IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

EMV and Payment Security

Coming Up!               Learn why EMV is not the only answer to Payment Security on…

Click on the slide!

Building a Secure, Compliant Cloud.

Coming Up!               Learn best practices with us on Sept. 24th!

Click on the slide!

Risk-Based ePHI Security Planning

On-Demand               Compliance does not equal security! View now on-demand!

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
E-mail

PCI DSS 2.0PCI DSS 2.0 & Virtualization - Are You Compliant?

Recorded: March 10 | 2011    View Webinar 

Understanding and complying with the PCI Data Security Standard (PCI DSS) can be a daunting task - especially if your organization has limited time and resources. The new PCI DSS 2.0 standard, which took effect Jan. 1, requires testing a virtualized environment to ensure that if you put multiple accounts onto a single processor, there is still segregation of data and all the data is protected.

Read more...
 
E-mail

Simplify GRCSimplify IT Risk and Compliance Management

Recorded: Jan 26 2011   View Webinar

In this panel discussion we will address the challenges IT teams face as a result of siloed, inefficient point tool approaches to administering and enforcing security and compliance policy across hybrid IT infrastructures.

Read more...
 
E-mail

www.itgrcforum.comIntegrating Risk Management Systems to Optimize GRC

Recorded: Nov 16 2010   View Webinar

Integrating IT Risk Management systems is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

Read more...
 
E-mail

CA TechnologiesThe role of identity and access management in achieving "continuous compliance"

There's a tremendous focus today on complying with regulatory mandates, keeping IT systems secure, and ensuring privacy for confidential enterprise and customer information.

Read more...
 
E-mail

CA TechnologiesCA Point of view: Content-Aware Identity & Access Management

CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.

Read more...
 
Page 4 of 7
.

 

.Visionaries


.
Steve Durbin Steve Durbin Steve Durbin is Vice President of the Information Security Forum (ISF). His main areas of focus include the emerging security threat landscape, Cyber security, BYOD, Big data, Cloud security and Social media across both the corporate and personal environments. He is a regular speaker and chair at global events and is o...
 
Ed Ferrara Ed Ferrara Ed Ferrara is Principal Analyst for Security and Risk at Forrester Research. He contributes to Forrester's offerings for the Security & Risk Professional, leading the company's coverage of security metrics, security program effectiveness, security awareness, and enterprise security information architecture. Ed's re...
 
mdiamond Mark Diamond Mark Diamond is the President and CEO, Contoural, Inc. He is one of the industry thought leaders in email archiving, litigation readiness, compliance, data protection and ILM strategies and practices. As CEO of Contoural, his company helps numerous Fortune 500 companies develop and execute email and document reten...
 

More. . .