Governance, Risk, Compliance (GRC) Research
-
The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD
Sponsored by: TechTarget SecurityDespite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.
-
Advances in Financial Disclosure and Risk Management
Sponsored by: IBMThis on-demand webcast investigates performance management and analytics tools that can help drive success in finance and risk management. Watch now to discover product updates, best practices, and more.
-
PCI DSS Simplified: What You Need to Know
Sponsored by: AT&T CybersecurityMaintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
-
Netwrix Auditor Enterprise Edition
Sponsored by: Netwrix CorporationWhen diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
-
Gamania Group tightens security to strengthen game development capability
Sponsored by: Hewlett Packard EnterpriseInside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
-
Creating a Mobile-Centric Organization
Sponsored by: Hewlett Packard EnterpriseDiscover an innovative approach to designing and deploying networks that can help you support a mobile workforce while lowering costs and cutting complexity.
-
Keep Cloud Compliant
Sponsored by: TechTarget SecurityAccess this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines.
-
Tackling the Data Security Challenge
Sponsored by: IBMIn this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
-
Information Governance for Business Value
Sponsored by: IBMIn this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.
-
Modern Retention Enablement
Sponsored by: IBMThis quick video explains why legal departments need the what, who, and where of records and information management (RIM) files.
-
Moving Beyond People Glue and Silos
Sponsored by: IBMThis quick video outlines why replacing this "people glue" strategy with reliable, repeatable systems and processes that break siloes and meet the needs of multiple users across the organization is critical to interlinking success and truly achieving information governance.
-
Strategies to Maintain PCI DSS Compliance
Sponsored by: GeoTrust, Inc.This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
-
Tips to Develop the Right Retention Schedule for your Organization
Sponsored by: TechTarget CIOCheck in with the experts at searchCompliance.com to learn how a solid records retention schedule can track and maintain relevant legal and regulatory data.
-
Where BCDR and GRC Come Together: A CIO's Guide
Sponsored by: EssextecIn this e-guide, our experts from SearchSecurity.com will help you establish better security with this IT disaster preparation and recovery guide for enterprise CIOs.
-
GRC Solutions from itelligence: Balance Risk And Opportunity With A Practical Approach to GRC
Sponsored by: itelligence, Inc.To keep pace in today's constantly evolving regulatory environment, you need a comprehensive governance, risk, and compliance (GRC) system. This brief white paper highlights how the right GRC strategy can help you standardize business process and increase control over compliance issues.
-
May Information Security Magazine
Sponsored by: TechTarget SecurityThis month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
-
PowerBroker Password Safe: Security, Compliance, Productivity
Sponsored by: BeyondTrust CorporationUncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
-
Build Your Identity And Access Management Strategy
Sponsored by: SymplifiedThis Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
-
CIO Handbook: The Risk Management Approach to Information Governance
Sponsored by: TechTarget SecurityThis handbook provides information governance-related risk management advice for organizations faced with managing and securing corporate data.
-
IT Handbook: Getting Over the Cloud Adoption Hurdle
Sponsored by: TechTarget Cloud ComputingThis expert resource will take you through the fears associated with the public cloud, offer a cloud security to-do list and provide a guide to available services and products.
-
APT Defense Mechanisms and Best Practices
Sponsored by: InfobloxUncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.
-
Secrets of Successful Self Service BI
Sponsored by: TechTarget Business AnalyticsIn today's fast-paced atmosphere, consumers want their information to be available instantly. View this white paper to learn more about how you can give business users easy-to-use BI tools and let them complete their own data anaylsis and reports. Find out how you can provide BI teams the use of self-service applications by reading this resource.
-
Continuous monitoring, remediation and CyberScope reporting
Sponsored by: IBMThis white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA).
-
Risk Management: Safeguarding Against a World of Threats
Sponsored by: HP Enterprise SecurityAccess this expert e-book to discover all the different components that make up a comprehensive risk management policy. Uncover the importance of accurate risk management metrics, why governance, risk, and compliance are a unified framework, 4 components your risk management strategy may be missing, and more.
-
E-Guide ECM and Information Governance
Sponsored by: OpenTextThis expert e-guide looks at the importance of governance in enterprise content management (ECM) initiatives and provides suggestions for structuring and managing a sound policy.