IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

Combating Targeted Attacks

...To Protect Payment Data and Identify Threats.         Live Webcast!

Click on the slide!

PCI DSS: Blue Skies Ahead!

On-Demand               Play this educational discussion now.

Click on the slide!

Mitigating 3rd Party Vendor Risks

On-Demand               Play this educational discussion now.

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
E-mail

PanelCombating Targeted Attacks to Protect Payment Data and Identify Threats

When:    June 22 | 2016       Attend

The face of the threat landscape is becoming increasingly sophisticated and highly targeted. Advanced threats are succeeding in their effort to gain access to payment data of target organizations. CISOs, CXOs, and other executives need to become knowledgeable about the potential impacts of targeted attacks and advanced persistent threats. They need to become actively engaged in developing and implementing effective protective strategies.

Read more...
 
E-mail

Live WebcastPCI DSS: Preventing Costly Cases of Non Compliance

Recorded:    May 24 | 2016       Attend

There is a substantial cost associated with reaching and maintaining PCI DSS compliance requirements, but the cost of non-compliance is often much greater. While the initial cost of the technology, staff and other resources necessary to implement satisfactory controls has its price tag, it is vital that all organizations affected by the PCI standard consider both the short and long-term costs of non-compliance as well as the benefits to meeting the requirements.

Read more...
 
E-mail

Live Webinar!How to Identify and Reduce the Risks of 3rd Party Vendors

Recorded:    April 12 | 2016       Attend

In a landscape filled with new threats and regulations managing the risks of 3rd party vendors is vitally important. Most financial institutions have tens of thousands of supplier relationships, and many data breaches originate through IT Vendors within the supply chain. Compounding this dilemma, regulators including OIG, OCC, FFIEC and others are increasing their focus on potential 3rd party risks. They want to see organizations proactively identifying potential risks, verifying that business partners providers and their employees are compliant, monitoring for changes that might create new risks or compliance gaps, and managing the investigation and remediation of incidents.

Read more...
 
E-mail

Live Webcast!Implementing a Risk Migration Plan for PCI DSS 3.1

Recorded:    March 22 | 2016      Attend

Under the rules of PCI DSS v3.1, SSL and early versions of the Transport Layer Security (TLS) protocol are no longer considered acceptable for payment data protection due to "inherent weaknesses" within the protocol. Organizations who process payments must migrate to TLS 1.1 encryption or higher by June 2018. Prior to this date, existing implementations using SSL and/or early TLS must have a formal risk mitigation and migration plan in place. Moreover, details have just been released on the upcoming PCI DSS 3.2.

Read more...
 
E-mail

PanelThreat and Vulnerability Management: A Key Enabler of an Organizations IT GRC Program

Recorded:    February 24 | 2016       Attend

In every organization, there are a multitude of applications and devices and a universe of threats and vulnerabilities. Every process, function and system has certain risks and compliance requirements. It is no longer enough to have a handful of diligent security and compliance professionals managing the organization's risk strategies and controls. Their processes must embrace business and mission professionals' knowledge of risk, who evaluate the causal impact of threats to their operational performance, and participate in decision-making to meet their risk posture goals.

Read more...
 
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  Next 
  •  End 
  • »
Page 1 of 9

 

.Visionaries


.
Branden Williams Branden Williams Branden Williams has over fifteen years of experience in technology and information security with a formidable background in the majority of the technologies that drive today's businesses. Branden has experience working for startups and the Fortune 10, and the reason why some of the best companies in the world rely on ...
 
Rebecca Herold Rebecca Herold Rebecca Herold, CISM, CISSP, CISA, CIPP, FLMI. Rebecca is an information privacy, security and compliance consultant, author and instructor who has provided assistance, advice, services, tools and products to organizations in a wide range of industries during the past two decades. Rebecca is a widely recognized an...
 
Brandon Dunlap Brandon Dunlap Brandon Dunlap is the Managing Director of research at Brightfly. He has more than 15 years of experience managing business technology risk in large and small organizations. He has served in a variety of roles across heavily regulated industries, successfully leading all aspects of IT security programs, inclu...
 

More. . .