IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

Building a Secure, Compliant Cloud.

Coming Up!               Learn best practices with us on Sept. 24th!

Click on the slide!

Are You Securing Hadoop?

Coming Up!               Learn about Securing Hadoop by adopting a Data-Centric Approach.

Click on the slide!

Don't Be Another Target

Coming Up!               Learn how to implement data security best practices on Nov. 4

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
E-mail

Social Media Risk v OppsSocial media in your business: The Risks vs. The Opportunities

Recorded: April 13 | 2011    View Webinar

The widespread private use by employees is embraced by many businesses in their communications. The policies and procedures on the proper business use of social media should address the protection of intellectual property, but also consider and respect the interest of preserving the public domain and fair use/dealing, of stimulating fair competition and innovation.

Read more...
 
E-mail

ANXTop Requirements for Successfully Automating SOX Quarterly Self-Assessments: Part 2

Recorded: April 27 | 2011    View Webinar 

For many organizations, Sarbanes-Oxley compliance is mandatory; both on the financial side and on the IT side managing the process can be an arduous an unwitting waste of time.  Walkthroughs that need to be reviewed by numerous individuals, tens of controls that need to be sampled and tested in detail can come with time lags that makes an already detailed task more cumbersome.

Read more...
 
E-mail

PCI DSS 2.0PCI DSS 2.0 & Virtualization - Are You Compliant?

Recorded: March 10 | 2011    View Webinar 

Understanding and complying with the PCI Data Security Standard (PCI DSS) can be a daunting task - especially if your organization has limited time and resources. The new PCI DSS 2.0 standard, which took effect Jan. 1, requires testing a virtualized environment to ensure that if you put multiple accounts onto a single processor, there is still segregation of data and all the data is protected.

Read more...
 
E-mail

Simplify GRCSimplify IT Risk and Compliance Management

Recorded: Jan 26 2011   View Webinar

In this panel discussion we will address the challenges IT teams face as a result of siloed, inefficient point tool approaches to administering and enforcing security and compliance policy across hybrid IT infrastructures.

Read more...
 
E-mail

www.itgrcforum.comIntegrating Risk Management Systems to Optimize GRC

Recorded: Nov 16 2010   View Webinar

Integrating IT Risk Management systems is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

Read more...
 
Page 4 of 8
.

 

.Visionaries


.
Steve Durbin Steve Durbin Steve Durbin is Vice President of the Information Security Forum (ISF). His main areas of focus include the emerging security threat landscape, Cyber security, BYOD, Big data, Cloud security and Social media across both the corporate and personal environments. He is a regular speaker and chair at global events and is o...
 
Ed Ferrara Ed Ferrara Ed Ferrara is Principal Analyst for Security and Risk at Forrester Research. He contributes to Forrester's offerings for the Security & Risk Professional, leading the company's coverage of security metrics, security program effectiveness, security awareness, and enterprise security information architecture. Ed's re...
 
mdiamond Mark Diamond Mark Diamond is the President and CEO, Contoural, Inc. He is one of the industry thought leaders in email archiving, litigation readiness, compliance, data protection and ILM strategies and practices. As CEO of Contoural, his company helps numerous Fortune 500 companies develop and execute email and document reten...
 

More. . .