IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

EMV and Payment Security

Coming Up!               Learn why EMV is not the only answer to Payment Security on…

Click on the slide!

Building a Secure, Compliant Cloud.

Coming Up!               Learn best practices with us on Sept. 24th!

Click on the slide!

Are You Securing Hadoop?

Coming Up!               Learn about Securing Hadoop by adopting a Data-Centric Approach.

Click on the slide!

Risk-Based ePHI Security Planning

On-Demand               Compliance does not equal security! View now on-demand!

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
E-mail

Live Panel Discussion!Panel: Why EMV is Not the Only Answer to Payment Security

When:   September 16 | 2014     Attend

2013 was the worst year yet in terms of data breaches, with over 740 million records exposed, and 2014 is shaping up to be more of the same. Security analysts estimate the costs of the data breach that hit U.S. retailer Target are approaching half a billion dollars for the company. The total cost of the breach including losses incurred by banks, consumers and others–could easily reach into the billions of dollars, and the incidents continue in the food industry, state government, and other sectors.

Read more...
 
E-mail

Live Webcast!The Case for Building Your Own Secure, Compliant Cloud

When:   September 24 | 2014     Attend

What is driving expansion to the cloud? In most cases, it's cost. But for many enterprise IT organizations, it is about agility, efficiency, and productivity.

Read more...
 
E-mail

Live Webcast!Securing Hadoop – the Data-Centric Approach

When:   October 1 | 2014     Attend

If you're embarking on Hadoop adoption you know that sensitive customer and corporate data will be in the ecosystem – transactional data, intellectual property, customer files, and more. As Adrian Lane of Securosis has noted, "High quality data produces better analysis results—which is why a key ingredient is sensitive data." Now the question becomes how to keep sensitive data secure as it moves into and beyond Hadoop, and—most importantly—how to protect the data but still make it accessible by many different users with varying analytic needs and ad-hoc processes.

Read more...
 
E-mail

Live WebcastDon't Be Another Target: Data Security Best Practices for 2015 and Beyond

When: November 4 | 2014     Attend

Albert Einstein once observed: "Technological progress is like an axe in the hands of a pathological criminal." His words were eerily prophetic after the recent spree of data breaches in the retail sector.

Read more...
 
E-mail

Live WebcastCompliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection

Recorded:   August 20 | 2014      Play

With the emergence of big data healthcare analytics, electronic health information exchange, clinical data warehousing, and other technologies for optimizing patient care, the healthcare industry has never been more reliant on electronic data and the strict requirements associated with the data. The advances in business processes, technology and regulations require that data security initiatives evolve to address new and growing threats. Coincidentally, in a recent survey, 69% of organizations felt that provisions of the Affordable Care Act (ACA) have the effect of increasing or significantly increasing risks to patient privacy and security.

Read more...
 
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  Next 
  •  End 
  • »
Page 1 of 8
.

 

.Visionaries


.
Steve Durbin Steve Durbin Steve Durbin is Vice President of the Information Security Forum (ISF). His main areas of focus include the emerging security threat landscape, Cyber security, BYOD, Big data, Cloud security and Social media across both the corporate and personal environments. He is a regular speaker and chair at global events and is o...
 
Ed Ferrara Ed Ferrara Ed Ferrara is Principal Analyst for Security and Risk at Forrester Research. He contributes to Forrester's offerings for the Security & Risk Professional, leading the company's coverage of security metrics, security program effectiveness, security awareness, and enterprise security information architecture. Ed's re...
 
mdiamond Mark Diamond Mark Diamond is the President and CEO, Contoural, Inc. He is one of the industry thought leaders in email archiving, litigation readiness, compliance, data protection and ILM strategies and practices. As CEO of Contoural, his company helps numerous Fortune 500 companies develop and execute email and document reten...
 

More. . .