IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

enterasyslogoDistributed Intrusion Prevention System

Traditional IPS and firewalls fall short of providing effective threat containment and can expose the enterprise to unacceptable levels of risk. As the majority of threats now originate from inside the organization rather than outside, security needs to be everywhere, rather than just at select perimeter locations.

Read more...
 
E-mail

www.facetime.comThe Impact of New Communication Tools for Financial Services Firms

Why You Should Read This White Paper - Securities traders, banks, investment advisors and others in the finacial services industry have long embraced new communication tools. Email, for example, and more recently instant messaging can provide individuals within these firms with a distinct competitive advantage by providing information more quickly and allowing them to make more well-informed decisions.

Read more...
 
E-mail

www.protegrity.comProtegrity Tokenization - Securing Sensitive Data for PCI, HIPAA and Other Data Security Initiatives

Protegrity has invented a new tokenization technology that simplifies and dramatically lowers the cost of deploying this mode of data protection. Tokens are cost effective because they don't require security controls for protection – they're not sensitive data, they only represent that data. Yet tokens are transparent to most applications and business processes.

Read more...
 
E-mail

www.lumension.comAchieving NERC Cyber Security Standards Compliance with Lumension

The North American Electric Reliability Corporation(NERC) is a non-profit corporation chartered to ensure that the bulk electric system in North America is reliable, adequate and secure.

Read more...
 
E-mail

DatasheetThe Impact of COBIT on the CIO

In one of the most controversial cybercrime cases in recent years, Gary McKinnon, a UK based systems administrator, was accused by the US government of hacking into dozens of US military and NASA computers between February 2001 and March 2002. Dozens of critical systems were rendered inoperable, US Naval Air Station files were altered and deleted, and an entire network of 2,000 US Army computers was brought down.

Read more...
 
E-mail

Prime FactorsFive Key Management Fundamentals for Unlocking Encryption Success

Prime Factors spoke with some of the best minds in data security to get their take on what kinds of data encryption management problems customers run into. They identified several common threats to key management and secure data access which they see over and over again, That advice is condensed and organized here for professionals responsible for effectively protecting sensitive data in their enterprises.

Read more...
 
E-mail

sccethumbCCEP Handbook

This handbook provides information that you will need to register for the SCCE Certified Compliance & Ethics Professional (CCEP)Examination, including eligibility requirements, examination policies, an examination content outline, and an examination application.

Read more...
 
E-mail

DatasheetHow to Secure IT Assets with a Business Continuity Management Plan

In 2005, an American broadband and telecommunications company faced a major service outage in Los Angeles, California. A computer system's problem led to the corruption of the company's main software services environment. Over 150,000 customers lost land-line, Internet and some mobile phone and 911 services.

Read more...
 
E-mail

MDM Security and ComplianceEnabling Your Mobile Security Strategy for eGRC

Recorded: June 20 | 2012     View

The rapid evolution of consumer devices and a growing demand from employees are changing the ways in which organizations deliver mobility solutions to the workforce. There are any number of new mobile devices and emerging technologies to help today's professionals do their jobs in any location, and these technologies bring a range of new challenges, from security, compliance and risk management, to cost and human capital management.

Read more...
 
E-mail

riskonnectEnterprise Risk Management

Recorded: April 30 2009  View Webinar    
 
Join Riskonnect and a line-up of thought-leading risk management executives for a one-of-a-kind webinar.  Risk management visionaries from leading organizations share their thoughts from the 2009 RIMS Annual Conference and discuss where the industry is headed,

Read more...
 
Page 7 of 17

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner
Banner
Banner