IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed   
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC) Reports
26 - 50 of 212 Matches Previous Page  |  Next Page
Security and Compliance Mandates Can Be Draining. Here's How to Recharge.
sponsored by OneNeck IT
WHITE PAPER: It is easy to be overwhelmed by security threats and data breaches however; there are a number of simple yet effective steps you can take right now to regain your focus and control. In this white paper, discover 5 steps to recharging your security and compliance efforts.
Posted: 07 Jan 2019 | Published: 07 Jan 2019

OneNeck IT

Public Records Modernization: Your Key to Compliance
sponsored by Smarsh
EGUIDE: Ensuring your recordkeeping efforts are cutting edge is your best strategy for avoiding fines and litigation resulting from public records gaps. In this crash-course guide, explore how modernizing your public recordkeeping solutions can help protect your organization from costly fines and bridge critical data gaps.
Posted: 20 Dec 2018 | Published: 19 Dec 2018

Smarsh

Arctic Wolf Helps Maslon Elevate Its Cybersecurity and Meet Client Obligations
sponsored by Arctic Wolf
WHITE PAPER: Maslon, a Minneapolis law firm, recognized that active monitoring was a requirement and they needed to ensure they had the tools and resources to find potential threats 24/7. Read on to learn how Maslon found exceptional results using Managed Detection and Response (MDR).
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Bay Federal Credit Union: How SOC-as-a-Service Has Helped Add Business Value
sponsored by Arctic Wolf
CASE STUDY: In this case study, Bay Federal Credit Union switched from using a managed security service provider (MSSP) to a SOC-as-a-Service. When looking for someone to monitor their systems, they looked at various MDR alternatives before deciding to use AWN CyberSOC Services. The credit union saw exceptional results in a short amount of time.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Reduce Risk and Protect Privacy Across Enterprise Systems
sponsored by Micro Focus & PwC
WHITE PAPER: A staggering amount of organizations are storing sensitive business data in inactive file shares, creating an increased risk of data loss. With data breaches on the rise, poorly protected data makes your business an easy target. Discover the advantages of a secure content management system. Reduce the cost and complexity of securing your data.
Posted: 06 Dec 2018 | Published: 30 Jun 2018

Micro Focus & PwC

Protecting Government Assets
sponsored by Dell
RESOURCE: Take a look at this infographic to find out how thin clients can provide government organizations at the local, regional, and federal levels with a secure platform that enables IT to meet strict government mandates to access highly sensitive information.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Dell

Using Dynamic Data and Advanced Analytics to Secure Your Ecosystem
sponsored by CyberGRX
VIDEO: Download this webinar to learn about the insights and capabilities that can help you identify which third parties pose the greatest risk to your business.
Posted: 30 Oct 2018 | Premiered: 30 Oct 2018

CyberGRX

ServiceNow Governance, Risk, and Compliance
sponsored by ServiceNow
DATA SHEET: Learn how your organization can identify business risks in real-time, automate third-party risks, optimize internal audit productivity, and improve strategic planning and decision making with ServiceNow's GRC approach.
Posted: 29 Oct 2018 | Published: 29 Oct 2018

ServiceNow

Getting GDPR Right
sponsored by Attunity
WHITE PAPER: Today's businesses can no longer treat customer privacy as an afterthought. Without a singular mandated solution, companies need to create the right GDPR roadmap. Download this white paper to learn more.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Attunity

Respond to Business Risks in Real-Time with Integrated Risk Management
sponsored by ServiceNow
EBRIEF: Learn how to transform your GRC processes to increase performance across your organization and respond to business risks in real-time.
Posted: 04 Oct 2018 | Published: 04 Oct 2018

ServiceNow

Nexen Energy Accelerates and Strengthens its External Audit Processes with ServiceNow GRC
sponsored by ServiceNow
CASE STUDY: Find out how this energy company was able to automate the end-to-end audit process with a sustainable, agile, and transparent approach to GRC.
Posted: 03 Oct 2018 | Published: 03 Oct 2018

ServiceNow

8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
sponsored by ServiceNow
WHITE PAPER: Discover 8 simple steps to slash audit costs, improve efficiency, and minimize risk within your organization by automating your GRC.
Posted: 01 Oct 2018 | Published: 01 Oct 2018

ServiceNow

The 5 Toughest GDPR Challenges to Overcome
sponsored by British Telecommunications PLC
RESOURCE: Technology can advance your business through the future, but it also provides the largest barrier to meeting GDPR compliance. Read on to explore the 5 common security challenges you need to overcome to meet GDPR compliance requirements.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

British Telecommunications PLC

The Critical Role Data Access Plays in Support of GDPR
sponsored by Gigamon
WHITE PAPER: Visibility into network data, wherever it resides, is foundational to maintaining GDPR compliance. Download this white paper for specific examples of where and how this applies to various articles within the regulation.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Gigamon

Analytics: The Key to Identifying and Mitigating Third-Party Risk
sponsored by CyberGRX
WHITE PAPER: Discover how ecosystem analytics allows companies to understand sources and levels of potential risk along from third parties with contextual information and comparative screening.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

CyberGRX

GDPR: 5 Lessons Learned Veeam Compliance Experience Shared
sponsored by Veeam Software
WHITE PAPER: GDPR has been in effect since May 25, 2018 but there are still many questions to be answered and lessons learned from this data privacy law. Download this white paper to see how Mark Wong, CIO of Veeam Software has learned a few lessons about GDPR.
Posted: 07 Aug 2018 | Published: 31 Jan 2018

Veeam Software

Cybersecurity Compliance: Guide to Data Protection Regulatory Compliance
sponsored by Panda Security
WHITE PAPER: Violation of GDPR and PCI DSS could cause a lot of damage to your organization--ranging from hefty fines to a loss of confidence from customers, contractors and employees. Learn about Panda Security's advanced cybersecurity platform and managed services, which are designed to protect your data and maintain compliance.
Posted: 31 Jul 2018 | Published: 31 Jul 2018

Panda Security

How Continuous Monitoring is Revolutionizing Risk Management
sponsored by BitSight
WHITE PAPER: Organizations with continuous monitoring tools put themselves in a position to make more informed decisions that help their businesses succeed. Learn more about how you can help your enterprise continuously monitor vendor, reputational, and strategic risks.
Posted: 18 Jul 2018 | Published: 18 Jul 2018

BitSight

The New Rules of Email Deliverability
sponsored by SparkPost
WHITE PAPER: Take a closer look at this guide to get up to speed on the rapidly changing state of email deliverability, with 10 new rules including updates to old practices and emerging techniques.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

SparkPost

A Risk Manager's Guide to the General Data Protection Regulation (GDPR)
sponsored by BitSight
RESOURCE: Learn how you can evaluate your enterprise's security measures and maintain ongoing compliance with GDPR.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

BitSight

Inadequate Penetration Testing Puts Sensitive Data in the Crosshairs
sponsored by InteliSecure
WHITE PAPER: In this white paper, find out why some organizations see penetration testing as a box to check in order to meet compliance requirements and why they must dispel this myth if they want value from the testing.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

InteliSecure

3 GDPR Requirements That Will Have a Big Impact on Your Organization
sponsored by Plixer
RESOURCE: Inside, find out why you must be able to collect data about every conversation on the network and be able to quickly deliver reports and root cause by ensuring your organization is GDPR compliant.
Posted: 06 Jun 2018 | Published: 06 Jun 2018


5 Steps to Good Governance
sponsored by Box
WHITE PAPER: This resource explores 5 steps to a good information governance strategy so that you and your employees can focus on more exciting goals – innovative, business-growing goals.
Posted: 30 May 2018 | Published: 30 May 2018

Box

Meet Compliance Requirements & Enhance Cybersecurity with Micro-Segmentation
sponsored by VMware
WHITE PAPER: A recent study by Fortinet found that nearly 50% of senior IT professionals believe their boards and management teams need to do more to protect the organization. Take a look at this resource to uncover how to utilize micro-segmentation to meet compliance requirements and enhance cybersecurity.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

VMware

E-Discovery:How CloudBasedStrategiesAre Changingthe World of Law
sponsored by Mimecast
EGUIDE: Download this e-guide to learn how e-discovery is conquering containerized data with comprehensive cloud-based strategies, and explore how e-discovery's existence has changed the world of law through collaboration.
Posted: 18 Dec 2018 | Published: 10 Dec 2018

Mimecast
26 - 50 of 212 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement