IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

www.facetime.comThe Impact of New Communication Tools for Financial Services Firms

Why You Should Read This White Paper - Securities traders, banks, investment advisors and others in the finacial services industry have long embraced new communication tools. Email, for example, and more recently instant messaging can provide individuals within these firms with a distinct competitive advantage by providing information more quickly and allowing them to make more well-informed decisions.

Read more...
 
E-mail

www.lumension.comAchieving NERC Cyber Security Standards Compliance with Lumension

The North American Electric Reliability Corporation(NERC) is a non-profit corporation chartered to ensure that the bulk electric system in North America is reliable, adequate and secure.

Read more...
 
E-mail

DatasheetHow to Secure IT Assets with a Business Continuity Management Plan

In 2005, an American broadband and telecommunications company faced a major service outage in Los Angeles, California. A computer system's problem led to the corruption of the company's main software services environment. Over 150,000 customers lost land-line, Internet and some mobile phone and 911 services.

Read more...
 
E-mail

www.protegrity.comProtegrity Tokenization - Securing Sensitive Data for PCI, HIPAA and Other Data Security Initiatives

Protegrity has invented a new tokenization technology that simplifies and dramatically lowers the cost of deploying this mode of data protection. Tokens are cost effective because they don't require security controls for protection – they're not sensitive data, they only represent that data. Yet tokens are transparent to most applications and business processes.

Read more...
 
E-mail

sccethumbCCEP Handbook

This handbook provides information that you will need to register for the SCCE Certified Compliance & Ethics Professional (CCEP)Examination, including eligibility requirements, examination policies, an examination content outline, and an examination application.

Read more...
 
E-mail

enterasyslogoDistributed Intrusion Prevention System

Traditional IPS and firewalls fall short of providing effective threat containment and can expose the enterprise to unacceptable levels of risk. As the majority of threats now originate from inside the organization rather than outside, security needs to be everywhere, rather than just at select perimeter locations.

Read more...
 
E-mail

riskonnectEnterprise Risk Management

Recorded: April 30 2009  View Webinar    
 
Join Riskonnect and a line-up of thought-leading risk management executives for a one-of-a-kind webinar.  Risk management visionaries from leading organizations share their thoughts from the 2009 RIMS Annual Conference and discuss where the industry is headed,

Read more...
 
E-mail

corpintegrityValue of a Common Architecture for GRC Platforms

Jan 2010 - Business is complex and dynamic, and requires agility to stay competitive. Market leadership requires the organization is quick to respond to changing conditions - to pause means loss. Governance, risk, and compliance (GRC) processes often work against business agility. Requirements and initiatives managed across numerous silos, using manual or varying technology approaches, burden the business. The lackof a common process and technology architecture comes at a significant management cost.

Read more...
 
E-mail

www.isaca.orgSocial Media: Business Benefits and Security, Governance and Assurance Perspectives

Initiated as a consumer-oriented technology, social media is increasingly being leveraged as a powerful, low-cost tool for enterprises to drive business objectives such as enhanced customer interaction, greater brand recognition and more effective employee recruitment.

Read more...
 
E-mail

DatasheetThe Impact of COBIT on the CIO

In one of the most controversial cybercrime cases in recent years, Gary McKinnon, a UK based systems administrator, was accused by the US government of hacking into dozens of US military and NASA computers between February 2001 and March 2002. Dozens of critical systems were rendered inoperable, US Naval Air Station files were altered and deleted, and an entire network of 2,000 US Army computers was brought down.

Read more...
 
Page 7 of 17

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner