IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

VoltageAchieving PCI DSS 2.0 Compliance with Voltage Security

The Payment Card Industry (PCI) Data Security Standard (DSS) 2.01 dictates that organizations processing and storing credit card data just comply with a set of well-defined audit requirements in twelve areas of cardholder data management and privacy. Compliance with PCI DSS 2.0 can be expensive, challenging, time-consuming, and disruptive, as cardholder data is often stored, transmitted, and used in many different applications within an organization, sometimes even beyond the organization's IT firewalls.

Read more...
 
E-mail

www.boxtone.comEnforce enterprise security in the new mobile world: Mobile security compliance for personal device use and apps

This technical white paper drills down on how IT organizations can use BoxTone's enterprise-grade capabilities in addition to IT GRC (Governance, Risk management and Compliance) and SIEM (Security Incident and Event Management) systems to mitigate security risks, prevent data breaches, and block unauthorized access to corporate networks via iPhone, iPad, Android and other mobile devices.

Read more...
 
E-mail

www.itgrcforum.comHow to Select the Right GRC Solution for Your Organization

Recorded: May 17 | 2012    View

Governance, risk management and compliance (GRC) processes are extensive; they are how an organization is directed and managed to achieve goals, considering risks to achievement, and complying with applicable laws and regulations.

Read more...
 
E-mail

corpintegrityCollaborative Accountability in the Extended Enterprise: Managing Risk & Compliance Across Business Relationships

No company is an island unto itself: Organizations are a complex and diverse system of processes and business relationships. Risk and compliance challenges do not stop at traditional organizational boundaries. Organizations today struggle to identify, manage, and control governance, risk management and compliance (GRC) across extended business relationships.

Read more...
 
E-mail

www.fixmo.comMobile Risk Insider

The Mobile Risk Insider newsletter is designed for Fixmo's customers and partners, as well as anyone in the industry that cares about mobile security, risk management and compliance. It will offer insights and editorial on the latest news and headlines from Fixmo as well as the worlds of mobile risk management and mobile security. Each issue will provide a snapshot of Fixmo's recent product announcements and updates, the top rated posts from our online blog, elevant industry news and more.

Read more...
 
E-mail

corpintegrityGRC Reference Architecture – Understanding the Landscape of GRC Software

While GRC is ultimately about collaboration and communication between business roles and processes, technology provides the backbone that enables GRC. To describe this technology, Corproate Integrity has defined the GRC Reference Architecture2 (this is closely aligned to the second version of the Open Compliance & Ethics Group (OCEG) GRC Technology Blueprint).

Read more...
 
E-mail

www.corp-integrity.comSix Critical Elements to Effective PCI DSS Compliance and Beyond

The Payment Card Industry Data Security Standard (PCI DSS), developed by the Payment Card Industry Security Standards Council, which consists of vendors such as VISA, Master Card, American Express, Discover and JCB, provides payment card data protection requirements for organizations that process card payments.

Read more...
 
E-mail

corpintegrityAnti-Corruption: Efficient and Effective Compliance with U.K. Bribery Act, U.S. FCPA, and OECD Good Practices

The distributed and dynamic nature of business makes ethics and compliance a challenge. How does an organization validate it is current with legal, regulatory, and other obligations within an ever-changing business environment? Global compliance in the context of a complex and dynamic business environment is particularly challenging as organizations face broadening anti-corruption laws and regulations. Ultimately, the best offense is a good defense.

Read more...
 
E-mail

HISPIAuditing the Cloud; what is the necessary comfort level?

Recorded: February 1 | 2012    View       

Cloud Computing has been hailed as the long sought after answer of low cost computing , where users can remotely store their data into the cloud and enjoy the on-demand high quality applications and services from a shared platform of computing resources. By outsourcing their data storage, users can be relieved from the burden of local data storage and maintenance, in some cases eliminating IT departments all together.

Read more...
 
E-mail

SDG CorpThe Value of a Unified Security Platform

Businesses today have a multitude of security tools and technologies spread across the enterprise. As a result, most IT organizations must work with a security posture cobbled together from so many individual solutions that it is impossible to get a unified view at any given point in time. Given the amount of data generated by security tools, vulnerability tools, policy violations, highly privileged access reviews, and more, organizations need a structured way to understand their security posture.

Read more...
 
Page 13 of 16

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner
Banner