IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed   
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC) Reports
1 - 25 of 199 Matches Previous Page  |  Next Page
Building a Successful Cloud Infrastructure Security & Compliance Practice
sponsored by CloudHealth by VMware
WHITE PAPER: In order to implement effective cloud security, various teams and stakeholders across the organization need to work together to overcome the emerging security and compliance challenges. This white paper provides a comprehensive set of guidelines for organizations to streamline their collaboration efforts. Read on to learn more.
Posted: 21 May 2020 | Published: 21 May 2020

CloudHealth by VMware

Cybersecurity Maturity Model Certification (CMMC)
sponsored by BlueVoyant
WHITE PAPER: The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity requirement for DoD contractors and subcontractors designed to protect the handling of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But what does the CMMC entail, and when will it come into effect? Read on to find out.
Posted: 08 May 2020 | Published: 08 May 2020

BlueVoyant

Privacy by Design: Consumer Data Protection as a Competitive Advantage
sponsored by Dell Boomi and Slalom
RESOURCE: As a result of the disastrous amount of data and PII stolen from successful cyberattacks over recent years, data privacy laws were introduced to ensure the protection of consumer data and dictate how businesses use that data. In this infographic, learn how regulatory compliance can be used as a competitive differentiator – even an advantage.
Posted: 06 May 2020 | Published: 06 May 2020

Dell Boomi and Slalom

NIST Application Security Revisions You Need to Know
sponsored by Contrast Security
RESOURCE: NIST is a standard leader in the cybersecurity space that sets guidelines for organizations to follow across different areas of security. This landing page contains several useful resources focusing on the NIST revisions to their application security guidelines.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Contrast Security

The Department of Transport Turns to Ivanti for ASD Top 4 Compliance
sponsored by Ivanti ANZ
CASE STUDY: Given the distributed nature of the Victoria, Australia’s Department of Transport, a holistic security program was needed in order to address challenges related to patching, unauthorized access and regulatory compliance. In this case study, discover how they partnered with Ivanti to address these security and compliance challenges.
Posted: 20 Apr 2020 | Published: 30 Nov 2019

Ivanti ANZ

5 Myths About Identity Governance
sponsored by SailPoint Technologies
WHITE PAPER: Some may believe identity is just about governing access to certain applications or systems, but identity is more than access. In this white paper, discover 5 myths about identity governance.
Posted: 18 Mar 2020 | Published: 18 Mar 2020

SailPoint Technologies

Mitigating Data Breach Risk with Identity Governance for Files
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: Rather than hope to avoid a breach, preparing for the inevitable occurrence by planning ahead will enable your organization to mitigate potential risks and respond effectively in the event of a breach. This solution brief take’s a closer look at SailPoint’s method for mitigating risk by focusing on access control. Read on to learn more.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

SailPoint Technologies

How to Know It’s Time to Change Your Identity Vendor
sponsored by SailPoint Technologies
WHITE PAPER: Changing identity governance vendors can be a difficult decision. But some situations make it almost mandatory to change identity governance vendors. At the end of the day, this is a business decision based on the facts. In this white paper, explore 7 situations which would warrant you to change your identity vendor.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

SailPoint Technologies

The CCPA: Security Standards and Measures to Comply
sponsored by Crosskey Cyber Security
RESOURCE: The CCPA is now operative and the Attorney General can begin enforcement actions against businesses on July 1 of this year. Even if you believe you are not subject to the CCPA, it is a good idea for SMBs to comply with the standard for many reasons. In this blog, learn about the cybersecurity standard SMBs need to meet to satisfy the CCPA.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Crosskey Cyber Security

Two strategies to address digitization challenges in public sector
sponsored by Neptune Software
WHITE PAPER: In the public sector, pressures are building to deliver quality user experiences, integrate siloed data and systems, and meet compliance regulations. Luckily, a low-code, rapid app development platform can meet both internal and external demands, so you don’t have to pick and choose which challenges to overcome. Read more in this white paper.
Posted: 21 Feb 2020 | Published: 21 Feb 2020

Neptune Software

Continuous Risk Monitoring for Vulnerabilities
sponsored by ServiceNow
PRODUCT DEMO: In this demo, take a closer look at ServiceNow’s continuous risk monitoring platform and discover how it can help your organization meet its GRC standards by identifying the risks of unpatched vulnerabilities and resolving them quickly. Continue to watch the complete presentation.
Posted: 05 Feb 2020 | Premiered: 04 Dec 2019

ServiceNow

Australian Insurance provider establishes comprehensive risk management program
sponsored by ServiceNow
CASE STUDY: In this case study, follow the journey of MLC Life Insurance, a leading Australian insurance provider, as they partner with ServiceNow to develop & implement a comprehensive digital strategy that enables them to enhance customer experience while establishing governance, risk & compliance controls.
Posted: 05 Feb 2020 | Published: 30 Nov 2018

ServiceNow

Cloud Data Management Adapts to Soaring Volumes—Don’t Get Left Behind
sponsored by Cirrus Data Solutions
EGUIDE: As cloud use cases and data volumes expand, vendors are now responding with their own cloud data management solutions. Read this e-guide to get an update on the current state of cloud data management, about a comparison of tape versus cloud storage, and an exclusive look at the cloud data extraction process.
Posted: 03 Feb 2020 | Published: 30 Jan 2020

Cirrus Data Solutions

Supporting GRC with Business Continuity and Disaster Recovery
sponsored by Cirrus Data Solutions
EGUIDE: Read this exclusive guide to discover how BC can support GRC initiatives and how to use the data acquired during BIA and RA activities to support GRC.
Posted: 28 Jan 2020 | Published: 27 Jan 2020

Cirrus Data Solutions

7 free GRC tools for compliance professionals
sponsored by ComputerWeekly.com
EGUIDE: All organisations need to meet a variety of regulatory compliance requirements, such as General Data Protection Regulation (GDPR), but they don't all have the budget for GRC software. In this e-guide, learn about the free, open source options.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

ComputerWeekly.com

Security Governance: Building a Framework and Establishing Trust
sponsored by RSA Conference
WEBCAST: Not only is Kuwait’s oil and gas industry critical to its economy—it’s also heavily targeted by global threat actors. In this RSAC Unplugged presentation, see how Kuwait’s oil and gas companies reached a consensus around common security objectives and a unified governance framework to protect this vital sector.
Posted: 22 Jan 2020 | Premiered: Oct 10, 2019

RSA Conference

GDPR Perspectives: Rethinking Data Discovery for Privacy and GDPR
sponsored by BigID
WHITE PAPER: With data privacy laws like GDPR regulating the way organizations manage data, it’s grown increasingly critical for organizations to take a strategic approach to the way they collect, process, and categorize data. Read this white paper to learn about the rising popularity of data classification solutions and other discover tools.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

BigID

A Buyer’s Guide to Automating Personal Data Rights for CCPA and GDPR
sponsored by BigID
WHITE PAPER: With the arrival of data rights and privacy regulations, organizations face increasing pressure to maintain strategies that ensure data protection. The risks for failing to do so include financial, legal and reputational damage. Read this buyer’s guide to ensure your organization informed on the key aspects of data discovery.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

BigID

California Consumer Privacy Act vs GDPR: What You Need to Know
sponsored by BigID
WHITE PAPER: The CCPA is the first of its kind law in the US that will put privacy rights in the hands of California consumers. It builds on many core principles that defined Europe’s GDPR, but there are some variations that are important to distinguish. In this white paper, explore the key differences and similarities between these 2 regulations.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

BigID

A Buyer’s Guide to Privacy-Centric Data Discovery
sponsored by BigID
WHITE PAPER: Protecting customer data has never been easy. And with the introduction of regulations like GDPR and CCPA, organizations face heavy penalties for failing to address this issue. Use this buyer’s guide to stay informed on the key components to look for in data discovery partner.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

BigID

CCPA Readiness Checklist
sponsored by BigID
WHITE PAPER: As of January 1, 2020, the CCPA has come into effect. Given the steep penalties for failing to comply, organizations should make certain that they’re positioned to responsibly safeguard customer data. Use this comprehensive checklist to ensure your organization meets the requirements of California’s new data privacy regulation.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

BigID

Top 10 Australian IT stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at how the country is harnessing cutting-edge technologies to solve problems, while paving the way for emerging areas such as open banking.
Posted: 06 Jan 2020 | Published: 07 Jan 2020

ComputerWeekly.com

Digital Identity Security Assurance: How to Keep Your Customer Data Secure
sponsored by Akamai Technologies
WHITE PAPER: Customer identities are among the most critical and valuable assets of any organization. Failing to provide adequate security can result in financial, reputational, and even legal consequences. This paper highlights industry best practices for building customer trust through comprehensive security programs. Read on to learn more.
Posted: 23 Dec 2019 | Published: 30 Nov 2019

Akamai Technologies

Innovation in retail: Using cybersecurity as a competitive advantage
sponsored by Capgemini
RESOURCE: While cybersecurity measures enable retail organizations to identify and mitigate potential threats, it’s important to consider that data protection can be considered a competitive advantage. In this blog post, explore the importance of security for retail consumers, how GDPR is shaping the industry, and the role of SOCs in quantifying risks.
Posted: 19 Dec 2019 | Published: 13 May 2019

Capgemini

California Consumer Privacy Act: The Need for Data-Centric Security
sponsored by Comforte AG
WHITE PAPER: CCPA is one of the latest in a series of new privacy regulations globe that affects businesses and comes with significant penalties. This whitepaper outlines the key steps necessary to prepare for CCPA and highlights the importance of data-centric security to ensure your organization is adequately prepared for 2020.
Posted: 13 Dec 2019 | Published: 30 Nov 2019

Comforte AG
1 - 25 of 199 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info