ComputerWeekly.com Research Library

Powered by Bitpipe.com

Governance, Risk, Compliance (GRC) Research

  • Handle with Care: Calculating and managing risk is tricky business

    Sponsored by: TechTarget ComputerWeekly.com 

    In this inaugural issue of Information Security Europe, our cover story dives-deep into the difficult task of calculating and managing risk in the ever-changing European threat landscape.

  • Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives

    Sponsored by: ISACA

    Globalization and recent economic pressures have resulted in increased requirements for the availability, scalability and efficiency of enterprise information technology (IT) solutions.

  • E-Guide: GARP and How it Helps you Achieve Better Information Governance

    Sponsored by: IBM

    This e-guide answers the most frequently asked questions about information governance and GARP. Continue reading to get a firm introduction to GARP and information governance as a whole.

  • E-Guide: Risk Management and Compliance Enforcement for the Financial Industry

    Sponsored by: IBM

    This e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models.

  • Forrester Study: The Total Economic Impact of Oracle Identity Analytics

    Sponsored by: Oracle Corporation

    Based on real customers' data, this comprehensive study walks through detailed return-on-investment (ROI) calculations for compliance and streamlined access, and guides you in computing cost savings with identity & access governance solution.

  • Smart Strategies for Securing Extranet Access

    Sponsored by: Oracle Corporation

    Download this whitepaper to learn how you can mitigate risk, improve extranet security, streamline compliance and enable your organization to boost its bottom-line by taking advantage of advanced access management technologies.

  • Access Certification: Addressing and Building on a Critical Security Control

    Sponsored by: Oracle Corporation

    This white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers.

  • Harnessing Oracle Governance, Risk, and Compliance Applications to Improve Your E-Business Suite 12.1 Upgrade

    Sponsored by: Oracle Corporation

    This video white paper explains how continued use of the Oracle GRC applications suite embeds deep-seated controls within EBS Release 12.1 so business processes are kept intact and optimized long after the upgrade project is complete. 

  • New! Smart SOA Connectivity and Integration Podcast Series

    Sponsored by: IBM

    Listen to software development experts from the IBM® Software Development Laboratory and some of their U.S.-based counterparts explain how to reduce complexity, improve access to vital business information, and optimize IT budgets in this exclusive, listen-at-your-own-pace podcast series on Smart SOA Connectivity and Integration.

  • First Annual Cost of Cyber Crime Study

    Sponsored by: ArcSight, an HP Company

    Despite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and government institutions.

  • Transitioning to a Dynamic Data Center

    Sponsored by: Hitachi Vantara

    The speed of change in global markets and the challenges of new modes of business demand companies operate in and react to quickly changing landscapes. Nowhere is this more critical than in the means and methods the enterprise uses to power its business, typically via IT services.

  • Transitioning to a Dynamic Data Center

    Sponsored by: Hitachi Vantara

    The speed of change in global markets and the challenges of new modes of business demand companies operate in and react to quickly changing landscapes. Nowhere is this more critical than in the means and methods the enterprise uses to power its business, typically via IT services.

  • FISMA Compliance: A Holistic Approach to FISMA and Information Security

    Sponsored by: IBM

    IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates.

  • IBM Point of View: Security and Cloud Computing

    Sponsored by: IBM

    Cloud Computing is easy to deploy, flexible and cost-effective.  As federal agencies continue to outsource data management and operations to third-party cloud providers, their ability to ensure data integrity and privacy is becoming a potential security risk. Read this white paper to learn how you can manage Cloud Computing safely and efficiently.

  • Strengthening Governance, Risk, and Compliance in the Banking Industry

    Sponsored by: SAP America, Inc.

    Learn the reasons why a holistic view of risk in your company is essential in times of financial turbulence - and how many companies are adding value through governance, risk, and compliance (GRC) initiatives. Read this report to learn more. (Economist Intelligence Unit, 2009)

  • IBM Information On Demand Virtual 2010

    Sponsored by: IBM

    Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals.

  • Revamping and optimizing your SAP GRC strategy

    Sponsored by: Security Weaver

    GRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy.

  • SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation

    Sponsored by: BWise

    This E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization.

  • EMC SourceOne for Microsoft SharePoint

    Sponsored by: EMC Corporation

    Learn about EMC SourceOne for Microsoft SharePoint, which enhances an organization’s use of SharePoint, improves content control and governance, and connects end users to the broader information environment and processes without impacting their day-to-day activities.

  • Risk Management: Protect and Maximize Stakeholder Value

    Sponsored by: Oracle Corporation UK Ltd

    This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.

  • Risk Management: Protect and Maximize Stakeholder Value

    Sponsored by: Oracle Corporation

    This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.

  • Delivering Enterprise Value with Oracle Governance, Risk & Compliance

    Sponsored by: Oracle Corporation

    In this whitepaper, Corporate Integrity’s Michael Rasmussen, Risk & Compliance Lecturer, Writer, and Advisor, analyzes how Oracle, as a GRC solutions provider, delivers economic value to its clients.

  • Solutions Brief: Oracle Solutions for Governance, Risk and Compliance

    Sponsored by: Oracle Corporation

    Read this white paper to learn about Oracle’s comprehensive GRC platform and how leading enterprises are turning to Oracle’s new platform to meet the demands of increasingly challenging regulatory mandates while continuing to innovate and grow their business.

  • E-Book: Red Flag Rules Compliance

    Sponsored by: Gemalto

    SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims.

  • Presentation Transcript: Application Development-- Improving Productivity Among Evolving Application Platforms

    Sponsored by: ASG Software Solutions

    Join special guest Jeffrey S. Hammond, Principal Analyst at Forrester Research, Inc., and Ian Rowlands from ASG, as they discuss some of the options shops have at their disposal for improving consistency and cross platform governance of your application development efforts.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.