IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC)Reports
26 - 50 of 223 Matches Previous Page  | Next Page
Compliance Tips and Tricks for the Digital Age
sponsored by OpenText
EGUIDE: This expert e-guide reveals four valuable tips to dodge compliance challenges and meet regulatory requirements.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

OpenText

Data Breaches - Don't be a Headline!
sponsored by Absolute Software
WEBCAST: This webcast explains the aftermath of a data breach and what your organization can do to mitigate any risks surrounding data loss.
Posted: 19 Sep 2014 | Premiered: Sep 19, 2014

Absolute Software

Information Governance Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: The IG risks of deploying Microsoft Lync are similar to those of other electronic communications such as email: malware, data leakage, inappropriate employee use, regulatory noncompliance, and skyrocketing legal costs.Download THIS WHITEPAPER to find out more!
Posted: 19 Sep 2014 | Published: 19 Sep 2014

Actiance

Breaking Geographical Barriers in Government with Desktop Virtualization
sponsored by Dell
WHITE PAPER: This whitepaper explains how desktop virtualization can help organizations – specifically government institutions - move application processing from a physical desktop to the data center in order to fulfill the “anywhere, anytime” demands of mobile employees.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Dell

Meeting the Solvency II Operational Risk Challenge
sponsored by IBM
WHITE PAPER: In this white paper, discover why insurance companies need to have an efficient risk management framework that assesses all internal and external risks.
Posted: 18 Sep 2014 | Published: 31 Dec 2012

IBM

Mitigating IT Risk for Financial Risk Analytics
sponsored by IBM
WHITE PAPER: This white paper explores the need for a high performance IT infrastructure to assist risk analytics.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

IBM

Log Management—The Foundation for Federal Security and Compliance
sponsored by Intel Security
WHITE PAPER: This paper examines what US federal agencies and organizations should look for in log management strategy and integration into and support of applicable and prospective security and compliance programs and initiatives.
Posted: 10 Sep 2014 | Published: 31 Dec 2013

Intel Security

Achieving PCI DSS Peace of Mind in the Cloud
sponsored by CloudPassage
WHITE PAPER: Access this white paper to learn how you can achieve PCI DSS compliance in the cloud without any hassle or setbacks.
Posted: 09 Sep 2014 | Published: 30 Jun 2014

CloudPassage

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Learn how identity and access management solutions from IBM Security can help organizations protect critical assets.
Posted: 04 Sep 2014 | Published: 01 Apr 2014

IBM

How Access Governance Makes Data Loss Prevention Successful
sponsored by RSA
WHITE PAPER: Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

RSA

Can Text Messaging Improve Communication Between Health Care Professionals?
sponsored by Imprivata
VIDEO: Watch this brief video and hear from Linda Reed, the VP/CIO of Atlantic Health on they implemented a text messaging system to deliver information instantly, and how it revolutionized their means of communication.
Posted: 11 Aug 2014 | Premiered: 11 Aug 2014

Imprivata

Mitigate Risk and Improve Compensation Effectiveness in Banking
sponsored by IBM
WHITE PAPER: Discover how you can mitigate risk and improve compensation effectiveness with this particular incentive compensation solution. Read on to learn about the benefits of this solution, including a reduction of administration costs, and the role technology plays with sales performance management.
Posted: 30 Jul 2014 | Published: 30 Apr 2013

IBM

Defensible preservation and collection
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this web seminar, learn to identify the risks posed by deficient data collection, how to use forensic principles for targeted collections and the relationship between preservation scale and costs.
Posted: 20 Jun 2014 | Premiered: 24 Jun 2014

SearchCompliance.com

Mobile communications: How to make governance work
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this web seminar, learn to develop data management techniques that successfully align information governance best practices with your organization's mobile communications strategy.
Posted: 09 Jun 2014 | Premiered: 10 Jun 2014

SearchCompliance.com

Realise Benefits from a Digital Strategy
sponsored by ComputerWeekly.com
PRESENTATION: Rob Lambert, visiting fellow at Cranfield School of Management, offers advice to CIOs on developing business cases and maximising the business value of digital technology projects.
Posted: 30 May 2014 | Published: 30 May 2014

ComputerWeekly.com

Information governance Frameworks: The evolving models and the tried and true
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: Modern organizations generate more data than ever, forcing them to reexamine governance strategy. This sounds daunting, but does not require reinventing the wheel: In this interactive classroom, learn to adapt proven information governance techniques to the digital age.
Posted: 14 May 2014 | Premiered: 15 May 2014

SearchCIO.com

Straight to the Top. CIO Leadership in a Mobile, Social, and Cloud-based World
sponsored by ComputerWeekly.com
BOOK: There is a growing trend to emphasise the business skills of CIOs, but in-depth knowledge of technology is still necessary for CIOs to succeeed, writes Gregory S. Smith, in this extract from his book, Straight to the top.
Posted: 01 May 2014 | Published: 01 May 2014

ComputerWeekly.com

How to Mitigate Risk and Ensure Compliance: Govern Your Documents Accordingly
sponsored by OpenText
WHITE PAPER: Read this exclusive, in-depth white paper to discover how information governance can turn big data into a big opportunity.
Posted: 25 Apr 2014 | Published: 16 Jan 2014

OpenText

Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper features threat-aware IAM software that offers centralized security management across both physical and virtual applications.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

IBM

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett-Packard Company

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: In this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
Posted: 02 Jul 2014 | Published: 01 Oct 2013

IBM

Information Visibility: Reducing Business Risk with The Clearswift Aneesya Platform
sponsored by Clearswift
WHITE PAPER: In this white paper, discover an information governance platform that offers real-time insight to improve threat detection and enhance governance and compliance reporting.
Posted: 16 May 2014 | Published: 16 May 2014

Clearswift

Maintaining Continuous Compliance: A New Best-Practice Approach
sponsored by IBM
WHITE PAPER: This resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
Posted: 13 May 2014 | Published: 30 Jun 2014

IBM

Preventing Dangerous File-Sharing
sponsored by GlobalScape
WHITE PAPER: This resource offers 4 steps to help prevent employees from using unsecured consumer-grade file-sharing solutions.
Posted: 09 May 2014 | Published: 31 Dec 2013

GlobalScape

Compliance Field Guide: Reducing Costs in an Increasingly Regulated World
sponsored by Symantec Corporation
WHITE PAPER: This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.
Posted: 24 Apr 2014 | Published: 31 Jan 2014

Symantec Corporation
26 - 50 of 223 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement