IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed   
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC) Reports
1 - 25 of 285 Matches Previous Page  |  Next Page
Active Directory Management and Security
sponsored by One Identity
WHITE PAPER: Many organizations expect powerful security from their networking operating systems. This resource examines major security requirements organizations expect and offers Active Directory management and security strategies to augment your current approach.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

One Identity

Controlling and ManagingPrivileged Access
sponsored by One Identity
WHITE PAPER: Managing privileged accounts is becoming more critical as security and compliance initiatives grow. This white paper explores the risks associated with privileged accounts, and offers an easy-to-use risk mitigation strategy, which enables granular access control and accountability.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

The 10 Universal Truths of Identity and Access Management
sponsored by One Identity
WHITE PAPER: IAM is an ever-moving target that has become a large and integral part of IT operations. Explore this white paper to uncover 10 universal truths of IAM to help you evaluate your need for an IAM approach as well as how to implement and optimize its usage.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

Is it Time to Shift Left?
sponsored by Nexthink
RESOURCE: 88% of IT teams report an increase in events and alerts over the last 12 months, according to the Digital Enterprise Journal. Explore this infographic to uncover 5 benefits of shifting your IT teams to reduce incidents and improve security and compliance.
Posted: 15 Feb 2018 | Published: 15 Feb 2018


Public Key Infrastructure (PKI) Buyer's Guide
sponsored by Entrust, Inc.
RESOURCE: Implementing cost-effective security strategies that meet operational needs of end-users while complying with regulatory requirements is challenging. This resource assists organizations in the selection of the best PKI strategy to meet business and security needs.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Entrust, Inc.

Why PCI DSS Compliance is Impossible without Privileged Management
sponsored by One Identity
WHITE PAPER: For many organizations, compliance with data security standards is very difficult. This white paper dives into IT security compliance for PCI DSS and offers strategies to make your compliance approach tangible and secure.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

One Identity

Why SOX Compliance is Impossible without Privileged Management
sponsored by One Identity
WHITE PAPER: For many organizations, compliance with data security standards doesn't seem to be getting easier. This resource addresses IT security compliance challenges and provides recommendations in regard to the Sarbanes-Oxley Act (SOX).
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

2018 Data Governance Implementation Survey
sponsored by Red Gate Software
RESEARCH CONTENT: 77% of respondents have either already implemented a data governance program or plan to within the next two years, according to the 2018 Data Governance Implementation Survey. This resource reveals notable components of the 2018 Data Governance Implementation Survey, including insights on the GDPR.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

Red Gate Software

The Pitfalls of Spreadsheet-Based GRC
sponsored by Lynx Technology Partners
WHITE PAPER: GRC requirements for organizations have increased, and GRC efforts have grown and expanded through almost every department. This resource offers insight into the complexity, risks and costs of spreadsheet-based GRC.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

Lynx Technology Partners

Preparing for Compliance with the GDPR
sponsored by Skybox Security
WHITE PAPER: The GDPR came about to help organizations prevent harmful data breaches. This whitepaper offers an overview of the GDPR and provides recommendations for technical compliance with 11 tangible steps.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Skybox Security

GDPR and Vendor Risk Management
sponsored by BitSight
RESOURCE: As many as 61% of global companies are not yet GDPR compliant, says BitSight's Elizabeth Fischer. Key into this Q&A interview regarding GDPR compliance and vendor risk management.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

BitSight

Spreadsheet-Based GRC: A Self-Assessment to Gauge the Effectiveness of Your Program
sponsored by Lynx Technology Partners
RESOURCE: This resource offers a self-assessment to gauge the effectiveness of your spreadsheet-based governance, risk and compliance program.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Lynx Technology Partners

13 Essential Steps to Meeting the Security Challenges of the EU GDPR
sponsored by Tenable, Inc.
WHITE PAPER: This resource offers assistance to information security professionals in prioritizing changes and additions to their information security programs in preparation for GDPR.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Tenable, Inc.

GDPR and the Regulatory Impact on Vendor Risk
sponsored by BitSight
RESOURCE: Take a glimpse into this Q&A conversation to hear from security pros discussing the GDPR and the regulatory impact on vendor risk.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

BitSight

Five Milestones to GDPR Success
sponsored by Proofpoint, Inc.
VIDEO: The GDPR has been put into place because of the constant data breaches hurting organizations today. Access this webcast to uncover steps to take to become GDPR compliant.
Posted: 06 Feb 2018 | Premiered: 06 Feb 2018

Proofpoint, Inc.

Healthcare Industry: Cyber Security & Risk Management
sponsored by Lynx Technology Partners
CASE STUDY: Explore this case study to gain insight into how one healthcare organization was able to become FISMA compliant in 9 months, a process estimated to take several years.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Lynx Technology Partners

Making GRC Understandable, Actionable, and Auditable for New Regulations
sponsored by ServiceNow
WEBCAST: Tune into this webinar to learn how to make GRC understandable, actionable and auditable for new regulations, such as GDPR.
Posted: 02 Feb 2018 | Premiered: Feb 2, 2018

ServiceNow

Economic, Operational & Strategic Benefits of Security Framework Adoption
sponsored by Tenable, Inc.
EBOOK: What are the business and security benefits that come from adopting a security framework? In this 96-page e-book, 38 information security leaders share success perspectives and lessons learned regarding their security framework.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Tenable, Inc.

GDPR 4 Things US Companies Need To Know
sponsored by Edgile
RESOURCE: There are aspects of the GDPR that will take organizations a lot of time to move into compliance. Gartner predicts that by the end of 2018, more than 50% of companies affected won't be in full compliance with the requirements. This resource reveals 4 things US companies need to know before the GDPR May 2018 deadline.
Posted: 01 Feb 2018 | Published: 03 Jan 2018

Edgile

5 Milestones to GDPR Success
sponsored by Absolute
ANALYST REPORT: The GDPR deadline is rapidly approaching with many privacy and security professionals unsure of where to begin to prep. To meet the May 2018 deadline, organizations must prepare today. Access this Forrester report to discover 5 milestones you must reach to achieve GDPR compliance success.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Absolute

The Security Compliance Countdown
sponsored by Citrix
RESOURCE: May 25, 2018 – the deadline for GDPR compliance – is right around the corner. However, 48% of organizations believe their security infrastructure doesn't facilitate compliance, according to a Ponemon Institute study. This infographic reveals a "to-do" list to help your organization safeguard personal data in preparation for the GDPR.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Citrix

End the Struggle with InfoSec Policies and Standards through Risk & Compliance Integration
sponsored by Edgile
WHITE PAPER: Information security policies and standards can oftentimes cause confusion and even liability within an organization. This resource details 4 pitfalls of a compliance-only approach and offers a secure method to complying with policies and standards through a risk-integrated approach.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Edgile

Why Mobile Device Event Correlation Matters
sponsored by SyncDog
WHITE PAPER: A recent study by Gartner reveals 3 key challenges enterprises will deal with as more personal phones and tablets invade the workplace: governance and compliance, mobile device management, and security. Learn how to deal with these challenges head-first inside this white paper.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

SyncDog

Always on GDPR - The Visibility to Act Like the Pros
sponsored by Nuix
WHITE PAPER: The GDPR is estimated to implement $5.3 billion in fines by 2021, according to Nuix. To avoid the strict fines imposed by the regulation, a successful compliance strategy is critical. This resource offers an approach to effectively securing personal data through a more advanced method than your average cybersecurity strategy.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Nuix

The Good Shepherd Model for Cybersecurity, Privacy, And Regulatory Compliance
sponsored by Nuix
WHITE PAPER: Data breaches are inevitable - If you can't prevent hackers or insiders from getting into your organization's network, it's vital to minimize the damage they can cause. This white paper reveals four rules for protecting private data to improve compliance with privacy regulations.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Nuix
1 - 25 of 285 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement