IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC)Reports
26 - 50 of 211 Matches Previous Page  | Next Page
Mobile communications: How to make governance work
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this web seminar, learn to develop data management techniques that successfully align information governance best practices with your organization's mobile communications strategy.
Posted: 09 Jun 2014 | Premiered: 10 Jun 2014

SearchCompliance.com

Realise Benefits from a Digital Strategy
sponsored by ComputerWeekly.com
PRESENTATION: Rob Lambert, visiting fellow at Cranfield School of Management, offers advice to CIOs on developing business cases and maximising the business value of digital technology projects.
Posted: 30 May 2014 | Published: 30 May 2014

ComputerWeekly.com

What the Gartner Analysts are Saying About Government Solutions and Interoperability
sponsored by MicroPact
WHITE PAPER: Budgets are being cut and pressure continues to mount for federal agencies to run leaner and meaner. This paper looks at Gartner analyst coverage of government's approach to developing secure and cost-effective solutions.
Posted: 19 May 2014 | Published: 19 May 2014

MicroPact

Information Visibility: Reducing Business Risk with The Clearswift Aneesya Platform
sponsored by Clearswift
WHITE PAPER: In this white paper, discover an information governance platform that offers real-time insight to improve threat detection and enhance governance and compliance reporting.
Posted: 16 May 2014 | Published: 16 May 2014

Clearswift

Information governance Frameworks: The evolving models and the tried and true
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: Modern organizations generate more data than ever, forcing them to reexamine governance strategy. This sounds daunting, but does not require reinventing the wheel: In this interactive classroom, learn to adapt proven information governance techniques to the digital age.
Posted: 14 May 2014 | Premiered: 15 May 2014

SearchCIO.com

Maintaining Continuous Compliance: A New Best-Practice Approach
sponsored by IBM
WHITE PAPER: This resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
Posted: 13 May 2014 | Published: 30 Jun 2014

IBM

Straight to the Top. CIO Leadership in a Mobile, Social, and Cloud-based World
sponsored by ComputerWeekly.com
BOOK: There is a growing trend to emphasise the business skills of CIOs, but in-depth knowledge of technology is still necessary for CIOs to succeeed, writes Gregory S. Smith, in this extract from his book, Straight to the top.
Posted: 01 May 2014 | Published: 01 May 2014

ComputerWeekly.com

Quocirca: Dealing with Governance, Risk & Compliance in an Info-Centric World
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper uncovers the various aspects of governance, risk, and compliance (GRC), and offers key advice on how to build a platform that will help organizations improve overall operations.
Posted: 28 Apr 2014 | Published: 31 Oct 2013

CommVault Systems, Inc.

Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper features threat-aware IAM software that offers centralized security management across both physical and virtual applications.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

IBM

How to start, refine and improve your social media business strategy
sponsored by ComputerWeekly.com
BOOK: This extract from Adam Gray's  book, Brilliant Social Media will help your organisation get started with social media, then refine and improve your strategy to get real business results.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

ComputerWeekly.com

Sharing Sensitive Corporate Documents without Compromising Security and Governance
sponsored by IntraLinks, Inc
WHITE PAPER: This informative resource discusses how your organization can utilize an IP security system built on a strong inter-enterprise document-sharing foundation to share sensitive documents without compromising security and governance.
Posted: 21 Apr 2014 | Published: 21 Apr 2013

IntraLinks, Inc

Improving Security with GRC Best Practices
sponsored by TechTarget
RESOURCE: Although they have many of the same goals, an organization's compliance and security departments usually do not work together enough to meet common objectives. Take this 2 minute survey and gain access to this eguide which outlines essential guidelines for improving security with governance, risk and compliance best practices.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

TechTarget

Executive Guide to SYSPRO Security for Auditing Assurance and Control
sponsored by SYSPRO
WHITE PAPER: This white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

SYSPRO

Information Governance Symposium: Data governance on the move: Keeping mobile data safe
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Enter this interactive, online learning environment to learn more about the evolution of mobile device use in the corporate setting, and how to adapt information management processes accordingly.
Posted: 26 Mar 2014 | Premiered: 28 Mar 2014

SearchCompliance.com

6 Must-Haves for Modern Financial Management Systems
sponsored by Workday
WHITE PAPER: The financial system you are running today can likely trace its heritage back to the 80s and 90s. The needs of finance organizations have changed dramatically. If you're considering a new financial management system, read the whitepaper to learn the six must-haves it must include.
Posted: 20 Mar 2014 | Published: 31 Dec 2012

Workday

Compliance, Archiving and eDiscovery Classroom
sponsored by CommVault Systems, Inc.
VIRTUAL ENVIRONMENT: Access a complete list of resources and webinars to ensure your archives, compliance and eDiscovery are all up to par, so your business can continue to prosper.
Posted: 17 Mar 2014 | Premiered: 14 Mar 2014

CommVault Systems, Inc.

Preventing Dangerous File-Sharing
sponsored by GlobalScape
WHITE PAPER: This resource offers 4 steps to help prevent employees from using unsecured consumer-grade file-sharing solutions.
Posted: 09 May 2014 | Published: 31 Dec 2013

GlobalScape

Compliance Field Guide: Reducing Costs in an Increasingly Regulated World
sponsored by Symantec Corporation
WHITE PAPER: This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.
Posted: 24 Apr 2014 | Published: 31 Jan 2014

Symantec Corporation

Expert outlook on cloud GRC
sponsored by SearchCompliance.com
EBOOK: Cloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

SearchCompliance.com

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

The Case for GRC: Addressing the Top 10 GRC Challenges
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper shares the top 10 governance, risk, and compliance (GRC) challenges, and offers industry-leading advice on how to make the best investments in each of these areas.
Posted: 16 Apr 2014 | Published: 31 Dec 2012

RSA, The Security Division of EMC

2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA, The Security Division of EMC
WHITE PAPER: View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013

RSA, The Security Division of EMC

Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
Posted: 08 Apr 2014 | Published: 31 Oct 2013

IBM

Decoding Predictive Technologies in E-Discovery
sponsored by Exterro
WHITE PAPER: This informative guide addresses common questions legal teams have about predictive technologies, and showcases how real-world users are taking advantage of these new capabilities.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Exterro

Breaking Through the GRC Value Ceiling
sponsored by EMC Corporation
WHITE PAPER: This paper uses the RSA Archer GRC Reference Architecture to illustrate the value of operational technologies while acknowledging there is a ―Value Ceiling‖ for some niche operational tools, highlighting the missed opportunity for broader value.
Posted: 14 Mar 2014 | Published: 30 Sep 2013

EMC Corporation
26 - 50 of 211 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement