IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed   
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC) Reports
1 - 25 of 199 Matches Previous Page  |  Next Page
Practical Steps to Establishing Good Information
sponsored by Netwrix Corporation
WHITE PAPER: In this white paper, learn how organizations can get a better understanding of how to properly manage their data, optimize their regulatory practices, and reduce the overall corporate risk associated with improper information management. View now to learn more.
Posted: 22 Aug 2019 | Published: 31 Jul 2019

Netwrix Corporation

Security, Compliance & ERP
sponsored by SAP
VIDEO: In this comprehensive webinar, explore key issues and trends impacting security and compliance within ERP systems. Learn about the importance of incorporating a strong role mapping security profile framework during your ERP deployment, and review other essential tips for improving security and compliance within your organization.
Posted: 20 Aug 2019 | Premiered: 20 Aug 2019

SAP

Enterprise Governance, Risk, and Compliance for PeopleSoft
sponsored by Appsian
WHITE PAPER: In this white paper, discover the fundamental parameters necessary to develop an effective security strategy to manage modern threat vectors and navigate complex compliance regulations. Also, explore GRC challenges unique to PeopleSoft and how Appsian Security Platform can enhance security to meet today's compliance requirements.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

Prisma: Cloud Governance & Compliance
sponsored by Palo Alto Networks
RESOURCE: Ensuring your cloud resources and SaaS applications are correctly configured, properly protected and compliant is essential to prevent successful attacks. In this resource, explore everything you need to know to ensure governance and compliance. Also, learn how Prisma's cloud security offering can help your organization.
Posted: 12 Aug 2019 | Published: 24 May 2019

Palo Alto Networks

Security, Risk and Governance Breach Defense: Anatomy of a Breach
sponsored by Micro Focus
WEBCAST: The odds of experiencing a data breach are 1 in 4. And as seen from breaches including Equifax, Yahoo and Uber, the effects are costly. But how can organizations keep secure? There needs to be a plan. In this webcast, Rob MacDonald discusses how organizations can use the NIST Framework to strengthen their defenses against a breach.
Posted: 08 Aug 2019 | Premiered: Aug 8, 2019

Micro Focus

Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
sponsored by Forcepoint
WEBCAST: Some approaches to information security simply won't deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy. In this webcast, Doug Landoll discusses how to take a risk-first approach to addressing information security.
Posted: 07 Aug 2019 | Premiered: Aug 7, 2019

Forcepoint

Privacy by Design: The Key to Unlock Your Compliance Strategy
sponsored by Immuta, Inc
WHITE PAPER: Privacy by Design (PbD), and its EU version Data Protection by Design (DPbD), aim to implement privacy controls from the outset. In this white paper, explore the beginnings of a framework for operationalizing PbD.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Immuta, Inc

SOC 2 Network Security Compliance for Kubernetes Platforms
sponsored by Tigera
WHITE PAPER: System and Organization Controls (SOC) is a set of criteria developed by the American Institute of CPAs. Specifically, SOC Type 2 or SOC 2 offers guidance and certification for companies that handle sensitive customer data. In this white paper, explore challenges with meeting the SOC 2 security criteria on Kubernetes and how Tigera can help.
Posted: 23 Jul 2019 | Published: 23 Jul 2019

Tigera

Doing Identity Access Right
sponsored by HelpSystems
WHITE PAPER: In a world of corporate hacks and ransomware, keeping your data under digital lock and key is essential. But so is allowing your employees to use it to do their best work. In this white paper, explore common access risks and how Identity Governance and Administration (IGA) can help your organization combat these risks.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

HelpSystems

Steps to Prepare for California's New Consumer Privacy Act of 2018
sponsored by Immuta, Inc
WHITE PAPER: The California Consumer Privacy Act of 2018 (CCPA) is taking effect on January 1, 2020. While organizations can build on their GDPR efforts to be in accordance with new CCPA rules, meeting GDPR laws by itself does not mean an organization meets CCPA rules. Download this guide to make sure your organization is ready for the upcoming deadline.
Posted: 16 Jul 2019 | Published: 16 Jul 2019

Immuta, Inc

Ensure Privacy Protection Through Your Digital Transformation
sponsored by Micro Focus
WEBCAST: Today, the race to digital transformation is a vital one. However, as enterprises begin their digital transformation journey, they have to make privacy protection a top priority. In this webcast, Becky Arenson and Carole Murphy discuss how to minimize the risk of digital transformations with a unified technology framework.
Posted: 11 Jul 2019 | Premiered: Jul 11, 2019

Micro Focus

A Definitive Guide to Understanding and Meeting the CIS Critical Security Controls
sponsored by Rapid7
WHITE PAPER: The CIS controls supplement almost every other security framework and are a useful base for developing or assessing your security. However, with many methods out there for meeting them, implementing these controls can be a daunting project. This white paper will help you better understand how to approach and implement each of the key controls.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Rapid7

Security and Governance for Azure Data Lakes
sponsored by Okera
WHITE PAPER: Download this white paper to learn about Azure data lake security concerns for fine-grained access control and governance and explore how you can achieve complete data access control and governance in your Azure data lake with Okera.
Posted: 25 Jun 2019 | Published: 31 May 2019

Okera

Learn How to Control Access to Sensitive Data in Your Data Lake
sponsored by Okera
VIDEO: In this webinar, explore how you can better control access to sensitive data at scale in your data lake with Okera Active Data Access Platform. Discover how Okera can help resolve the longstanding friction between access and governance, and decide if Okera is right for your organization.
Posted: 24 Jun 2019 | Premiered: 24 Jun 2019

Okera

Security and Governance for Amazon S3 Data Lakes
sponsored by Okera
WHITE PAPER: In this white paper, learn about Amazon S3 data lake security concerns for fine-grained access control and governance, and discover how an Okera Active Data Access Platform can help your organization achieve complete data access control and governance in modern data lakes.
Posted: 24 Jun 2019 | Published: 31 Mar 2019

Okera

Webinar: CCPA Explained
sponsored by Okera
WEBCAST: As privacy regulations like CCPA and GDPR continue to proliferate, organizations need to become proactive and avoid a free-for-all approach that can leave them vulnerable to massive fines. In this webcast, Mark Donsky, Head of Product at Okera discusses CCPA and how to best protect your customers' sensitive information to avoid costly penalties.
Posted: 21 Jun 2019 | Premiered: Jun 21, 2019

Okera

CloudCheckr is the Engine Driving Cloud Governance at Siemens
sponsored by Cloudcheckr
CASE STUDY: Railigent monitors the physical infrastructure required to keep rail transportation reliable and safe, but turned to CloudCheckr to ensure the cloud infrastructure it relies on is just as secure. In this case study, learn how CloudCheckr has streamlined Railigent's security protocols to ensure developers can easily identify security issues.
Posted: 17 Jun 2019 | Published: 07 May 2019

Cloudcheckr

Make Trusted Data Privacy Compliance Reporting Easy With ALTR Monitor
sponsored by ALTR
PRODUCT OVERVIEW: Data privacy has transformed from industry-specific regulations into broader compliance concerns which require transparency into the access and use of sensitive data. However, traditional database logs and monitoring products don't return complete information. In this solution brief, explore how ALTR Monitor provides a tamperproof record of data.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

ALTR

Government IT Modernization: 5 Questions to Ask
sponsored by Dell Technologies
WHITE PAPER: Use this resource to uncover the five key questions your organization should be asking to help position IT for modernization success.
Posted: 16 May 2019 | Published: 16 May 2019

Dell Technologies

California Consumer Privacy Act and the Role of IAM
sponsored by WSO2, Inc.
VIDEO: Tune into this webinar to explore the basics of the California Consumer Privacy Act (CCPA) as well as how enterprises can prepare for it, the difference between GDPR and CCPA, and how IAM can help with CCPA and other privacy regulations.
Posted: 14 May 2019 | Premiered: 14 May 2019

WSO2, Inc.

The Government of Arlington Keeps Dreaming Thanks to IT Modernization
sponsored by Dell Technologies
WHITE PAPER: Arlington, Texas, a city of over 370,000 residents, proudly calls itself "The American Dream City." In this one pager, find out how the city used sophisticated strategy and governance practices to build an incredibly modernized IT infrastructure to help them live up to their name.
Posted: 13 May 2019 | Published: 13 May 2019

Dell Technologies

Building a Modern Information Governance Strategy
sponsored by Mimecast
WHITE PAPER: Many organizations are rethinking their information management programs. They are creating modern and easier-to-execute policies, developing comprehensive processes and deploying better technology, all of which drive compliance. In this white paper, learn how key security challenges can be addressed through a modern information governance strategy.
Posted: 11 Apr 2019 | Published: 28 Sep 2018

Mimecast

How to Get Started with the NIST Cybersecurity Framework
sponsored by Expel
WHITE PAPER: The NIST Cybersecurity Framework can be very useful to help companies understand where they are and where they are going as they grow their broader cyber risk management program. In this white paper, Expel shares how using their Expel service has helped their CSF scores. Also learn how Expel can help you on the road to CSF nirvana.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

Expel

Insurers: Are You Ready for IFRS 17?
sponsored by SAS
WHITE PAPER: With the information provided in this white paper, learn how to prepare for IFRS 17, and uncover 10 things to look for in an IFRS 17 infrastructure with expert insight from SAS.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

SAS

Laying the Foundation for GDPR Compliance
sponsored by SentryOne LLC
WHITE PAPER: The GDPR is in effect but, many businesses are still struggling with how to properly implement protections across systems and processes. This white paper discusses the 4 key rights that European citizens have under GDPR, and what businesses need to do to ensure they are GDPR compliant.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

SentryOne LLC
1 - 25 of 199 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement