IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

Most Popular

E-mail

AgilianceA Risk-Based Approach to Security: Enabling an Automated Risk-Based Response to Security Threats

As the number and complexity of security threats continue to grow exponentially and the strike time continue to shorten, security organizations find themselves unable to scale their response using existing resources, processes, and tools. To overcome the challenges, the Chief Information Security Office (CISO) is adopting a "risk-based approach to security".

Read more...
 
E-mail

CyberSourceEnterprise Payment Security 2.0

There's no doubt protecting payment information during transmission, processing and storage is a business imperative. But, the current "lock-down" approach, which focuses on encrypting payment data within your environment, has proven inadequate, unmanageable, or both. Think about it.

Read more...
 
E-mail

scce_code_of_ethicsSCCE Code of Ethics

Compliance and ethics programs serve a critical role in helping to prevent and detect misconduct at and by organizations and to promote ethical business environments. The development and rigorous implementation of effective compliance and ethics programs protects investors, consumers, the business community and the public at large. Compliance and ethics professionals (CEPs) understand that the services we provide require the highest standards of professionalism, integrity and competence. Th e following Code of Ethics expresses the profession's recognition of its responsibilities to the general public, to employers and clients, and to the profession.

Read more...
 
E-mail

www.agiliance.comIT Impacts Under PCI DSS 2.0

Recorded: June 30 | 2011    View Webinar

In this session we will provide a detailed analysis on how PCI DSS 2.0 impacts your IT operations (e.g., network engineering, server management, and applications development); intended for technical audience.

Read more...
 
E-mail

www.lumension.comDon't Wave the White Flag Over Red Flags Rule

The Red Flags Rule, designed to mandate businesses that extend credit to customers to pay attention to the danger signs that could signal fraudulent activity as a result of identity theft, is enforceable as of June 1, 2010.

Read more...
 
E-mail

DatasheetThe Impact of COBIT on the CIO

In one of the most controversial cybercrime cases in recent years, Gary McKinnon, a UK based systems administrator, was accused by the US government of hacking into dozens of US military and NASA computers between February 2001 and March 2002. Dozens of critical systems were rendered inoperable, US Naval Air Station files were altered and deleted, and an entire network of 2,000 US Army computers was brought down.

Read more...
 
E-mail

www.alinegrc.comAline GRC Platform

Since 1995, AlineTMhas helped corporations build powerful GRC solutions to better manage risk and performance across the enterprise. Success has come from bringing together a unique blend of outstanding people, technologies, and ideas.

Read more...
 
E-mail

enterasyslogoDistributed Intrusion Prevention System

Traditional IPS and firewalls fall short of providing effective threat containment and can expose the enterprise to unacceptable levels of risk. As the majority of threats now originate from inside the organization rather than outside, security needs to be everywhere, rather than just at select perimeter locations.

Read more...
 
E-mail

www.facetime.comThe Impact of New Communication Tools for Financial Services Firms

Why You Should Read This White Paper - Securities traders, banks, investment advisors and others in the finacial services industry have long embraced new communication tools. Email, for example, and more recently instant messaging can provide individuals within these firms with a distinct competitive advantage by providing information more quickly and allowing them to make more well-informed decisions.

Read more...
 
E-mail

SAPImproving SAP Security with CA Identity and Access Management

Beyond these important benefits for SAP installations, CA IAM can provide important additional benefits to your enterprise. It helps reduce risk and improve the security of your SAP and non-SAP applications and data.

Read more...
 
Page 7 of 18

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner
Banner
Banner
Banner