IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

IBMProfiting from PCI Compliance

Working together, the major payment card providers have developed a set of data security standards and created a council for enforcing them. Although the Payment Card Industry Data Security Standard (PCI DSS) has become a global requirement, many organizations are lagging in compliance.

Read more...
 
E-mail

VoltageAchieving PCI DSS 2.0 Compliance with Voltage Security

The Payment Card Industry (PCI) Data Security Standard (DSS) 2.01 dictates that organizations processing and storing credit card data just comply with a set of well-defined audit requirements in twelve areas of cardholder data management and privacy. Compliance with PCI DSS 2.0 can be expensive, challenging, time-consuming, and disruptive, as cardholder data is often stored, transmitted, and used in many different applications within an organization, sometimes even beyond the organization's IT firewalls.

Read more...
 
E-mail

scce_code_of_ethicsSCCE Code of Ethics

Compliance and ethics programs serve a critical role in helping to prevent and detect misconduct at and by organizations and to promote ethical business environments. The development and rigorous implementation of effective compliance and ethics programs protects investors, consumers, the business community and the public at large. Compliance and ethics professionals (CEPs) understand that the services we provide require the highest standards of professionalism, integrity and competence. Th e following Code of Ethics expresses the profession's recognition of its responsibilities to the general public, to employers and clients, and to the profession.

Read more...
 
E-mail

CoalfireRisk Analysis versus Risk Assessment... What's the Difference?

Risk analysis.....risk assessment.....compliance assessment. Are these concepts as confusing to you as they are for most IT professionals?

Read more...
 
E-mail

www.ostermanresearch.comThe Critical Need for Encrypted Email and File Transfer Solutions

This white paper discusses key issues around encryption for both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.

Read more...
 
E-mail

DatasheetBuilding Stronger Information Security with NIST

In 2009, the FBI began investigating a breach of confidential records from the State of Virginia's Prescription Monitoring Program. Hackers had allegedly broken into the system, stolen 8.3 million patient records and were demanding a $10 million ransom to return the data. 1 Earlier that year, the U.S. Federal Aviation Administration had reported a similar incident wherein one of its systems had been hacked into, compromising the personal information of 45,000 employees.

Read more...
 
E-mail

ocOCEG GRC Technology Guide

Organizations today face unimaginable challenges as they do business in an increasingly complex global marketplace. They need to step back, get a good look at the challenges and develop an integrated approach to ensuring effective governance, managing risks, and optimizing performance while addressing compliance requirements throughout the enterprise. The result: what OCEG calls Principled Performance®.

Read more...
 
E-mail

www.agiliance.comIT Impacts Under PCI DSS 2.0

Recorded: June 30 | 2011    View Webinar

In this session we will provide a detailed analysis on how PCI DSS 2.0 impacts your IT operations (e.g., network engineering, server management, and applications development); intended for technical audience.

Read more...
 
E-mail

MDM Security and ComplianceEnabling Your Mobile Security Strategy for eGRC

Recorded: June 20 | 2012     View

The rapid evolution of consumer devices and a growing demand from employees are changing the ways in which organizations deliver mobility solutions to the workforce. There are any number of new mobile devices and emerging technologies to help today's professionals do their jobs in any location, and these technologies bring a range of new challenges, from security, compliance and risk management, to cost and human capital management.

Read more...
 
E-mail

www.metricstream.comBenefits of IT Risk Management Process Automation

Automating the IT Risk Management process is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure,project management and business continuity processes.

Read more...
 
Page 7 of 21

  Most Popular | All