.comUnlock the Power of the UCF to Solve Complex Compliance Issues

Managing compliance is tedious, time consuming and complex. Organizations are required to comply with multiple sets of external regulations encompassing hundreds, if not thousands, of individual controls scoped with varying applicability across multiple geographic locations and business units. To add to the confusion, this compliance is a constantly shifting target. The Unified Compliance Framework (UCF) eases the burden by giving organizations a defined set of common "harmonized" controls covering more than 500 separate regulations.

Read more...
 
E-mail

www.TruArx.comExpand Compliance Coverage: How to Identify and Manage Compliance with All of Your Data Security and Privacy Obligations

Recorded: 26 May 2010   View Webinar

Presenting: Chris Noell, Executive Vice President, Product Management, TruArx

In this 1-hour webcast, Chris Noell, TruArx EVP of Product Management, discusses why it's important to uncover ALL the data security and privacy regulations which affect your business. Chris will then review obstacles which prevent organizations from managing compliance obligations against more than a handful of regulations.

Read more...
 
E-mail

SDG CorpRisk Management in a Hyper-Connected World

Gaining visibility into and control over a huge range of internal and external risks is a top priority of corporations today.

Read more...
 
E-mail

BrainloopTen Questions to Identify Compliance Risks When Sharing Information

Corporate and regulatory compliance policies have forced companies to ensure that information flows are documented, auditable, and highly secure. Yet in order to conduct their business, companies must share sensitive information outside the firewall, introducing serious potential information risk.

Read more...
 
E-mail

Software AGAnalyzing the effects of risks and controls in business processes

Despite its growing maturity, simulation is still regarded by some as being complicated and impractical from a management perspective, even through the downfalls in static analysis of risk positions pertaining to business processes, projects, insurances or trading are well documented. Simulation is still perceived by some as an approach which involves too much data, too much expertise, and specialist skill sets to implement.

Read more...
 
Page 13 of 17

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner
Banner
Banner
Banner