IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed   
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC) Reports
51 - 75 of 208 Matches Previous Page  |  Next Page
Making GRC Understandable, Actionable, and Auditable for New Regulations
sponsored by ServiceNow
WEBCAST: Tune into this webinar to learn how to make GRC understandable, actionable and auditable for new regulations, such as GDPR.
Posted: 02 Feb 2018 | Premiered: Feb 2, 2018

TOPICS: 
ServiceNow

Potential Benefits of a Unified Analytics Platform
sponsored by SAS
WHITE PAPER: Learn how you can leverage a unified analytics platform to receive faster results from efforts. Uncover why organizations like Hotels.com, Viacom, and others are using analytics platforms that can provide much-needed governance, deliver trustworthy results, and more.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

TOPICS: 
SAS

Operationalize Your Organization for the GDPR
sponsored by InteliSecure
WHITE PAPER: Learn how creating a general data protection regulation framework to protect critical assets, both tangible and intangible (think IP), will enable you to operationalize your GDPR compliance.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

TOPICS: 
InteliSecure

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to a Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Revealed in this white paper is an overview of the New York Cybersecurity Regulation that requires organizations to demonstrate compliance by February 2018.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

TOPICS: 
HID Global

Ensure you are GDPR compliant with this guide
sponsored by TechTarget
RESOURCE: By the end of 2018, more than 50% of companies affected by GDPR will not be in full compliance. Are you compliant? Take our marketing research survey to find out more.
Posted: 02 Oct 2017 | Published: 02 Oct 2018

TOPICS: 
TechTarget

Effectively Monitor, Prioritize, and Automate Response to Third-Party Risk
sponsored by ServiceNow
WHITE PAPER: While assessing vendor risk on a regular basis is critical, it can often be an extremely time-consuming and error-prone exercise involving spreadsheets, email, and rudimentary risk management tools. Learn how to build a more advanced vendor risk management program.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

TOPICS: 
ServiceNow

How EMM Can Help With GDPR Compliance
sponsored by MobileIron
WHITE PAPER: Explore how a comprehensive EMM program can be an important part of your GDPR compliance initiative. Uncover an overview of GDPR principles, 7 tips to deploy EMM for GDPR compliance, and more.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

TOPICS: 
MobileIron

The Security Benefits of Prioritizing Critical Data Assets
sponsored by InteliSecure
WHITE PAPER: Do you know what your critical data assets are? This 6-part white paper explores how to define your critical data assets so you can save time and money, all while improving your security posture.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

TOPICS: 
InteliSecure

A Computer Weekly Buyer's Guide to EU General Data Protection
sponsored by ComputerWeekly.com
EBOOK: The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.
Posted: 12 Jun 2017 | Published: 30 May 2017

TOPICS: 
ComputerWeekly.com

Data protection: Not just about personal data and compliance
sponsored by ComputerWeekly.com
EGUIDE: Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Posted: 18 Apr 2017 | Published: 18 Apr 2017

TOPICS: 
ComputerWeekly.com

Focus ANZ: Security & Digital Transformation
sponsored by ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

TOPICS: 
ComputerWeekly.com

Focus: IT for government and public sector
sponsored by ComputerWeekly.com
EGUIDE: It's been a busy few months for government IT as plans for a post-Brexit Britain are being drawn up. In this e-guide we look at the government's ideas for a prosperous post-Brexit Britain, and its ambitious 5G strategy.
Posted: 27 Mar 2017 | Published: 27 Mar 2017

TOPICS: 
ComputerWeekly.com

PCI Compliance with Unified Security Management
sponsored by AlienVault
WHITE PAPER: Because organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

TOPICS: 
AlienVault

5 Steps to Implement & Maintain PCI DSS Compliance
sponsored by AlienVault
WHITE PAPER: Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

TOPICS: 
AlienVault

The Perfect Rx for HIPAA Compliance
sponsored by AlienVault
WHITE PAPER: Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

TOPICS: 
AlienVault

SWIFT Security Controls to be Mandatory by 2018
sponsored by CyberArk Software, Inc
EGUIDE: Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018.
Posted: 22 Sep 2017 | Published: 19 Sep 2017

TOPICS: 
CyberArk Software, Inc

Exploring Five GDPR Compliance Myths
sponsored by Avnet
EGUIDE: The General Data Protection Regulation (GDPR) comes into force in May 2018, and there are a few misconceptions surrounding this legislation. This e-guide explores 5 common myths surrounding GDPR to help you prepare for the deadline.
Posted: 15 Aug 2017 | Published: 10 Aug 2017

TOPICS: 
Avnet

How to Manage Oracle E-Business Suite Apps and Databases
sponsored by Data Intensity
ESSENTIAL GUIDE: In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.
Posted: 26 Apr 2017 | Published: 20 Apr 2017

TOPICS: 
Data Intensity

How to Keep up with Governance, Risk, and Compliance in the face of Faster App Development
sponsored by SearchMicroservices
EBOOK: This handbook explores how to implement holistic governance, risk, and compliance (GRC) for SOA and microservices by leveraging ALM, APIs, and Web Services Security. Learn more about microservices and how they're changing the world of app security.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

TOPICS: 
SearchMicroservices

Cybersecurity skills shortage demands new workforce strategies
sponsored by IBM
EGUIDE: The race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles. This e-guide discusses organizations' want for better qualified candidates and reveals what skills exactly most security professionals are currently lacking.
Posted: 23 Jun 2016 | Published: 21 Jun 2016

TOPICS: 
IBM

Office 365: Cloud Data Security Considerations to Explore Before Adopting
sponsored by Proofpoint
EGUIDE: IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

TOPICS: 
Proofpoint

Third-Party Risk Management: Evaluating and Contracting with Vendors
sponsored by BitSight
EGUIDE: This expert e-guide describes how to use standardized documentation for third-party risk assessment in order to minimize risk before deciding on a vendor. Access this resource now for advice on the security-related clauses that financial institutions need to include in their vendor contracts in order to comply with regulatory requirements.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

TOPICS: 
BitSight

Yield Insight into Your Business Info with Data-Aware Storage
sponsored by DataGravity
EGUIDE: This expert guide discusses advanced "data-aware" storage infrastructure with big data processing capabilities and efficient metadata management. Learn how this infrastructure can provide your enterprise with intelligent, fast, and highly efficient data services that enables greater insight into your stored data.
Posted: 01 Mar 2016 | Published: 23 Feb 2016

TOPICS: 
DataGravity

Compliance Standards for Data Governance
sponsored by Smarsh
EGUIDE: This e-guide teaches you about data governance and how to best comply with data quality assurance policies put in place by industry consortia. Learn about the framework for ensuring the fidelity of data used in business processes.
Posted: 26 Feb 2016 | Published: 22 Feb 2016

TOPICS: 
Smarsh

How to Tackle Hybrid Cloud Challenges and Construct a Solid Governance Strategy
sponsored by Presidio
EGUIDE: This e-guide highlights expert tips on tackling hybrid cloud challenges surrounding security and compliance, account management and billing, and resource provisioning. Read on to learn how your enterprise can take advantage of public cloud by implementing a reliable, compliant hybrid cloud strategy.
Posted: 18 Feb 2016 | Published: 08 Feb 2016

TOPICS: 
Presidio
51 - 75 of 208 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement