IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

Enabling Business Agility

Live Webcast!             Learn how to protect data assets with a new data de-identification framework.

Click on the slide!

Rethinking Email Security

Live Webcast!             Learn the key concepts and best practices to protect and maintain private email…

Click on the slide!

Disaster Recovery in the Cloud

Live Webcast!             Join us on May 29th to learn how to develop a metric-driven program!

Click on the slide!

Lessons from the Target Data Breach

On-Demand               Play Now!

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
E-mail

CA TechnologiesCA Point of view: Content-Aware Identity & Access Management

CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.

Read more...
 
E-mail

www.cybersource.comWhat is PCI Compliance Really Costing You?
Calculate the True Cost of Your Current or Proposed Strategies

Manage payment data on premises? Or have it hosted externally? Tokenization? End-to-end encryption? These are all hot topics in the world of PCI. If you've ever been asked to explore the costs of adopting these payment security approaches, this webinar is for you.

Read more...
 
E-mail

www.truarx.comTop Requirements for Successfully Automating SOX Quarterly Self-Assessments

Recorded: Sept 29 2010 

Presenting: Chris Noell, EVP of Product Management at TruArx

For many organizations, Sarbanes-Oxley compliance is mandatory, but automation of the self-assessment process can make it less painful. There are many advantages to using an IT GRC tool to automate assessments such as speed, efficiency, data integrity, and improved analysis.

Read more...
 
E-mail

www.metricstream.comBenefits of IT Risk Management Automation

Recorded: 25 August 2010

Automating the IT Risk Management process is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

Read more...
 
E-mail

www.cybersource.comA Manager's Guide to Comparing the Cost of Payment Security Strategies

This guide will help you assess and compare the cost of managing payment security via an on-premises or hosted operations model. Topics include:

Read more...
 
Page 4 of 7
.

 

.Visionaries


.
Steve Durbin Steve Durbin Steve Durbin is Vice President of the Information Security Forum (ISF). His main areas of focus include the emerging security threat landscape, Cyber security, BYOD, Big data, Cloud security and Social media across both the corporate and personal environments. He is a regular speaker and chair at global events and is o...
 
Ed Ferrara Ed Ferrara Ed Ferrara is Principal Analyst for Security and Risk at Forrester Research. He contributes to Forrester's offerings for the Security & Risk Professional, leading the company's coverage of security metrics, security program effectiveness, security awareness, and enterprise security information architecture. Ed's re...
 
mdiamond Mark Diamond Mark Diamond is the President and CEO, Contoural, Inc. He is one of the industry thought leaders in email archiving, litigation readiness, compliance, data protection and ILM strategies and practices. As CEO of Contoural, his company helps numerous Fortune 500 companies develop and execute email and document reten...
 

More. . .