IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC) Multimedia (View All Report Types)
25 Matches
Dealing with Today’s Data Minefield and GRC Challenges
sponsored by Modulo
PODCAST: This podcast delves into the GRC challenges security officers are facing today and actions to overcome them.
Posted: 06 Apr 2015 | Premiered: Mar 11, 2015

Modulo

Compliance Does Not Equal Security: Risk-Based Plan for ePHI Protection
sponsored by HP Security Voltage
WEBCAST: View this in depth webcast to learn how to establish a security-based strategy for data protection and how you can meet and go beyond healthcare regulation requirements. Watch now to learn more.
Posted: 03 Apr 2015 | Premiered: Aug 20, 2014

HP Security Voltage

Automating GRC to Maximize Physical Security ROI
sponsored by Modulo
WEBCAST: This webcast teaches you how to integrate physical security risk management into your automated GRC strategy. View now to uncover how to improve data protection and the several other benefits that await.
Posted: 03 Apr 2015 | Premiered: Mar 4, 2015

Modulo

Automating IT Risk Management
sponsored by Modulo
WEBCAST: This webcast shows you how to reduce GRC complexity and cost through automation.  View now to learn more.
Posted: 03 Apr 2015 | Premiered: Mar 25, 2015

Modulo

Developing a GRC Framework to Enable Automation
sponsored by Modulo
WEBCAST: This webcast examines how bank automated GRC processes to execute risk and compliance assessments. View now to learn how to develop a GRC framework and use autoamtion to facilitate new functions required within GRC.
Posted: 03 Apr 2015 | Premiered: Oct 22, 2014

Modulo

Governance rules to navigate data mobility and velocity complexities
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Mobile devices have become the Internet's dominant user interface, complicating GRC strategy for many companies. In this classroom, learn governance strategies to remain regulatory compliant as digital assets are increasingly available to users anywhere, at any time.
Posted: 12 Mar 2015 | Premiered: 09 Mar 2015

SearchCompliance.com

Moving Beyond Simple Data Cleansing: Full Contact Data Quality
sponsored by Melissa Data Corp
WEBCAST: Access this in-depth webinar to hear from Joseph Verido data quality analyst at Melissa Data. Learn more about the concept of data accuracy and how it fits into the data quality hierarchy. Read now to learn the benefits of maximizing your data quality to achieve actionable insights and get the most out of your data.
Posted: 05 Mar 2015 | Premiered: Jan 17, 2015

Melissa Data Corp

Governance, Risk, and Compliance for Critical Data Movement
sponsored by IBM
WEBCAST: Join this webinar with experts from Forrester Research to learn about the key trends in GRC. Find out how to develop your lines of defense, learn how to measure your organization's GRC maturity, and get three key tips for developing a successful strategy.
Posted: 26 Jan 2015 | Premiered: Jan 26, 2015

IBM

Risk Assessment Redo: Trends that make you rethink info governance strategy
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: New data protection vulnerabilities have forced organizations to reexamine risk management strategy. In this classroom, learn how to adapt your risk assessment and information management strategies to face modern threats.
Posted: 08 Dec 2014 | Premiered: 05 Dec 2014

SearchCompliance.com

Press the Start Button on Information Governance: From ‘Big Size’ to ‘Right Size’
sponsored by IBM
WEBCAST: This webinar, featuring Cheryl McKinnon, Forrester principal analyst, will explain how to turn your unmanaged, unstructured data into relevant data, helping you jumpstart your information governance initiatives.
Posted: 22 Sep 2014 | Premiered: Sep 22, 2014

IBM

Data Breaches - Don't be a Headline!
sponsored by Absolute Software
WEBCAST: This webcast explains the aftermath of a data breach and what your organization can do to mitigate any risks surrounding data loss.
Posted: 19 Sep 2014 | Premiered: Sep 19, 2014

Absolute Software

Defensible preservation and collection
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this web seminar, learn to identify the risks posed by deficient data collection, how to use forensic principles for targeted collections and the relationship between preservation scale and costs.
Posted: 20 Jun 2014 | Premiered: 24 Jun 2014

SearchCompliance.com

Mobile Communications: How to Make Governance Work
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this web seminar, learn to develop data management techniques that successfully align information governance best practices with your organization's mobile communications strategy.
Posted: 09 Jun 2014 | Premiered: 10 Jun 2014

SearchCompliance.com

Advances in Financial Disclosure and Risk Management
sponsored by IBM
WEBCAST: This on-demand webcast investigates performance management and analytics tools that can help drive success in finance and risk management. Watch now to discover product updates, best practices, and more.
Posted: 01 Nov 2013 | Premiered: Feb 5, 2013

IBM

Information governance Frameworks: The evolving models and the tried and true
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: Modern organizations generate more data than ever, forcing them to reexamine governance strategy. This sounds daunting, but does not require reinventing the wheel: In this interactive classroom, learn to adapt proven information governance techniques to the digital age.
Posted: 14 May 2014 | Premiered: 15 May 2014

SearchCIO.com

Information Governance Symposium: Data governance on the move: Keeping mobile data safe
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Enter this interactive, online learning environment to learn more about the evolution of mobile device use in the corporate setting, and how to adapt information management processes accordingly.
Posted: 26 Mar 2014 | Premiered: 28 Mar 2014

SearchCompliance.com

PCI DSS Simplified: What You Need to Know
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
Posted: 14 Oct 2013 | Premiered: Oct 14, 2013

AlienVault

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

Security University: GRC Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: GRC is essential to all businesses. But considering its importance and breadth, coupled with the transformative nature of compliance regulations, GRC management can be daunting. This classroom will explore: GRC solutions for various stages; Questions to ask when considering a purchase; Vendor insights on achieving comprehensive GRC plans
Posted: 27 Sep 2013 | Premiered: 05 Jul 2013

SearchCompliance.com

Modern Retention Enablement
sponsored by IBM
VIDEO: This quick video explains why legal departments need the what, who, and where of records and information management (RIM) files.
Posted: 26 Jul 2013 | Premiered: 25 Jun 2012

IBM

Moving Beyond People Glue and Silos
sponsored by IBM
VIDEO: This quick video outlines why replacing this "people glue" strategy with reliable, repeatable systems and processes that break siloes and meet the needs of multiple users across the organization is critical to interlinking success and truly achieving information governance.
Posted: 26 Jul 2013 | Premiered: 27 Jun 2013

IBM

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

New! Smart SOA Connectivity and Integration Podcast Series
sponsored by IBM
PODCAST: Listen to software development experts from the IBM® Software Development Laboratory and some of their U.S.-based counterparts explain how to reduce complexity, improve access to vital business information, and optimize IT budgets in this exclusive, listen-at-your-own-pace podcast series on Smart SOA Connectivity and Integration.
Posted: 07 Mar 2011 | Premiered: Mar 7, 2011

IBM

IBM Information On Demand Virtual 2010
sponsored by IBM
WEBCAST: Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals.
Posted: 22 Nov 2010 | Premiered: Dec 15, 2010, 13:00 EST (18:00 GMT)

IBM

Rational Build Forge Demo Series
sponsored by IBM
SOFTWARE DEMO: Access IBM Rational Build Forge demos to see how it can be used to create a software assembly line to automate and accelerate software delivery. Learn how Rational Build Forge can help development teams automate repetitive tasks, uncover development bottlenecks, determine trends for specific projects and manage compliance mandates.
Posted: 04 Nov 2009 | Premiered: 15 Oct 2008

IBM
25 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement