IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC) Reports
1 - 25 of 221 Matches Previous Page  |  Next Page
Cloud Computing Security Risks and Governance
sponsored by Oracle Corporation
EGUIDE: Access this expert guide to learn how to navigate the complexities of cloud governance and keep your enterprise safe.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Oracle Corporation

Stealth Compliance Strategies
sponsored by Unisys
WHITE PAPER: Access this guide to find software-defined security strategies that help government and commercial enterprises prevent highly sensitive data, systems, and intellectual property from being compromised.
Posted: 20 Nov 2015 | Published: 30 Jun 2015


Modernizing Your Active Directory Environment
sponsored by Dell Software
WHITE PAPER: Access this white paper and find out how legacy active directory (AD) structures can be updated to accommodate changes in technology. Discover top areas in which AD modernization should occur, and the benefits of updating each one.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Dell Software

Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

From Checkboxes to Frameworks: CISO Insights on Moving From Compliance to Risk-Based Cyber-Security Programs
sponsored by IBM
WHITE PAPER: Access this report to discover three common struggles experienced by CISOs, as well as a five-step program designed to improve your cyber-security strategy.
Posted: 09 Nov 2015 | Published: 30 Oct 2015


Reduce Attack Surface and Compliance Risks with Unified Threat Protection
sponsored by Proofpoint, Inc.
WEBCAST: In this webcast, Joe Diamond, Director of Product Marketing for Information Protection at Proofpoint, explains how to protect your sensitive information from malicious attacks, system glitch, and human error with ongoing security solutions. View now to reduce your attack surface with automated classification.
Posted: 05 Nov 2015 | Premiered: Nov 5, 2015

Proofpoint, Inc.

The Cybercrime Economics of Malicious Macros Research Report
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper exposes the 7 economic and technical drivers behind the rise of malicious macros enabling your organization to adjust cybersecurity approaches to defend against these advanced threats
Posted: 04 Nov 2015 | Published: 07 Oct 2015

Proofpoint, Inc.

Best Practices for Detecting and Mitigating Advanced Persistent Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn expert best practices to detect and mitigate APTs and targeted malware before users fall prey to hacker exploits.
Posted: 30 Oct 2015 | Published: 09 Sep 2015

Proofpoint, Inc.

Sustainable Data Governance
sponsored by SAS
WHITE PAPER: Discover what it takes to make your data governance program sustainable in this white paper. Learn how you can anticipate change and build flexibility into your system from day 1 by accessing this resource now.
Posted: 14 Oct 2015 | Published: 14 Oct 2015


Software Change Management: Gain Business Agility Without Compromising Compliance
sponsored by CollabNet
WHITE PAPER: In this resource, you'll learn how a software change management (SCM) platform can provide your enterprise with real-time visibility, traceability, and code change process automation to improve business agility while meeting the strictest regulatory compliance standards.
Posted: 02 Oct 2015 | Published: 11 Jul 2014


Incognito Endpoint Network Access to Mitigate Identity Theft
sponsored by Unisys
WHITE PAPER: In this white paper, learn how to make endpoints dark on your network to users without the explicit permissions and authorization to view others in order to mitigate identity theft. Continue reading to learn how to reduce your network's and apps' attack surfaces through identity management and hiding access and devices.
Posted: 28 Sep 2015 | Published: 31 Dec 2014


8 Criterias to Consider When Bringing eDiscovery In-House
sponsored by Zylab International, Inc.
WHITE PAPER: This white paper presents 8 factors to consider before pulling the trigger on bringing eDiscovery into your on-premises environment.
Posted: 25 Sep 2015 | Published: 02 Sep 2015

Zylab International, Inc.

Continuous Compliance: Moving Beyond a Checklist Mentality
sponsored by Unisys
WHITE PAPER: Access this white paper to learn 5 steps to continuously monitor activities to protect your data and ensure ESF or RSF compliance.
Posted: 25 Sep 2015 | Published: 14 May 2015


Bridging the Gap Between Legal & IT
sponsored by Zylab International, Inc.
WHITE PAPER: In this white paper, you'll learn how to bridge the gap between legal and IT departments and take eDiscovery out of the list of organizational burdens. Continue reading to learn the risks of ignoring eDiscovery shortcomings and what problems to anticipate for IT and legal departments.
Posted: 22 Sep 2015 | Published: 05 Aug 2015

Zylab International, Inc.

The Next Stage in Creating the Value-Added Finance Function
sponsored by SAP
WHITE PAPER: In the fall of 2014, CFO Research conducted a survey among senior finance executives at large companies to explore developments in the ways that finance functions employ advanced information capabilities to support business operations. This resource details the full findings of this survey.
Posted: 18 Sep 2015 | Published: 31 Oct 2014


The Economist – Holistic Risk Management
sponsored by SAP
WHITE PAPER: Examine a holistic and strategic risk management approach to help your organization identify, audit, and address strategic risks.
Posted: 16 Sep 2015 | Published: 02 Sep 2015


Breaking Geographical Barriers in Government with Desktop Virtualization
sponsored by Dell, Inc.
WHITE PAPER: This white paper explains how desktop virtualization can help organizations – specifically government institutions - move application processing from a physical desktop to the data center in order to fulfill the "anywhere, anytime" demands of mobile employees.
Posted: 08 Sep 2015 | Published: 18 Sep 2014

Dell, Inc.

Redrawing Information Boundaries with Consolidated Governance Platforms
sponsored by Commvault
WHITE PAPER: This white paper examines the challenges of information governance in the increasingly chaotic and flexible enterprise environment.
Posted: 25 Aug 2015 | Published: 24 Jul 2015


How to Simplify PCI DSS Compliance with AlienVault USM
sponsored by AlienVault
WEBCAST: In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.
Posted: 31 Jul 2015 | Premiered: Jul 2, 2015


Creating a Cloud Strategy That Covers Cost and Compliance
sponsored by IBM
EGUIDE: In this e-guide, learn how to assess your governance and security practices for the cloud, and discover four steps to optimize costs through cloud app development planning.
Posted: 17 Jul 2015 | Published: 17 Jul 2015


The Ins and Outs of Secure File Sharing
sponsored by BlackBerry
WEBCAST: One big gap persists in the file sync and sharing market: highly secure content delivery. This webcast features Jeff Holleran and Tim Choi, as they relay the challenges of compliant collaboration on multiple devices. Tune in and learn what is needed to keep content from being leaked during file sync and sharing.
Posted: 14 Jul 2015 | Premiered: May 14, 2015


As Data Threats and Mandates Persist, Governance Vital to Manage Risk
sponsored by IntraLinks, Inc
EGUIDE: Read this e-guide for expert tips on implementing data governance processes that will simplify IT management while keeping your business secure.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

IntraLinks, Inc

Hybrid Strategies Common as Organizations Strive for Cloud GRC
sponsored by IBM
EGUIDE: This expert e-guide presents best practices for ensuring cloud GRC.
Posted: 21 May 2015 | Published: 06 May 2015


Managing Regulatory Examinations - Streamlining the Process
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to learn how to streamline the document review process and ensure preparation for regulatory exams.
Posted: 19 May 2015 | Published: 30 Apr 2015

IntraLinks, Inc

The Security and Regulatory Drivers for Information Rights Management
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper examines IT's complex dichotomy of document protection versus access in the mobile age, while issuing the consequences of inadequate security. Read on to ensure that your organization is avoiding the business issues that impact the information security management of corporate documents and content.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

IntraLinks, Inc
1 - 25 of 221 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement