IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed   
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC) Reports
1 - 25 of 288 Matches Previous Page  |  Next Page
Preparing Your Organization for the GDPR
sponsored by Imperva
WHITE PAPER: Where does your organization stand in terms of GDPR preparedness? Access this resource to uncover 5 questions to determine what GDPR means for your organization and how to prepare.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Imperva

Governance, Risk, and Compliance: The Business and IT Challenge
sponsored by ServiceNow
RESOURCE: Open this resource to reveal, ServiceNow Governance, Risk, and Compliance (GRC) unified platform, so you can effectively respond to security risks in real-time through continuous monitoring, prioritization and automation.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

ServiceNow

Secure Transformation of the Data Center in Healthcare
sponsored by HyTrust
RESOURCE: According to Ponemon's 2017 Cost of a Data Breach study, the average cost of a breach is about $3.62 million. This resource offers best practices for avoiding costly data breaches and securing the transformation of the data center within the healthcare industry.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

HyTrust

Web Application Security in a Digitally Connected World
sponsored by Radware
RESEARCH CONTENT: According to a recent Ponemon Institute study, 68% of organizations admit low confidence in their information security posture. Explore this research report to gain insight into 3 web application security challenges facing organizations today.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Radware

Active Directory Management and Security
sponsored by One Identity
WHITE PAPER: Many organizations expect powerful access controls from their networking operating systems. This resource offers optimized Windows security by implementing an effective IAM approach, including, access control, password management and more.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

One Identity

Controlling and ManagingPrivileged Access
sponsored by One Identity
WHITE PAPER: Managing privileged accounts is becoming more critical as security and compliance initiatives grow. This white paper explores the risks associated with privileged accounts, and offers an easy-to-use risk mitigation strategy, which enables granular access control and accountability.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

The 10 Universal Truths of Identity and Access Management
sponsored by One Identity
WHITE PAPER: IAM is an ever-moving target that has become a large and integral part of IT operations. Explore this white paper to uncover 10 universal truths of IAM to help you evaluate your need for an IAM approach as well as how to implement and optimize its usage.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

Is it Time to Shift Left?
sponsored by Nexthink
RESOURCE: 88% of IT teams report an increase in events and alerts over the last 12 months, according to the Digital Enterprise Journal. Explore this infographic to uncover 5 benefits of shifting your IT teams to reduce incidents and improve security and compliance.
Posted: 15 Feb 2018 | Published: 15 Feb 2018


Public Key Infrastructure (PKI) Buyer's Guide
sponsored by Entrust, Inc.
RESOURCE: Implementing cost-effective security strategies that meet operational needs of end-users while complying with regulatory requirements is challenging. This resource assists organizations in the selection of the best PKI strategy to meet business and security needs.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Entrust, Inc.

Why PCI DSS Compliance is Impossible without Privileged Management
sponsored by One Identity
WHITE PAPER: For many organizations, compliance with data security standards is very difficult. This white paper dives into IT security compliance for PCI DSS and offers strategies to make your compliance approach tangible and secure.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

One Identity

Why SOX Compliance is Impossible without Privileged Management
sponsored by One Identity
WHITE PAPER: For many organizations, compliance with data security standards doesn't seem to be getting easier. This resource addresses IT security compliance challenges and provides recommendations in regard to the Sarbanes-Oxley Act (SOX).
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

2018 Data Governance Implementation Survey
sponsored by Red Gate Software
RESEARCH CONTENT: 77% of respondents have either already implemented a data governance program or plan to within the next two years, according to the 2018 Data Governance Implementation Survey. This resource reveals notable components of the 2018 Data Governance Implementation Survey, including insights on the GDPR.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

Red Gate Software

The Pitfalls of Spreadsheet-Based GRC
sponsored by Lynx Technology Partners
WHITE PAPER: GRC requirements for organizations have increased, and GRC efforts have grown and expanded through almost every department. This resource offers insight into the complexity, risks and costs of spreadsheet-based GRC.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

Lynx Technology Partners

Preparing for Compliance with the GDPR
sponsored by Skybox Security
WHITE PAPER: The GDPR came about to help organizations prevent harmful data breaches. This whitepaper offers an overview of the GDPR and provides recommendations for technical compliance with 11 tangible steps.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Skybox Security

GDPR and Vendor Risk Management
sponsored by BitSight
RESOURCE: As many as 61% of global companies are not yet GDPR compliant, says BitSight's Elizabeth Fischer. Key into this Q&A interview regarding GDPR compliance and vendor risk management.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

BitSight

Spreadsheet-Based GRC: A Self-Assessment to Gauge the Effectiveness of Your Program
sponsored by Lynx Technology Partners
RESOURCE: This resource offers a self-assessment to gauge the effectiveness of your spreadsheet-based governance, risk and compliance program.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Lynx Technology Partners

13 Essential Steps to Meeting the Security Challenges of the EU GDPR
sponsored by Tenable, Inc.
WHITE PAPER: This resource offers assistance to information security professionals in prioritizing changes and additions to their information security programs in preparation for GDPR.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Tenable, Inc.

GDPR and the Regulatory Impact on Vendor Risk
sponsored by BitSight
RESOURCE: Take a glimpse into this Q&A conversation to hear from security pros discussing the GDPR and the regulatory impact on vendor risk.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

BitSight

Five Milestones to GDPR Success
sponsored by Proofpoint, Inc.
VIDEO: The GDPR has been put into place because of the constant data breaches hurting organizations today. Access this webcast to uncover steps to take to become GDPR compliant.
Posted: 06 Feb 2018 | Premiered: 06 Feb 2018

Proofpoint, Inc.

Healthcare Industry: Cyber Security & Risk Management
sponsored by Lynx Technology Partners
CASE STUDY: Explore this case study to gain insight into how one healthcare organization was able to become FISMA compliant in 9 months, a process estimated to take several years.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Lynx Technology Partners

Economic, Operational & Strategic Benefits of Security Framework Adoption
sponsored by Tenable, Inc.
EBOOK: What are the business and security benefits that come from adopting a security framework? In this 96-page e-book, 38 information security leaders share success perspectives and lessons learned regarding their security framework.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Tenable, Inc.

GDPR 4 Things US Companies Need To Know
sponsored by Edgile
RESOURCE: There are aspects of the GDPR that will take organizations a lot of time to move into compliance. Gartner predicts that by the end of 2018, more than 50% of companies affected won't be in full compliance with the requirements. This resource reveals 4 things US companies need to know before the GDPR May 2018 deadline.
Posted: 01 Feb 2018 | Published: 03 Jan 2018

Edgile

5 Milestones to GDPR Success
sponsored by Absolute
ANALYST REPORT: The GDPR deadline is rapidly approaching with many privacy and security professionals unsure of where to begin to prep. To meet the May 2018 deadline, organizations must prepare today. Access this Forrester report to discover 5 milestones you must reach to achieve GDPR compliance success.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Absolute

The Security Compliance Countdown
sponsored by Citrix
RESOURCE: May 25, 2018 – the deadline for GDPR compliance – is right around the corner. However, 48% of organizations believe their security infrastructure doesn't facilitate compliance, according to a Ponemon Institute study. This infographic reveals a "to-do" list to help your organization safeguard personal data in preparation for the GDPR.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Citrix

End the Struggle with InfoSec Policies and Standards through Risk & Compliance Integration
sponsored by Edgile
WHITE PAPER: Information security policies and standards can oftentimes cause confusion and even liability within an organization. This resource details 4 pitfalls of a compliance-only approach and offers a secure method to complying with policies and standards through a risk-integrated approach.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Edgile
1 - 25 of 288 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement