IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

The Elements of Privacy Risk

Click above to download this GRC Illustration!             

Click on the slide!

Best Practices for eGRC

Live Webcast!             Join us as we identify the best practices for eGRC program implementation

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
E-mail

2011 PS Report2011 Payment Security Practices and Trends Report

Managing payment security is an ongoing challenge for organizations. To help businesses understand management trends and practices among peer groups, CyberSource and Trustwave, in partnership with the Merchant Risk Council (MRC), commissioned the Payment Security Practices and Trends Survey. The report summarizes the findings and provides insights and industry benchmarks, as well as industry trends.

Read more...
 
E-mail

www.agiliance.comTackling Compliance in a Multi-Regulatory World: Best Practices Revealed

Recorded: August 11 | 2011    View Webinar 

As the number of regulations that affect Global 2000 organizations can easily exceed a dozen, many companies struggle to map multiple frameworks and specifications across configurations settings. This leads to cost-inefficiency, inaccuracies, and often audit fatigue.

Read more...
 
E-mail

www.itgrcforum.comImplementing a Risk Management Framework for Continuous Compliance

Recorded: March 23 | 2012     View

Senior management at all levels are pressured to improve their organizations risk management capabilities. In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders in all sectors.

Read more...
 
E-mail

BrainloopManaging Information Risk in the Extended Enterprise: Why Corporate Compliance and IT Security Must Join Forces

One of the biggest sources of information risk companies face today is collaboration with externals. New tools have made document collaboration much easier and more accessible, but how does business take advantage of the benefits of online document collaboration tools, while avoiding the compromise of confidentiality of critical business information?

Read more...
 
E-mail

www.protegrity.comProtegrity Tokenization - Securing Sensitive Data for PCI, HIPAA and Other Data Security Initiatives

Protegrity has invented a new tokenization technology that simplifies and dramatically lowers the cost of deploying this mode of data protection. Tokens are cost effective because they don't require security controls for protection – they're not sensitive data, they only represent that data. Yet tokens are transparent to most applications and business processes.

Read more...
 
Page 4 of 8
.

 

.Visionaries


.
Branden Williams Branden Williams Branden Williams has over fifteen years of experience in technology and information security with a formidable background in the majority of the technologies that drive today's businesses. Branden has experience working for startups and the Fortune 10, and the reason why some of the best companies in the world rely on ...
 
Rebecca Herold Rebecca Herold Rebecca Herold, CISM, CISSP, CISA, CIPP, FLMI. Rebecca is an information privacy, security and compliance consultant, author and instructor who has provided assistance, advice, services, tools and products to organizations in a wide range of industries during the past two decades. Rebecca is a widely recognized an...
 
Brandon Dunlap Brandon Dunlap Brandon Dunlap is the Managing Director of research at Brightfly. He has more than 15 years of experience managing business technology risk in large and small organizations. He has served in a variety of roles across heavily regulated industries, successfully leading all aspects of IT security programs, inclu...
 

More. . .