IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

Securing Hadoop and the IoT

Live Webcast!             Join this live event to put your questions to our experts.

Click on the slide!

Combating Targeted Attacks

On-Demand               Play this educational discussion now.

Click on the slide!

PCI DSS: Blue Skies Ahead!

On-Demand               Play this educational discussion now.

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
E-mail

ANXTop Requirements for Successfully Automating SOX Quarterly Self-Assessments: Part 2

Recorded: April 27 | 2011    View Webinar 

For many organizations, Sarbanes-Oxley compliance is mandatory; both on the financial side and on the IT side managing the process can be an arduous an unwitting waste of time.  Walkthroughs that need to be reviewed by numerous individuals, tens of controls that need to be sampled and tested in detail can come with time lags that makes an already detailed task more cumbersome.

Read more...
 
E-mail

PCI DSS 2.0PCI DSS 2.0 & Virtualization - Are You Compliant?

Recorded: March 10 | 2011    View Webinar 

Understanding and complying with the PCI Data Security Standard (PCI DSS) can be a daunting task - especially if your organization has limited time and resources. The new PCI DSS 2.0 standard, which took effect Jan. 1, requires testing a virtualized environment to ensure that if you put multiple accounts onto a single processor, there is still segregation of data and all the data is protected.

Read more...
 
E-mail

Simplify GRCSimplify IT Risk and Compliance Management

Recorded: Jan 26 2011   View Webinar

In this panel discussion we will address the challenges IT teams face as a result of siloed, inefficient point tool approaches to administering and enforcing security and compliance policy across hybrid IT infrastructures.

Read more...
 
E-mail

www.itgrcforum.comIntegrating Risk Management Systems to Optimize GRC

Recorded: Nov 16 2010   View Webinar

Integrating IT Risk Management systems is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

Read more...
 
E-mail

CA TechnologiesThe role of identity and access management in achieving "continuous compliance"

There's a tremendous focus today on complying with regulatory mandates, keeping IT systems secure, and ensuring privacy for confidential enterprise and customer information.

Read more...
 
Page 6 of 9

 

.Visionaries


.
Branden Williams Branden Williams Branden Williams has over fifteen years of experience in technology and information security with a formidable background in the majority of the technologies that drive today's businesses. Branden has experience working for startups and the Fortune 10, and the reason why some of the best companies in the world rely on ...
 
Rebecca Herold Rebecca Herold Rebecca Herold, CISM, CISSP, CISA, CIPP, FLMI. Rebecca is an information privacy, security and compliance consultant, author and instructor who has provided assistance, advice, services, tools and products to organizations in a wide range of industries during the past two decades. Rebecca is a widely recognized an...
 
Brandon Dunlap Brandon Dunlap Brandon Dunlap is the Managing Director of research at Brightfly. He has more than 15 years of experience managing business technology risk in large and small organizations. He has served in a variety of roles across heavily regulated industries, successfully leading all aspects of IT security programs, inclu...
 

More. . .