REGISTER

email 14 48

www.agiliance.com

Recorded: June 30 | 2011   

In this session we will provide a detailed analysis on how PCI DSS 2.0 impacts your IT operations (e.g., network engineering, server management, and applications development); intended for technical audience.

Panel Discussion

When: May 11 | 2011   

This session will focus on the value of internal tokenization in reducing scope and potential audit costs at the datacenter, with a specific focus on post-payment applications, databases, loyalty tracking systems, data warehousing, and business applications.

Social Media Risk v Opps

Recorded: April 13 | 2011   

The widespread private use by employees is embraced by many businesses in their communications. The policies and procedures on the proper business use of social media should address the protection of intellectual property, but also consider and respect the interest of preserving the public domain and fair use/dealing, of stimulating fair competition and innovation.

PCI DSS 2.0

Recorded: March 10 | 2011   

Understanding and complying with the PCI Data Security Standard (PCI DSS) can be a daunting task - especially if your organization has limited time and resources. The new PCI DSS 2.0 standard, which took effect Jan. 1, requires testing a virtualized environment to ensure that if you put multiple accounts onto a single processor, there is still segregation of data and all the data is protected.

www.itgrcforum.com

Recorded: Nov 16 2010  

Integrating IT Risk Management systems is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

www.truarx.com

Recorded: Sept 29 2010  

Presenting: Chris Noell, EVP of Product Management at TruArx

For many organizations, Sarbanes-Oxley compliance is mandatory, but automation of the self-assessment process can make it less painful. There are many advantages to using an IT GRC tool to automate assessments such as speed, efficiency, data integrity, and improved analysis.

www.metricstream.com

Recorded: 25 August 2010

Automating the IT Risk Management process is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

mxnew

Recorded: Sept 11th 2009

Presenting: Mark Diamond, President & CEO,Contoural, Nate Fitzgerald, Product Manager of Message Archiving, MX Logic

paneltn2

In this Executive Podcast Discussion Aberdeen Group's GRC Analyst Stephen Walker conducts an intriguing dialogue with 3 leading IT-GRC Vendor's; CA's Chris Fox, eFortresses John Dimaria and Aline's Roland Mosimann. The discussion covers the recent Aberdeen Group IT-GRC survey results and looks at some best practices and cost effective measures organizations can take to overcome the issues. Gain leading Market Intelligence by listening to this podcast.

howto

10 Dec 2009 1:00 pm Presenting Tom Lahiff, PricewaterhouseCooper, Director

How to Reduce Risks and Control the Costs of E-Discovery

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in Register

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Go to top