IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

Risk-Based ePHI Security Planning

Coming Up!               Compliance does not equal security! Join us on Aug 20

Click on the slide!

Evolving Payment Security

On-Demand               Join us to learn about EMV & Payment Security, and what this evolution…

Click on the slide!

Disaster Recovery in the Cloud

On-Demand               Play and learn how to develop a metric-driven BCM program!

Click on the slide!

Rethinking Email Security

On-Demand               Play and learn the key concepts and best practices to protect and maintain…

Click on the slide!

Enabling Business Agility

On-Demand               Play and learn how to protect data assets with a new data de-identification…

Click on the slide!

Lessons from the Target Data Breach

On-Demand               Play Now!

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
E-mail

www.mxlogic.comThe Security Implications of Web 2.0

The collaborative benefits of Web 2.0 technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. With these technologies come new types of attack vectors.

Read more...
 
E-mail

www.contoural.comSix Critical Steps to Managing Electronically Stored Information under FRCP (Part 1)

Litigation always, has been, and will continue to be, a reality of doing business. What is changing, however, is discovery and its focus on electronically stored information (often abbreviated ESI).

Read more...
 
E-mail

www.contoural.comSix Critical Steps to Managing Electronically Stored Information under FRCP (Part 2)

Once an organization has become litigation ready by creating an ESI survey data map,implementing a records retention and deletion process, and establishing a litigation hold process, additional steps can be taken to further prepare for legal actions.

Read more...
 
E-mail

www.lumension.comReduce the Cost of Achieving HIPAA Compliance with Lumension Solutions

Healthcare organizations face a host of HIPAA Security Rule compliance challenges with the move to put patient medical records online.

Read more...
 
E-mail

www.mxlogic.comReducing Messaging & Web Security Costs with Managed Services

- An Osterman Research white paper, sponsored by MX Logic

Security costs are large & growing, with technical countermeasures dominated by on-premise licensed solutions. Companies wrestling with providing stronger security and meeting compliance requirements are seeking more efficient ways to provide security.

Read more...
 
Page 6 of 7
.

 

.Visionaries


.
Steve Durbin Steve Durbin Steve Durbin is Vice President of the Information Security Forum (ISF). His main areas of focus include the emerging security threat landscape, Cyber security, BYOD, Big data, Cloud security and Social media across both the corporate and personal environments. He is a regular speaker and chair at global events and is o...
 
Ed Ferrara Ed Ferrara Ed Ferrara is Principal Analyst for Security and Risk at Forrester Research. He contributes to Forrester's offerings for the Security & Risk Professional, leading the company's coverage of security metrics, security program effectiveness, security awareness, and enterprise security information architecture. Ed's re...
 
mdiamond Mark Diamond Mark Diamond is the President and CEO, Contoural, Inc. He is one of the industry thought leaders in email archiving, litigation readiness, compliance, data protection and ILM strategies and practices. As CEO of Contoural, his company helps numerous Fortune 500 companies develop and execute email and document reten...
 

More. . .