IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

EMV and Mobile Payment in 2015

Live Webcast!             Join our expert roundtable as we give some top security guidelines for EMV

Click on the slide!

Don't Be Another Headline

On-Demand               Learn how to implement data security best practices and view now!

Click on the slide!

Are You Securing Hadoop?

On-Demand               Learn about Securing Hadoop by adopting a Data-Centric Approach.

Click on the slide!

Building a Secure, Compliant Cloud.

On-Demand               Play and now learn the key concepts and best practices to build your…

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
E-mail

www.protegrity.comProtegrity Tokenization - Securing Sensitive Data for PCI, HIPAA and Other Data Security Initiatives

Protegrity has invented a new tokenization technology that simplifies and dramatically lowers the cost of deploying this mode of data protection. Tokens are cost effective because they don't require security controls for protection – they're not sensitive data, they only represent that data. Yet tokens are transparent to most applications and business processes.

Read more...
 
E-mail

AgilianceContinuous Compliance: A Better, Faster, Cheaper Way to Comply

Businesses today are under increased pressure to cut costs, optimize performance, and reduce risk. The need to meet these challenges is particularly apparent in the area of regulatory compliance. Historically, businesses responded to emerging regulatory requirements by assigning a dedicated team to handle every new mandate, each with its own specific team, mission, and project scope. But as regulations continue to proliferate and evolve, this approach is directly at odds with business requirements to improve performance, reduce costs, and more effectively manage risk. But what is the alternative, given the amount of effort required to manage compliance in a rapidly changing and increasingly complex regulatory landscape?

Read more...
 
E-mail

Social Media Risk v OppsSocial media in your business: The Risks vs. The Opportunities

Recorded: April 13 | 2011    View Webinar

The widespread private use by employees is embraced by many businesses in their communications. The policies and procedures on the proper business use of social media should address the protection of intellectual property, but also consider and respect the interest of preserving the public domain and fair use/dealing, of stimulating fair competition and innovation.

Read more...
 
E-mail

ANXTop Requirements for Successfully Automating SOX Quarterly Self-Assessments: Part 2

Recorded: April 27 | 2011    View Webinar 

For many organizations, Sarbanes-Oxley compliance is mandatory; both on the financial side and on the IT side managing the process can be an arduous an unwitting waste of time.  Walkthroughs that need to be reviewed by numerous individuals, tens of controls that need to be sampled and tested in detail can come with time lags that makes an already detailed task more cumbersome.

Read more...
 
E-mail

PCI DSS 2.0PCI DSS 2.0 & Virtualization - Are You Compliant?

Recorded: March 10 | 2011    View Webinar 

Understanding and complying with the PCI Data Security Standard (PCI DSS) can be a daunting task - especially if your organization has limited time and resources. The new PCI DSS 2.0 standard, which took effect Jan. 1, requires testing a virtualized environment to ensure that if you put multiple accounts onto a single processor, there is still segregation of data and all the data is protected.

Read more...
 
Page 4 of 8
.

 

.Visionaries


.
Steve Durbin Steve Durbin Steve Durbin is Vice President of the Information Security Forum (ISF). His main areas of focus include the emerging security threat landscape, Cyber security, BYOD, Big data, Cloud security and Social media across both the corporate and personal environments. He is a regular speaker and chair at global events and is o...
 
Ed Ferrara Ed Ferrara Ed Ferrara is Principal Analyst for Security and Risk at Forrester Research. He contributes to Forrester's offerings for the Security & Risk Professional, leading the company's coverage of security metrics, security program effectiveness, security awareness, and enterprise security information architecture. Ed's re...
 
mdiamond Mark Diamond Mark Diamond is the President and CEO, Contoural, Inc. He is one of the industry thought leaders in email archiving, litigation readiness, compliance, data protection and ILM strategies and practices. As CEO of Contoural, his company helps numerous Fortune 500 companies develop and execute email and document reten...
 

More. . .