IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

sccethumbCCEP Handbook

This handbook provides information that you will need to register for the SCCE Certified Compliance & Ethics Professional (CCEP)Examination, including eligibility requirements, examination policies, an examination content outline, and an examination application.

Read more...
 
E-mail

corpintegrityValue of a Common Architecture for GRC Platforms

Jan 2010 - Business is complex and dynamic, and requires agility to stay competitive. Market leadership requires the organization is quick to respond to changing conditions - to pause means loss. Governance, risk, and compliance (GRC) processes often work against business agility. Requirements and initiatives managed across numerous silos, using manual or varying technology approaches, burden the business. The lackof a common process and technology architecture comes at a significant management cost.

Read more...
 
E-mail

www.protegrity.comProtegrity Tokenization - Securing Sensitive Data for PCI, HIPAA and Other Data Security Initiatives

Protegrity has invented a new tokenization technology that simplifies and dramatically lowers the cost of deploying this mode of data protection. Tokens are cost effective because they don't require security controls for protection – they're not sensitive data, they only represent that data. Yet tokens are transparent to most applications and business processes.

Read more...
 
E-mail

www.ergogroup.co.ukBenefits Realisation Management

Martin Boyd, Principal Consultant, Ergo

Abstract: Benefits realisation is becoming an increasingly used phrase and a hot topic within the world of Programme and Change Management. The reason behind this trend is simple: failure to deliver programmes and projects is now less common than the failure to realise any benefit from their implementation.

Read more...
 
E-mail

www.voltage.comVoltage Secure Stateless Tokenization (SST) Technology Data Sheet

Enterprises, merchants and payment processors face severe, ongoing challenges securing their networks and high value sensitive data such as payment cardholder data, to comply with the Payment Card Industry Data Security Standard (PCI DSS) and data privacy laws. Voltage SST Technology Delivers Advanced Protection for Sensitive Corporate Data.

Read more...
 
E-mail

www.metricstream.comMetricStream IT GRC Datasheet

Information technology is increasingly becoming the backbone for business operations of companies. However, IT is getting impacted due to growing concerns such as malicious code, system intrusion, data threats, IP violations and internal IT operational risks.

Read more...
 
E-mail

www.ostermanresearch.comThe Critical Need for Encrypted Email and File Transfer Solutions

This white paper discusses key issues around encryption for both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.

Read more...
 
E-mail

www.lumension.comSix Critical Elements to Achieve Economies in FISMA Compliance

Published: January, 2010 - For the past eight years, government agencies have struggled to comply with the requirements of the Federal Information Security Management Act of 2002 (FISMA).1

Read more...
 
E-mail

www.ostermanresearch.comConvincing Decision Makers of the Critical Need for Archiving

This white paper discusses the various reasons to archive email and other electronic content. However, it goes beyond that to provide some concrete reasons and justification for deploying and maintaining an archiving system, most of which are based on the cost savings that archiving can provide - both direct cost savings and reduced costs arising from lowered risk.

Read more...
 
E-mail

PCI DSS 2.0PCI DSS 2.0 & Virtualization - Are You Compliant?

Recorded: March 10 2011    View Webinar 

Understanding and complying with the PCI Data Security Standard (PCI DSS) can be a daunting task - especially if your organization has limited time and resources. The new PCI DSS 2.0 standard, which took effect Jan. 1, requires testing a virtualized environment to ensure that if you put multiple accounts onto a single processor, there is still segregation of data and all the data is protected.

Read more...
 
Page 7 of 16

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner
Banner