IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

www.agiliance.comIT Impacts Under PCI DSS 2.0

Recorded: June 30 | 2011    View Webinar

In this session we will provide a detailed analysis on how PCI DSS 2.0 impacts your IT operations (e.g., network engineering, server management, and applications development); intended for technical audience.

Read more...
 
E-mail

DatasheetThe Impact of COBIT on the CIO

In one of the most controversial cybercrime cases in recent years, Gary McKinnon, a UK based systems administrator, was accused by the US government of hacking into dozens of US military and NASA computers between February 2001 and March 2002. Dozens of critical systems were rendered inoperable, US Naval Air Station files were altered and deleted, and an entire network of 2,000 US Army computers was brought down.

Read more...
 
E-mail

Prime FactorsFive Key Management Fundamentals for Unlocking Encryption Success

Prime Factors spoke with some of the best minds in data security to get their take on what kinds of data encryption management problems customers run into. They identified several common threats to key management and secure data access which they see over and over again, That advice is condensed and organized here for professionals responsible for effectively protecting sensitive data in their enterprises.

Read more...
 
E-mail

enterasyslogoDistributed Intrusion Prevention System

Traditional IPS and firewalls fall short of providing effective threat containment and can expose the enterprise to unacceptable levels of risk. As the majority of threats now originate from inside the organization rather than outside, security needs to be everywhere, rather than just at select perimeter locations.

Read more...
 
E-mail

www.facetime.comThe Impact of New Communication Tools for Financial Services Firms

Why You Should Read This White Paper - Securities traders, banks, investment advisors and others in the finacial services industry have long embraced new communication tools. Email, for example, and more recently instant messaging can provide individuals within these firms with a distinct competitive advantage by providing information more quickly and allowing them to make more well-informed decisions.

Read more...
 
E-mail

www.lumension.comAchieving NERC Cyber Security Standards Compliance with Lumension

The North American Electric Reliability Corporation(NERC) is a non-profit corporation chartered to ensure that the bulk electric system in North America is reliable, adequate and secure.

Read more...
 
E-mail

MDM Security and ComplianceEnabling Your Mobile Security Strategy for eGRC

Recorded: June 20 | 2012     View

The rapid evolution of consumer devices and a growing demand from employees are changing the ways in which organizations deliver mobility solutions to the workforce. There are any number of new mobile devices and emerging technologies to help today's professionals do their jobs in any location, and these technologies bring a range of new challenges, from security, compliance and risk management, to cost and human capital management.

Read more...
 
E-mail

sccethumbCCEP Handbook

This handbook provides information that you will need to register for the SCCE Certified Compliance & Ethics Professional (CCEP)Examination, including eligibility requirements, examination policies, an examination content outline, and an examination application.

Read more...
 
E-mail

DatasheetHow to Secure IT Assets with a Business Continuity Management Plan

In 2005, an American broadband and telecommunications company faced a major service outage in Los Angeles, California. A computer system's problem led to the corruption of the company's main software services environment. Over 150,000 customers lost land-line, Internet and some mobile phone and 911 services.

Read more...
 
E-mail

www.cybersource.comUnderstand The Requirements of PCI Data Security Standards

View Webinar

Getting your US and global business operations compliant with Payment Card Industry Data Security Standards (PCI-DSS) is a must-do. The first step is to understand what the 12 requirements mean. In this on-demand webinar, experts from CyberSource and Trustwave will explore the following topics:

Read more...
 
Page 7 of 17

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner
Banner
Banner
Banner