IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

www.ostermanresearch.comThe Case for Outbound Content Management

This white paper focuses on the critical need to manage outbound content sent using email, instant messages, text messages, tweets, Facebook posts and the growing number of other venues from which damaging content might be sent.

Read more...
 
E-mail

www.aline.comComplete Production Inc, Case Study

Complete Production had been outsourcing their SOX compliance work to a local team of consultants. The consultants had set up Complete Production's original testing strategy and was about to perform all of the agreed upon testing.

Read more...
 
E-mail

www.lumension.comPractical Steps to Ensure GCSX Code of Connection Compliance and Beyond

The GCSX Code of Connection is an important step along the journey to provide a secure infrastructure for public sector business. At the time of writing most, if not all, work in local authorities to achieve compliance with the Code of Connection has been completed.

Read more...
 
E-mail

www.corp-integrity.comThe Big Picture of IT GRC

IT GRC is an Essential Part of Enterprise GRC. IT departments are scrambling to keep up with multiple initiatives that demand greater oversight of risk and compliance across the IT infrastructure, identities, processes and information. Most organizations approach these issues reactively - putting out IT fires wherever the flames are the hottest.

Read more...
 
E-mail

www.metricstream.comBenefits of IT Risk Management Process Automation

Automating the IT Risk Management process is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure,project management and business continuity processes.

Read more...
 
E-mail

DatasheetBuilding Stronger Information Security with NIST

In 2009, the FBI began investigating a breach of confidential records from the State of Virginia's Prescription Monitoring Program. Hackers had allegedly broken into the system, stolen 8.3 million patient records and were demanding a $10 million ransom to return the data. 1 Earlier that year, the U.S. Federal Aviation Administration had reported a similar incident wherein one of its systems had been hacked into, compromising the personal information of 45,000 employees.

Read more...
 
E-mail

www.metricstream.comBenefits of IT Risk Management Automation

Solutions for Better Business Performance. Delivering Governance, Risk, Compliance Through Software Benefits of IT Risk Management Automation Software, Services and Content

Read more...
 
E-mail

DatasheetThe Impact of COBIT on the CIO

In one of the most controversial cybercrime cases in recent years, Gary McKinnon, a UK based systems administrator, was accused by the US government of hacking into dozens of US military and NASA computers between February 2001 and March 2002. Dozens of critical systems were rendered inoperable, US Naval Air Station files were altered and deleted, and an entire network of 2,000 US Army computers was brought down.

Read more...
 
E-mail

VoltageCase Study: Global Investment Bank – Solving Data Residency and Privacy Compliance Challenges

Voltage SecureData™ Enterprise is the backbone of the global cloud, enterprise and mobile data security strategy at a western European investment bank with global presence. At the highest levels the bank recognizes their data is a strategic asset and their goal is to maximize the value of their information.

Read more...
 
E-mail

AgilianceThe Big Picture: Beyond Compliance to Risk Management

Regulatory compliance is dynamic, costly, and checking the box is no longer an option. Compliance mandates are global and require exposure by law when breaches do occur. However, many organizations do not tie risk management and compliance together. In fact, every day organizations make countless business decisions aimed to boost organizational performance. Unfortunately, most of these decisions are made without knowing the real tradeoffs against risk exposure.

Read more...
 
Page 7 of 15

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner