Recorded: February 24 | 2016 Attend
In every organization, there are a multitude of applications and devices and a universe of threats and vulnerabilities. Every process, function and system has certain risks and compliance requirements. It is no longer enough to have a handful of diligent security and compliance professionals managing the organization's risk strategies and controls. Their processes must embrace business and mission professionals' knowledge of risk, who evaluate the causal impact of threats to their operational performance, and participate in decision-making to meet their risk posture goals.
Recorded: May 26 | 2015 Play
With the increased regulation and scrutiny of the past decade, it is important for organizations to maintain best practices in order to control and achieve compliance with evolving regulatory requirements.
When: Wednesday, 26 May @ 12PM EST
Presenting: Chris Noell, Executive Vice President, Product Management, TruArx
In this 1-hour webcast, Chris Noell, TruArx EVP of Product Management, discusses why it's important to uncover ALL the data security and privacy regulations which affect your business. Chris will then review obstacles which prevent organizations from managing compliance obligations against more than a handful of regulations.
Recorded: 7 April 2010
Presenting: Michael Rasmussen, Corporate Integrity; Chris Meritt, Lumension
Safeguarding electronic protected health information (ePHI) has proved quite challenging for many healthcare organizations. In fact, 80 percent of responding healthcare organizations had experienced at least one incident of lost or stolen electronic health information in the past year*.
Recorded: September 24 | 2014 Play
What is driving expansion to the cloud? In most cases, it's cost. But for many enterprise IT organizations, it is about agility, efficiency, and productivity.
When: June 4 @ 11am EST
In today's highly regulated environment, many organizations address compliance as one-off projects where the goal is to ‘get the box checked' by the auditor. This inefficient approach results in time- and resource-intensive work to pour through as many as 40,000 spreadsheets just for one compliance initiative* that provides little value back to the organization. This multiplies exponentially when dealing with multiple regulations.
Recorded: with Gartner | 2011 View Webinar
When companies share sensitive documents with partners outside the corporate network, security, compliance and collaboration are often seen as a tradeoff. You can lock information down behind the firewall with strict policies and centralized control, but without collaboration. Or you can use a collaboration portal, but at the expense of security and the ability to enforce corporate confidentiality policies.
When: July 14 @ 3PM EST
Presented by: Michael Rasmussen and Eric Young
500 million on Facebook, 75 million on LinkedIn. Many of these users are actively utilizing social media for business purposes - as increasingly the usage of social media is about communications, collaboration and communities - your users are bringing these tools into the workplace - to connect with customers, prospect new business and collaborate with partners.
17 Nov 2009 4:00 pm Presenting Robert Stroud, International VP of ISACA
This session will deliver you an introduction to the ISACA COBIT, VALIT and RISK IT frameworks and how to commence a practical GRC journey using them together to provide effective governance.
The UCF is the only IT compliance framework that helps you manage conflicting and overlapping compliance requirements across hundreds of different regulations, allowing you to comply once and attest to many requirements including PCI, Sarbanes-Oxley, HIPAA, CobiT, NIST, and hundreds more.
Short Summary: In this 12-minute podcast, Chris Noell, TruArx EVP of Product Management, discusses the five most common pitfalls when managing a successful and effective compliance program.