IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed   
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC) Reports
26 - 50 of 371 Matches Previous Page  |  Next Page
The 5 Toughest GDPR Challenges to Overcome
sponsored by British Telecommunications PLC
RESOURCE: Technology can advance your business through the future, but it also provides the largest barrier to meeting GDPR compliance. Read on to explore the 5 common security challenges you need to overcome to meet GDPR compliance requirements.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

British Telecommunications PLC

The Critical Role Data Access Plays in Support of GDPR
sponsored by Gigamon
WHITE PAPER: Visibility into network data, wherever it resides, is foundational to maintaining GDPR compliance. Download this white paper for specific examples of where and how this applies to various articles within the regulation.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Gigamon

Analytics: The Key to Identifying and Mitigating Third-Party Risk
sponsored by CyberGRX
WHITE PAPER: Discover how ecosystem analytics allows companies to understand sources and levels of potential risk along from third parties with contextual information and comparative screening.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

CyberGRX

GDPR: 5 Lessons Learned Veeam Compliance Experience Shared
sponsored by Veeam Software
WHITE PAPER: GDPR has been in effect since May 25, 2018 but there are still many questions to be answered and lessons learned from this data privacy law. Download this white paper to see how Mark Wong, CIO of Veeam Software has learned a few lessons about GDPR.
Posted: 07 Aug 2018 | Published: 31 Jan 2018

Veeam Software

Cybersecurity Compliance: Guide to Data Protection Regulatory Compliance
sponsored by Panda Security
WHITE PAPER: Violation of GDPR and PCI DSS could cause a lot of damage to your organization--ranging from hefty fines to a loss of confidence from customers, contractors and employees. Learn about Panda Security's advanced cybersecurity platform and managed services, which are designed to protect your data and maintain compliance.
Posted: 31 Jul 2018 | Published: 31 Jul 2018

Panda Security

How Continuous Monitoring is Revolutionizing Risk Management
sponsored by BitSight
WHITE PAPER: Organizations with continuous monitoring tools put themselves in a position to make more informed decisions that help their businesses succeed. Learn more about how you can help your enterprise continuously monitor vendor, reputational, and strategic risks.
Posted: 18 Jul 2018 | Published: 18 Jul 2018

BitSight

A Risk Manager's Guide to the General Data Protection Regulation (GDPR)
sponsored by BitSight
RESOURCE: Learn how you can evaluate your enterprise's security measures and maintain ongoing compliance with GDPR.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

BitSight

Definitive Guide to Data Classification
sponsored by Digital Guardian
RESOURCE: In the case of your growing data, prioritization comes from data classification. In this 8 part guide, you'll learn about what classification is, why it is important and even foundational to data security.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

Digital Guardian

Inadequate Penetration Testing Puts Sensitive Data in the Crosshairs
sponsored by InteliSecure
WHITE PAPER: In this white paper, find out why some organizations see penetration testing as a box to check in order to meet compliance requirements and why they must dispel this myth if they want value from the testing.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

InteliSecure

Special Report: Records Management Best Practice
sponsored by Docauthority
RESOURCE CENTER: All organizations need a documented data retention policy to comply with GDPR. They also need to apply it. Technology can help simplify the process. Download this resource to learn more.
Posted: 19 Sep 2018 | Published: 19 Sep 2018

Docauthority

Webinar: Financial Services Organizations, Data Privacy, & GDPR
sponsored by Amazon Web Services
VIDEO: Financial services companies are encouraged to register for this upcoming webinar on Sept 16. You'll learn how insurance carrier Asurion uses a simple, comprehensive data governance solution to discover, protect, and monitor sensitive personal data across all AWS data repositories.
Posted: 13 Sep 2018 | Premiered: 26 Sep 2018

Amazon Web Services

On-Demand Webinar: Security and Privacy in the Cloud
sponsored by Hyland
VIDEO: Watch this webinar and hear from Hyland Cloud experts Marc Cianciolo and Steve Wyant as they explore the best practices for security, privacy and compliance for information management in the cloud.
Posted: 31 Aug 2018 | Premiered: 31 Aug 2018

Hyland

Optimize Information Management for Improved Information Security, Governance and Compliance
sponsored by Hyland
WHITE PAPER: Smart information management starts with common-sense practices and tools your organization may already own. Download this white paper to learn how your organization can reduce risk, protect information, and follow industry best practices to attain and maintain regulatory compliance.
Posted: 31 Aug 2018 | Published: 31 Aug 2018

Hyland

Making Intelligent Decisions about Identities and their Access
sponsored by IBM
EBRIEF: Explore this e-brief to learn how identity governance and management can help your enterprise maintain strong control over user access to applications and carefully monitor how access entitlements align with business roles and responsibilities.
Posted: 03 Aug 2018 | Published: 31 Oct 2016

IBM

Making Intelligent Decisions about Identities and their Access
sponsored by IBM
EBRIEF: Explore this e-brief to learn how identity governance and management can help your enterprise maintain strong control over user access to applications and carefully monitor how access entitlements align with business roles and responsibilities.
Posted: 02 Aug 2018 | Published: 31 Oct 2016

IBM

Gartner 2018 Magic Quadrant for Identity Governance and Administration
sponsored by IBM
RESEARCH CONTENT: Making sure the right people get access to the right resources at the right times and for the right reasons is of high importance for all security and risk management leaders today. Explore this analyst review for a breakdown of 15 Identity Governance and Administration (IGA) providers to compare which one is right for your organization.
Posted: 30 Jul 2018 | Published: 21 Feb 2018

IBM

Case Study: Node Africa Transforms Security
sponsored by VMware
CASE STUDY: It's not easy to navigate the dangers of the digital economy – it has caused a dramatic shift in the IT landscape, yet many IT organizations are still taking the same approach to security. This case study highlights a cloud service provider in Kenya secured their application infrastructure and streamlined compliance.
Posted: 27 Jul 2018 | Published: 27 Jul 2018

VMware

Compliance: How a Layered Approach Helps you Breeze Through Audits
sponsored by Kaseya
WHITE PAPER: In a constant sea of network threats, you must demonstrate how your network addresses a growing list of compliance requirements. Unfortunately, many organizations have challenges demonstrating compliance for both general and vertical regulations. This resource will guide you through the latest regulations and how to take it layer by layer.
Posted: 27 Jul 2018 | Published: 27 Jul 2018

Kaseya

Gartner 2018 Magic Quadrant for Identity Governance and Administration
sponsored by IBM
RESEARCH CONTENT: Making sure the right people get access to the right resources at the right times and for the right reasons is of high importance for all security and risk management leaders today. Explore this analyst review for a breakdown of 15 Identity Governance and Administration (IGA) providers to compare which one is right for your organization.
Posted: 27 Jul 2018 | Published: 21 Feb 2018

IBM

Better Access Governance: Looking Beyond Roles
sponsored by IBM
WHITE PAPER: Managing users and their entitlements doesn't have to be a complicated process. Learn how better access governance can clear the confusion of proper user access within your business.
Posted: 27 Jul 2018 | Published: 31 Oct 2016

IBM

Better Access Governance: Looking Beyond Roles
sponsored by IBM
WHITE PAPER: Managing users and their entitlements doesn't have to be a complicated process. Learn how better access governance can clear the confusion of proper user access within your business.
Posted: 27 Jul 2018 | Published: 31 Oct 2016

IBM

GDPR is Here: Are You Ready?
sponsored by Oracle Cloud
VIDEO: In this webcast, hear from Allesandro Vallega, Security & GDPR business development director at Oracle EMEA about survey results, maturity categories across industries, and cloud services that can help achieve GDPR compliance.
Posted: 26 Jul 2018 | Premiered: 24 Jul 2018

Oracle Cloud

The New Rules of Email Deliverability
sponsored by SparkPost
WHITE PAPER: Take a closer look at this guide to get up to speed on the rapidly changing state of email deliverability, with 10 new rules including updates to old practices and emerging techniques.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

SparkPost

A Short Primer of GDPR Essentials
sponsored by Splunk
RESOURCE: Don't allow new GDPR regulations to spring fines on your business. Download this resource to access a primer of information regarding GDPR, including financial implications, key focus areas, and more.
Posted: 29 Jun 2018 | Published: 29 Jun 2018

Splunk

Third-Party Security Risk Management Playbook
sponsored by RiskRecon
RESOURCE: This playbook is the definitive study of third-party security risk management practices. Inside, explore real-world capabilities and practices used to manage third-party cyber risk, based on in-depth interviews of risk executives. Take a closer look at capabilities and practices unique and interesting to third-party management.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

RiskRecon
26 - 50 of 371 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement