IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

PCI DSS: Blue Skies Ahead!

Live Webcast!             Join this live webinar for advice on preventing costly cases of non compliance.

Click on the slide!

Mitigating 3rd Party Vendor Risks

On-Demand               Play this educational discussion now.

Click on the slide!

A Risk Migration Plan for PCI DSS

On-Demand               Play this educational discussion now.

Click on the slide!

Using TVM to Enable Your GRC Program

On-Demand               Play this educational discussion now.

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
E-mail

Simplify GRCSimplify IT Risk and Compliance Management

Recorded: Jan 26 2011   View Webinar

In this panel discussion we will address the challenges IT teams face as a result of siloed, inefficient point tool approaches to administering and enforcing security and compliance policy across hybrid IT infrastructures.

Read more...
 
E-mail

www.itgrcforum.comIntegrating Risk Management Systems to Optimize GRC

Recorded: Nov 16 2010   View Webinar

Integrating IT Risk Management systems is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

Read more...
 
E-mail

CA TechnologiesThe role of identity and access management in achieving "continuous compliance"

There's a tremendous focus today on complying with regulatory mandates, keeping IT systems secure, and ensuring privacy for confidential enterprise and customer information.

Read more...
 
E-mail

CA TechnologiesCA Point of view: Content-Aware Identity & Access Management

CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.

Read more...
 
E-mail

www.cybersource.comWhat is PCI Compliance Really Costing You?
Calculate the True Cost of Your Current or Proposed Strategies

Manage payment data on premises? Or have it hosted externally? Tokenization? End-to-end encryption? These are all hot topics in the world of PCI. If you've ever been asked to explore the costs of adopting these payment security approaches, this webinar is for you.

Read more...
 
Page 6 of 9

 

.Visionaries


.
Branden Williams Branden Williams Branden Williams has over fifteen years of experience in technology and information security with a formidable background in the majority of the technologies that drive today's businesses. Branden has experience working for startups and the Fortune 10, and the reason why some of the best companies in the world rely on ...
 
Rebecca Herold Rebecca Herold Rebecca Herold, CISM, CISSP, CISA, CIPP, FLMI. Rebecca is an information privacy, security and compliance consultant, author and instructor who has provided assistance, advice, services, tools and products to organizations in a wide range of industries during the past two decades. Rebecca is a widely recognized an...
 
Brandon Dunlap Brandon Dunlap Brandon Dunlap is the Managing Director of research at Brightfly. He has more than 15 years of experience managing business technology risk in large and small organizations. He has served in a variety of roles across heavily regulated industries, successfully leading all aspects of IT security programs, inclu...
 

More. . .