IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed   
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC) Reports
1 - 25 of 348 Matches Previous Page  |  Next Page
Accelerating GDPR Compliance and Beyond with an Information Driven Approach
sponsored by Sinequa
WHITE PAPER: Discover how this cognitive search and analytics platform can help you gain a centralized view of your data within your IT ecosystem, today.
Posted: 20 Sep 2018 | Published: 21 Jun 2018

Sinequa

Special Report: Records Management Best Practice
sponsored by Docauthority
RESOURCE CENTER: All organizations need a documented data retention policy to comply with GDPR. They also need to apply it. Technology can help simplify the process. Download this resource to learn more.
Posted: 19 Sep 2018 | Published: 19 Sep 2018

Docauthority

The 5 Toughest GDPR Challenges to Overcome
sponsored by British Telecommunications PLC
RESOURCE: Technology can advance your business through the future, but it also provides the largest barrier to meeting GDPR compliance. Read on to explore the 5 common security challenges you need to overcome to meet GDPR compliance requirements.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

British Telecommunications PLC

Webinar: Financial Services Organizations, Data Privacy, & GDPR
sponsored by Amazon Web Services
VIDEO: Financial services companies are encouraged to register for this upcoming webinar on Sept 16. You'll learn how insurance carrier Asurion uses a simple, comprehensive data governance solution to discover, protect, and monitor sensitive personal data across all AWS data repositories.
Posted: 13 Sep 2018 | Premieres: 26 Sep 2018

Amazon Web Services

The Critical Role Data Access Plays in Support of GDPR
sponsored by Gigamon
WHITE PAPER: Visibility into network data, wherever it resides, is foundational to maintaining GDPR compliance. Download this white paper for specific examples of where and how this applies to various articles within the regulation.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Gigamon

On-Demand Webinar: Security and Privacy in the Cloud
sponsored by Hyland
VIDEO: Watch this webinar and hear from Hyland Cloud experts Marc Cianciolo and Steve Wyant as they explore the best practices for security, privacy and compliance for information management in the cloud.
Posted: 31 Aug 2018 | Premiered: 31 Aug 2018

Hyland

Optimize Information Management for Improved Information Security, Governance and Compliance
sponsored by Hyland
WHITE PAPER: Smart information management starts with common-sense practices and tools your organization may already own. Download this white paper to learn how your organization can reduce risk, protect information, and follow industry best practices to attain and maintain regulatory compliance.
Posted: 31 Aug 2018 | Published: 31 Aug 2018

Hyland

Mitigate Business and Security Risk with Splunk
sponsored by Splunk
WHITE PAPER: Learn how your organization can better understand the gaps and vulnerabilities in your environment in order to reduce risk to your business through risk mitigation.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Splunk

Analytics: The Key to Identifying and Mitigating Third-Party Risk
sponsored by CyberGRX
WHITE PAPER: Discover how ecosystem analytics allows companies to understand sources and levels of potential risk along from third parties with contextual information and comparative screening.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

CyberGRX

GDPR: 5 Lessons Learned Veeam Compliance Experience Shared
sponsored by Veeam Software
WHITE PAPER: GDPR has been in effect since May 25, 2018 but there are still many questions to be answered and lessons learned from this data privacy law. Download this white paper to see how Mark Wong, CIO of Veeam Software has learned a few lessons about GDPR.
Posted: 07 Aug 2018 | Published: 31 Jan 2018

Veeam Software

Making Intelligent Decisions about Identities and their Access
sponsored by IBM
EBRIEF: Explore this e-brief to learn how identity governance and management can help your enterprise maintain strong control over user access to applications and carefully monitor how access entitlements align with business roles and responsibilities.
Posted: 03 Aug 2018 | Published: 31 Oct 2016

IBM

Making Intelligent Decisions about Identities and their Access
sponsored by IBM
EBRIEF: Explore this e-brief to learn how identity governance and management can help your enterprise maintain strong control over user access to applications and carefully monitor how access entitlements align with business roles and responsibilities.
Posted: 02 Aug 2018 | Published: 31 Oct 2016

IBM

Cybersecurity Compliance: Guide to Data Protection Regulatory Compliance
sponsored by Panda Security
WHITE PAPER: Violation of GDPR and PCI DSS could cause a lot of damage to your organization--ranging from hefty fines to a loss of confidence from customers, contractors and employees. Learn about Panda Security's advanced cybersecurity platform and managed services, which are designed to protect your data and maintain compliance.
Posted: 31 Jul 2018 | Published: 31 Jul 2018

Panda Security

Gartner 2018 Magic Quadrant for Identity Governance and Administration
sponsored by IBM
RESEARCH CONTENT: Making sure the right people get access to the right resources at the right times and for the right reasons is of high importance for all security and risk management leaders today. Explore this analyst review for a breakdown of 15 Identity Governance and Administration (IGA) providers to compare which one is right for your organization.
Posted: 30 Jul 2018 | Published: 21 Feb 2018

IBM

Case Study: Node Africa Transforms Security
sponsored by VMware
CASE STUDY: It's not easy to navigate the dangers of the digital economy – it has caused a dramatic shift in the IT landscape, yet many IT organizations are still taking the same approach to security. This case study highlights a cloud service provider in Kenya secured their application infrastructure and streamlined compliance.
Posted: 27 Jul 2018 | Published: 27 Jul 2018

VMware

Compliance: How a Layered Approach Helps you Breeze Through Audits
sponsored by Kaseya
WHITE PAPER: In a constant sea of network threats, you must demonstrate how your network addresses a growing list of compliance requirements. Unfortunately, many organizations have challenges demonstrating compliance for both general and vertical regulations. This resource will guide you through the latest regulations and how to take it layer by layer.
Posted: 27 Jul 2018 | Published: 27 Jul 2018

Kaseya

Gartner 2018 Magic Quadrant for Identity Governance and Administration
sponsored by IBM
RESEARCH CONTENT: Making sure the right people get access to the right resources at the right times and for the right reasons is of high importance for all security and risk management leaders today. Explore this analyst review for a breakdown of 15 Identity Governance and Administration (IGA) providers to compare which one is right for your organization.
Posted: 27 Jul 2018 | Published: 21 Feb 2018

IBM

Better Access Governance: Looking Beyond Roles
sponsored by IBM
WHITE PAPER: Managing users and their entitlements doesn't have to be a complicated process. Learn how better access governance can clear the confusion of proper user access within your business.
Posted: 27 Jul 2018 | Published: 31 Oct 2016

IBM

Better Access Governance: Looking Beyond Roles
sponsored by IBM
WHITE PAPER: Managing users and their entitlements doesn't have to be a complicated process. Learn how better access governance can clear the confusion of proper user access within your business.
Posted: 27 Jul 2018 | Published: 31 Oct 2016

IBM

How Continuous Monitoring is Revolutionizing Risk Management
sponsored by BitSight
WHITE PAPER: Organizations with continuous monitoring tools put themselves in a position to make more informed decisions that help their businesses succeed. Learn more about how you can help your enterprise continuously monitor vendor, reputational, and strategic risks.
Posted: 18 Jul 2018 | Published: 18 Jul 2018

BitSight

A Risk Manager's Guide to the General Data Protection Regulation (GDPR)
sponsored by BitSight
RESOURCE: Learn how you can evaluate your enterprise's security measures and maintain ongoing compliance with GDPR.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

BitSight

Definitive Guide to Data Classification
sponsored by Digital Guardian
RESOURCE: In the case of your growing data, prioritization comes from data classification. In this 8 part guide, you'll learn about what classification is, why it is important and even foundational to data security.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

Digital Guardian

Report – Market Guide for Privileged Access Security Management
sponsored by CA Technologies
ANALYST REPORT: In Gartner market guide for privileged access security management, learn about 24 vendors in this competitive and rapidly maturing market.
Posted: 26 Jul 2018 | Published: 22 Aug 2017

CA Technologies

GDPR is Here: Are You Ready?
sponsored by Oracle Cloud
VIDEO: In this webcast, hear from Allesandro Vallega, Security & GDPR business development director at Oracle EMEA about survey results, maturity categories across industries, and cloud services that can help achieve GDPR compliance.
Posted: 26 Jul 2018 | Premiered: 24 Jul 2018

Oracle Cloud

The New Rules of Email Deliverability
sponsored by SparkPost
WHITE PAPER: Take a closer look at this guide to get up to speed on the rapidly changing state of email deliverability, with 10 new rules including updates to old practices and emerging techniques.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

SparkPost
1 - 25 of 348 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement