IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

EMV and Payment Security

Coming Up!               Learn why EMV is not the only answer to Payment Security on…

Click on the slide!

Building a Secure, Compliant Cloud.

Coming Up!               Learn best practices with us on Sept. 24th!

Click on the slide!

Risk-Based ePHI Security Planning

On-Demand               Compliance does not equal security! View now on-demand!

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
E-mail

www.mxlogic.comThe Security Implications of Web 2.0

The collaborative benefits of Web 2.0 technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. With these technologies come new types of attack vectors.

Read more...
 
E-mail

www.contoural.comSix Critical Steps to Managing Electronically Stored Information under FRCP (Part 1)

Litigation always, has been, and will continue to be, a reality of doing business. What is changing, however, is discovery and its focus on electronically stored information (often abbreviated ESI).

Read more...
 
E-mail

www.contoural.comSix Critical Steps to Managing Electronically Stored Information under FRCP (Part 2)

Once an organization has become litigation ready by creating an ESI survey data map,implementing a records retention and deletion process, and establishing a litigation hold process, additional steps can be taken to further prepare for legal actions.

Read more...
 
E-mail

www.lumension.comReduce the Cost of Achieving HIPAA Compliance with Lumension Solutions

Healthcare organizations face a host of HIPAA Security Rule compliance challenges with the move to put patient medical records online.

Read more...
 
E-mail

www.mxlogic.comReducing Messaging & Web Security Costs with Managed Services

- An Osterman Research white paper, sponsored by MX Logic

Security costs are large & growing, with technical countermeasures dominated by on-premise licensed solutions. Companies wrestling with providing stronger security and meeting compliance requirements are seeking more efficient ways to provide security.

Read more...
 
Page 6 of 7
.

 

.Visionaries


.
Steve Durbin Steve Durbin Steve Durbin is Vice President of the Information Security Forum (ISF). His main areas of focus include the emerging security threat landscape, Cyber security, BYOD, Big data, Cloud security and Social media across both the corporate and personal environments. He is a regular speaker and chair at global events and is o...
 
Ed Ferrara Ed Ferrara Ed Ferrara is Principal Analyst for Security and Risk at Forrester Research. He contributes to Forrester's offerings for the Security & Risk Professional, leading the company's coverage of security metrics, security program effectiveness, security awareness, and enterprise security information architecture. Ed's re...
 
mdiamond Mark Diamond Mark Diamond is the President and CEO, Contoural, Inc. He is one of the industry thought leaders in email archiving, litigation readiness, compliance, data protection and ILM strategies and practices. As CEO of Contoural, his company helps numerous Fortune 500 companies develop and execute email and document reten...
 

More. . .