How to Select the Right GRC Solution for Your Organization

Moderator: Brandon Dunlap. Panel: Chris McClean, Forrester; Ben Tomhave, LockPath; Jean-Marie Zirano, MEGA
Governance, risk management and compliance (GRC) processes are extensive; they are how an organization is directed and managed to achieve goals, considering risks to achievement, and complying with applicable laws and regulations.

Issues around information have become central to organizational strategies and GRC software is needed in organizations, and investment in these areas has been increasing. The GRC software space is vast with over 400 GRC software providers that span multiple categories and sub-categories of GRC related software.

Implementing a solution can be a lengthy and costly exercise, so it is imperative to choose carefully from the large number of options in the market. The issue is sifting through all the vendors with their offerings to find the one that best fits your organization. Buyers should have a clear understanding of their organizations functionality requirements, and a strategy in place for selecting the right partner. Join this webcast, and learn how to choose the right GRC solution for your organization as our experts discuss:

- How to understand your organizations functionality needs.
- Guidance for selecting the right partner including examples of good RFP questions.
- How to sift through the different solutions and make weighted assessments against solution criteria.
- Core maintenance and ongoing feeding requirements.
May 17 2012
61 mins
How to Select the Right GRC Solution for Your Organization
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

  • Live and recorded (3284)
  • Upcoming (70)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
  • A New IT Approach to GRC for Business Innovation Apr 15 2015 5:00 pm UTC 60 mins
    The burden of the existing day-to-day IT workload has never been greater and continues to grow. The recent financial scandals and high profile data breaches have raised scrutiny to unprecedented levels. This scrutiny, together with new legislative changes, has resulted in an array of new compliance measures and related challenges, which have led to a melting pot of complexity that has seen organizations increase spend simply to 'keep the IT maintenance lights on'.

    Due to consumer demand, leaders are having to look hard at their IT strategy and ways to reduce expenditure so they can invest in innovation to future-proof the business. Many banks are considering whether a complete IT infrastructure overhaul would prove more beneficial as spending on basic maintenance and compliance does little to move the business forward, yet it consumes the vast majority of IT budget. Not complying is not an option, and reducing IT spend on compliance is difficult as associated projects have become high priority 'must haves' and budget 'must spends'. If organizations fail to adapt their approach it will remain impossible for IT departments to service the needs of the compliance office and still satisfy the business innovation agenda.

    Attend this webinar to learn more about:

    - Driving efficiencies to reduce the cost of compliance
    - Using compliance to enabling teams to focus their efforts more effectively
    - Automating business process to get ahead of compliance
    - Raising your organization's overall data privacy, compliance, and security profile
  • Understanding EMV, End-to-end encryption, and Tokenization. Mar 19 2015 5:00 pm UTC 60 mins
    Data breaches are a widespread problem with over 1.1 billion records compromised in the last 10 years. According to the Verizon 2014 Data Breach Investigations Report, the vast majority of breaches occurred against small to mid-sized companies.

    As a result many retailers are focused on bolstering payment security and reducing fraud by implementing solutions such us EMV, End-to-end encryption (E2EE), and Tokenization. These solutions can work in tandem to protect merchants, and enable them to exceed regulatory requirements by securing card data across all payment environments.

    In this session our experts will present and define the three technologies, address the drivers that are leading the United States to implement EMV, and explain the complementary role of Tokenization with respect to EMV and End-to-end encryption.
  • Preparing for PCI DSS 3.0 and VISA Mandates Recorded: Feb 19 2015 61 mins
    * On this webcast we're giving away a pass ($2,490 value) to our partner event: The 3rd Annual Stress Testing USA Congress being held in NYC on March 18-19, 2015. All attendees will be included in the draw.

    The clock is ticking for enterprises that have not yet upgraded their payment card processing systems to be compliant with Payment Card Industry Data Security Standard (PCI DSS) 3.0. Since Jan. 1, 2015 , there is increasing urgency to not only understand the most important changes in PCI DSS 3.0, but also to be ready for a rigorous QSA assessment against those changes. Since PCI 3.0 is bigger, harder and more expensive than the previous iteration, merchants have their work cut out for them.

    PCI DSS founding member, Visa Inc. recently changed its policy on compliance assessments for the PCI DSS. More specifically, Visa decided that merchants who meet a stringent set of criteria including processing 75% of transactions using "Chip and PIN" enabled terminals, may be able to apply for an exemption from PCI DSS assessment requirements. Unfortunately, not all merchants are aware of the change, and fewer understand what it means.

    In this special presentation, our expert panel will explain the changes and their implications, and offer a detailed review of PCI DSS 3.0 to help enterprises prepare for assessments and make PCI compliance a whole lot easier.
  • Top Guidelines for Hadoop Security and Governance in 2015 Recorded: Jan 21 2015 61 mins
    In 2015 the size of the digital universe will be tenfold what it was in 2010. Large-scale data breaches are on the rise across all sectors, and enterprise data security initiatives must evolve to address new and growing threats. Consumer transactions, personally identifiable information, customer records, and the like, all flowing together into the Hadoop ‘data lake’, will enable critical business insights but also means Hadoop installations will be a rich target for cyber-crime.

    Organizations are now faced with more stringent and expanding regulations, and must implement better governance, more effective risk management policies, and smarter data management approaches to enable them to do a much better job of controlling their business through the information explosion. As companies look at GRC technology, they should assess the capability of these solutions to deliver continuous monitoring of controls, key risk and security indicators, policies, and ensure they are natively integrated with critical business systems.

    We invite you to attend this round-table webinar as our panel of experts will discuss top guidelines for Hadoop security and governance in 2015, and provide guidance for assessing new technology solutions to ensure they will achieve your objectives.
  • Top Security Guidelines for EMV and Mobile Payments in 2015 Recorded: Dec 4 2014 69 mins
    More than 100 million Americans have lost personal information in a data breach over the last year, and identity theft is the fastest growing crime in the US. As a result, President Obama has launched a government initiative to support the US migration to EMV and improve information sharing on cyberfraud threats, and nearly half of US merchant terminals are expected to accept EMV cards by the end of next year.

    As of October 1 of 2015, merchants and acquirers—not card issuers—will bear the financial burden resulting from fraudulent use of counterfeit, lost and stolen cards. It's a risk that's only mitigated by demonstration and documentation of EMV compliance. Beyond the liability shift, EMV holds promise as an enabler of secure mobile and e-commerce payments, with attractive PCI (Payment Card Industry) Security Standards-related benefits for merchants. Those who implement EMV contact- and contactless-enabled POS devices may be excused from PCI audits and the costs associated with them, creating further incentive to adopt EMV.

    In this webinar, we'll discuss the details behind the migration to EMV, how the technology works, and some top security guidelines for EMV and Mobile Payments in 2015.
  • Don't Be the Next Headline: Data Security Best Practices for 2015 and Beyond Recorded: Nov 4 2014 65 mins
    Albert Einstein once observed: "Technological progress is like an axe in the hands of a pathological criminal." His words were eerily prophetic of the continuous news of data breaches in the retail and banking sectors.

    Data breaches can be financially catastrophic as they drive costs to repair the damage, costs to secure their systems, costs to repay the consumers, losses in profits, losses in consumer confidence, and lawsuits seeking damages for alleged negligence. Intense media and Congressional scrutiny have classified all data breaches as direct attacks on privacy, and any company that has possession of personal identification information should consider itself in possession of potentially explosive material.

    Although the headline-making breaches are highly sophisticated, most attacks simply exploit lax security practices. In fact, Verizon's 2014 Data Breach Investigations Report found that 78 percent of the attacks were of very low or low difficulty. That means that in more than three-quarters of all breaches, attackers used basic methods that required few resources and no software customization. That's the bad news. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices with proven technologies.

    Join our panel of experts as they discuss how to implement data security best practices, and how to prepare your experts with a crisis response plan to avoid being another headline.
  • Evolution of Encrypting Ransomware Recorded: Oct 23 2014 48 mins
    Encrypting ransomware is a key term in the title as just ransomware is broad and can include threats that are very different, easy to detect, and don't encrypt files at infection - the key differentiation point that gives these threats the upper hand against AV.

    The presentation is going to be on all the encrypting ransomwares we've seen thus far. It will cover in-depth features of each one and how malware authors made improvements as time went on. There is quite a few so it will be a full presentations worth (cryptolocker, dir-crypt, cryptowall, cryptodefense, zero-locker, critroni, synolocker, cryptographic locker). I'll show from start to finish of an infection and what a user will experience and will highlight social engineering tactics along with the methods of payment circumventing money mules.
  • Securing Hadoop – the Data-Centric Approach Recorded: Oct 1 2014 62 mins
    If you’re embarking on Hadoop adoption you know that sensitive customer and corporate data will be in the ecosystem – transactional data, intellectual property, customer files, and more. As Adrian Lane of Securosis has noted, “High quality data produces better analysis results—which is why a key ingredient is sensitive data.” Now the question becomes how to keep sensitive data secure as it moves into and beyond Hadoop, and—most importantly—how to protect the data but still make it accessible by many different users with varying analytic needs and ad-hoc processes.

    Join us for an insightful discussion on data-centric security approaches for multi-platform enterprise environments, including Hadoop. Learn about techniques such as format-preserving encryption, tokenization, storage-level encryption, and data masking.

    RSVP Now if you need to understand how to enable analytics and insights without security risk, and how to neutralize data breaches through data-centric technologies that can integrate with Hive, Sqoop, MapReduce and other Hadoop specific interfaces.
  • The Case for Building Your Own Secure, Compliant Cloud Recorded: Sep 24 2014 61 mins
    *On this webcast we're giving away a pass to our partner event: Governance, Risk and Compliance for Financial Services on October 22-23*

    What is driving expansion to the cloud? In most cases, it’s cost. But for many enterprise IT organizations, it is about agility, efficiency, and productivity.

    The research firm, 451 Group says, “Cloud is a way of using technology, not a technology in itself,” and, in many cases, IT organizations have chartered new courses on their own to reach the same value as the hyper-scale cloud solution providers. Although, as with any DIY solution, comes caveat emptor. As any do-it-yourselfer will attest, at some point you must make adjustments, fixes, and, in some cases, scrap it and build it all over again. This is the nature of DIY. However, in today’s competitive marketplace, time and resources are limited, and for IT to be more agile, efficient, and productive, DIY may not be the best course of action moving forward.

    In this webinar, we will look at the trends of cloud and how building a secure, compliant cloud based on validated and converged infrastructures will be the way IT expands its way beyond the data center, into the cloud.
  • Panel Discussion: Why EMV is Not the Only Answer to Payment Security Recorded: Sep 16 2014 77 mins
    *On this webcast we're giving away a pass to our partner event: Governance, Risk and Compliance for Financial Services on October 22-23*

    2013 was the worst year yet in terms of data breaches, with over 740 million records exposed, and 2014 is shaping up to be more of the same. Security analysts estimate the costs of the data breach that hit U.S. retailer Target are approaching half a billion dollars for the company. The total cost of the breach including losses incurred by banks, consumers and others–could easily reach into the billions of dollars, and the incidents continue.

    With the Target incident seen as a watershed many financial institutions are planning to begin issuing EMV cards in the next two years, although many are still hesitant to commit to EMV because of uncertainty around retailer adoption of chip card point-of-sale terminals, questions about the viability of the business case for migrating from magnetic stripe cards to chip cards, as well as unresolved issues related to regulation and support for merchant routing choice. Meanwhile, the official release of PCI DSS v3.0 is here, delivering a fresh set of regulatory concerns for retailers.

    Clearly, traditional IT defenses are no longer working. But you can take control. Join us as we discuss key lessons learned from the recent breaches, and the latest developments in payment security.
  • Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection Recorded: Aug 20 2014 63 mins
    With the emergence of big data healthcare analytics, electronic health information exchange, clinical data warehousing, and other technologies for optimizing patient care, the healthcare industry has never been more reliant on electronic data and the strict requirements associated with the data. The advances in business processes, technology and regulations require that data security initiatives evolve to address new and growing threats. Coincidentally, in a recent survey, 69% of organizations felt that provisions of the Affordable Care Act (ACA) have the effect of increasing or significantly increasing risks to patient privacy and security.

    Chasing compliance is an expensive proposition that doesn’t adequately address the current security threats and vulnerabilities. Organizations that simply want to comply with the regulations are already at risk. A more effective program is risk-based -- one where incremental changes to controls can be made in real-time to more effectively combat current threats to your security program. Join us for this webinar where you’ll learn:

    - Why compliance is an outcome of an effective data protection program.
    - Risk assessment, analysis and management – what’s the difference and why you need them.
    - What is considered ‘reasonable’?
    - What leading healthcare organizations are doing today to protect data, with a focus on securing Big Data for healthcare analytics?
    - How data protection can help without getting in the way of patient care.
    - How do you protect from your healthcare organization public loss of confidence?
  • EMV & Payment Security: Evolving Beyond the Mag Stripe Recorded: Jul 15 2014 61 mins
    * On this webcast we're giving away a guest pass to 'Data Analytics for Manufacturing' in Chicago on August 18-19.

    Everything changed six months ago. The Target data breach caused us all to rethink payment security. The U.S. transition to EMV chip and pin cards, is around the corner. Tune into this webinar for a complete update on where EMV is today – lessons learned from Europe and Canada’s experience of EMV adoption, and the latest about the liability shift in the U.S. How and when will EMV be augmented by new approaches to card data in mobile wallets, online, and at the point of sale? Learn what you need to know about tokenization and the latest developments which are sure to impact your payment security and payment processing. Find out how you can build in flexibility during this time of transition and rapid evolution in technologies.

    Join us to find out what this evolution in payment architectures means for your business–with no single payment architecture in place any time soon.
  • Data Is the Heart of Your Organization. Keep It Safe in the Cloud Recorded: May 29 2014 76 mins
    * On this webcast we're giving away a non-transferable guest pass to to 'Data Analytics for Financial Services' in Boston on July 22-23.

    The state of business continuity and disaster recovery planning is dismal in most organizations and nonexistent in many. Most plans in place simply don't work. This is not surprising since disaster recovery hasn't been a priority among CIOs, until now, as cloud for disaster recovery is now a viable and more cost-effective option for organizations.

    One of the key activities of business continuity (BC) management is measuring the performance of the program. Good governance presumes analysis of ongoing business processes to ensure they are fulfilling company objectives. In most business continuity management activities, a management review and assessment process should be performed, and the use of metrics for measuring BC performance will provide tangible and auditable evidence that your program is performing up to expectations.

    Join us and learn how to prepare for security threats such as Heartbleed by developing a metric-driven BCM program that can be implemented in the cloud, and learn how to present your plan from a business perspective that your managers will understand and support.
  • Rethinking Email Security: Best Practices to Protect Private Communications Recorded: May 6 2014 61 mins
    *On this webcast we're giving away a pass to our partner event: Governance, Risk and Compliance for Financial Services on June 24-26*

    2014 has been called "The Year of Encryption." The recent data breaches, personal identity theft cases, email snooping concerns, and a serious, far-reaching software vulnerability (i.e., Heartbleed) have put a spotlight on the importance of protecting sensitive data, both inside and outside the enterprise. Email is invaluable to enterprises. It's the easiest mode of communication which also makes it an easy target for data theft.

    As email users communicate sensitive data, often in the form of credit card numbers, social security numbers, phone numbers, personal financial data, and personal health information, it is sent and resent to multiple users and locations. Sometimes this data is secure, but all too often, it is not. This impacts companies of all sizes where email security vulnerabilities are both internal and external to the enterprise.
    The need to protect private information being communicated by email between customers, prospects, patients, loan applicants, and clients is now the norm. Unfortunately, many enterprise email solutions are several years old and using outdated and ineffective security technology.

    This session will explore the key concepts and best practices to protect and maintain private email communications and why you need to rethink your email security. Hear from two email security experts and learn:

    - Best practices for securing sensitive email communications.
    - When is the right time to replace your legacy email security.
    - How to protect sensitive email information as it flows to and from the enterprise.
    - Latest insights on Identity-Based Encryption and Stateless Key Management.
    - How other enterprises deploy the world’s most popular email security solution.
    - How end-to-end Identity-Based Encryption (IBE) helps protect email in the event of a vulnerability being exploited.
  • The New Data De-identification: Enabling Business Agility while Protecting Data Recorded: Apr 23 2014 63 mins
    *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • Lessons Learned From the Target Data Breach Recorded: Mar 18 2014 60 mins
    *On this webcast we're giving away a non-transferable guest pass to the IQPC 2nd Annual Cyber Security for Oil and Gas Summit, being held in Houston, Texas between June 16 - 18, 2014.

    In December 2013, US retailer Target suffered a high profile data breach at the hands of a cybercriminal group, who infected its point-of-sale (PoS) terminals with malware to steal the details of around 110 million customers. Marcus Group's systems were also compromised recently and crooks made off with customer card details, while several other merchants are reported to be preparing to go public with their own breaches.

    Data breaches are nothing new and have been around for quite some time; however, we are seeing a significant increase in incidents and 2013 was the worst year in terms of data breaches recorded to date. According to the Online Trust Alliance over 740 million records were exposed in 2013, and they determined that 89% of all breach incidents were avoidable had basic security controls and best practices been enforced. Join us as we discuss some key lessons learned from the recent breaches and:

    - Discuss how malware aimed at retailers is evolving on a daily basis
    - Analyze the tools and methodology employed hackers to bypass security
    - Address steps retailers and banking institutions should take to secure their networks
    - Provide procedural and technical steps for securing third party code
    - Discuss how to develop an effective Data Incident (DIP) Plan, including a communication strategy
Empowering the GRC Community
The IT GRC Forum produces online events and provides professional networking facilities and market intelligence to Governance, Risk Management and Compliance professionals.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Select the Right GRC Solution for Your Organization
  • Live at: May 17 2012 6:00 pm
  • Presented by: Moderator: Brandon Dunlap. Panel: Chris McClean, Forrester; Ben Tomhave, LockPath; Jean-Marie Zirano, MEGA
  • From:
Your email has been sent.
or close
You must be logged in to email this