IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

Don't Be Another Headline

Coming Up!               Learn how to implement data security best practices on Nov. 4

Click on the slide!

Are You Securing Hadoop?

On-Demand               Learn about Securing Hadoop by adopting a Data-Centric Approach.

Click on the slide!

Building a Secure, Compliant Cloud.

On-Demand               Play and now learn the key concepts and best practices to build your…

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
E-mail

QualysPCI Compliance For Dummies!

Welcome to PCI Compliance For Dummies! Compliance with the Payment Card Industry (PCI) Data Security Standard (DSS) is mandatory if your company stores, processes, or transmits payment cardholder data. This book is all about understanding PCI and how merchants can comply with its requirements.

Read more...
 
E-mail

corpintegrityValue of a Common Architecture for GRC Platforms

Jan 2010 - Business is complex and dynamic, and requires agility to stay competitive. Market leadership requires the organization is quick to respond to changing conditions - to pause means loss. Governance, risk, and compliance (GRC) processes often work against business agility. Requirements and initiatives managed across numerous silos, using manual or varying technology approaches, burden the business. The lackof a common process and technology architecture comes at a significant management cost.

Read more...
 
E-mail

www.lumension.comIT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs

For all organizations with current or planned initiatives in the area of IT governance, risk management, and compliance (IT GRC), this report describes the policy, planning, process, and organizational elements of successful implementations.

Read more...
 
E-mail

www.mxlogic.comThe Security Implications of Web 2.0

The collaborative benefits of Web 2.0 technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. With these technologies come new types of attack vectors.

Read more...
 
E-mail

www.contoural.comSix Critical Steps to Managing Electronically Stored Information under FRCP (Part 1)

Litigation always, has been, and will continue to be, a reality of doing business. What is changing, however, is discovery and its focus on electronically stored information (often abbreviated ESI).

Read more...
 
Page 6 of 8
.

 

.Visionaries


.
Steve Durbin Steve Durbin Steve Durbin is Vice President of the Information Security Forum (ISF). His main areas of focus include the emerging security threat landscape, Cyber security, BYOD, Big data, Cloud security and Social media across both the corporate and personal environments. He is a regular speaker and chair at global events and is o...
 
Ed Ferrara Ed Ferrara Ed Ferrara is Principal Analyst for Security and Risk at Forrester Research. He contributes to Forrester's offerings for the Security & Risk Professional, leading the company's coverage of security metrics, security program effectiveness, security awareness, and enterprise security information architecture. Ed's re...
 
mdiamond Mark Diamond Mark Diamond is the President and CEO, Contoural, Inc. He is one of the industry thought leaders in email archiving, litigation readiness, compliance, data protection and ILM strategies and practices. As CEO of Contoural, his company helps numerous Fortune 500 companies develop and execute email and document reten...
 

More. . .