IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

Enabling Risk Based IT Gov

Live Webcast!             Join us for key concepts and challenges with IT governance.

Click on the slide!

A Breach Prevention Plan

On-Demand               Play now to gain insights and some key steps to prevent payment card…

Click on the slide!

Best Practices for eGRC

On-Demand               Play now and learn how to implement best practices for eGRC.

Click on the slide!

The Elements of Privacy Risk

Click above to download this GRC Illustration!             

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks

panelholdingtnThird-Party Compliance: Managing Website Data to Reduce Corporate Risk 

Recorded:   February 5 | 2014      Play

Providing services and features to website visitors often requires deploying many third party service providers for analytics, marketing, payment processing, and data management. Managing risk from these third parties is vitally important in a landscape filled with new threats and regulations. The nature of these relationships requires that information be shared, and risk accrues whenever sensitive information is shared with or processed by third parties.


PCI DSS 3.0PCI DSS 3.0 - What the Changes Mean for Your Organization 

Recorded:   January 21 | 2014       Play

The official release of PCI DSS v3.0 is here, now what? Voltage Security have invited a PCI DSS QSA to assist you with your PCI challenges by providing recommendations on how to execute a seamless upgrade from PCI DSS version 2.0 to 3.0. Find out why it's no longer acceptable to strive for compliance over real-time security. And learn how the new standard brings a whole new meaning to 'business as usual'.


Live WebcastHow to Achieve Compliance and Secure the Public and Private Cloud

Recorded:    December 5 | 2013     View

New initiatives such as cloud computing are imposing significant security risks on the corporation, network, IT and the day to day activities of the business. How do businesses maintain compliance, control and ownership of sensitive data as they move from the physical environment to a cloud world? The distribution of data onto devices may not be completely controlled by the data owner, and there is liability confusion as cloud service providers take on a larger role. As a result CIOs are looking at technologies and strategies to assure security while delivering the required services.


Online Tech

PCI Compliant Hosting

Engaging customers online is a necessity for every business today. Brick and mortar traditional retail shopping experiences compete aggressively with online buying experiences, with local customers often choosing to buy online even if the store is right down the street. Key banking and bill processing transactions are only a mobile app away, making both e-commerce transactions and the the number of end points touching cardholder data prolific. Established companies have to become online and mobile before the younger, nimbler competition absconds with the mobile market share. Nascent startups have to provide mature transaction security to protect their reputation with customers, and access to credit lines.


Navigating PCI Security Mountains in the Cloud Panel Discussion: Navigating PCI Security Mountains in the Cloud 

Recorded:   November 6 | 2013      View

Organizations outsourcing card data to the cloud face significant security risks. Storing, processing and transmitting cardholder data in the cloud brings the cloud environment into scope for the PCI Data Security Standard (PCI DSS). And as soon as an organization adds other players to the offsite card-management mix, ensuring compliance with the PCI DSS becomes increasingly challenging.

Page 3 of 8



Branden Williams Branden Williams Branden Williams has over fifteen years of experience in technology and information security with a formidable background in the majority of the technologies that drive today's businesses. Branden has experience working for startups and the Fortune 10, and the reason why some of the best companies in the world rely on ...
Rebecca Herold Rebecca Herold Rebecca Herold, CISM, CISSP, CISA, CIPP, FLMI. Rebecca is an information privacy, security and compliance consultant, author and instructor who has provided assistance, advice, services, tools and products to organizations in a wide range of industries during the past two decades. Rebecca is a widely recognized an...
Brandon Dunlap Brandon Dunlap Brandon Dunlap is the Managing Director of research at Brightfly. He has more than 15 years of experience managing business technology risk in large and small organizations. He has served in a variety of roles across heavily regulated industries, successfully leading all aspects of IT security programs, inclu...

More. . .