it (32)

Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core - their databases. Many don't have a comprehensive database security strategy to defend against sophisticated attacks, track sensitive data, or even meet emerging regulatory requirements.

In addition, organizations tend to focus on detective controls rather than preventive measures when it comes to database security.

By contrast, Forrester finds that by implementing a c

Read more…

This white paper explores data loss from a contrarian point of view - exploring the top 7 shortcuts you can take to ensure that you lose your data. And since a fundamental responsibility of any information technology professional, as well as any C-level executive, is to ensure that the data upon which any company is created is protected - scrupulously following these shortcuts should also ensure that you lose not only your data but your job as well.

===> http://bit.ly/LosingData

 

Read more…

Cost cutting and better risk management remained high on the European financial services agenda at the recent World Economic Forum. Institutions worldwide are facing similar concerns, because of the ongoing instability in the current economic environment. Yet cost cutting initiatives and the move to further enhance risk management are often undertaken to the detriment of what customers today are looking for – innovation.

 

Regulation is intended to create transparency, but if not managed efficient

Read more…

Dear  GlobalRisk Community member/website visitor,
You recently downloaded a white paper from our website related to IT Security and cloud computing. Today we would like to offer you some great additional resources. 

1. Navigating the Enterprise Software Minefield - 10 Critical Factors to Ensure Success

This paper will first outline the challenges of ERP selection and implementation and then offer practical advice and critical success factors to make sure your ERP process is smooth and effective

Read more…

Providing a holistic overview on the widespread private use by employees and how many businesses embraced social media in their communications

Examining current social media compliance policies with case studies

Potential security risks, phishing scams, malware attacks,

Protection of (fair use of) intellectual property: The need to address the protection of intellectual property in policies and procedures of the proper business use of social media

Analysing the regulatory requirements on the use

Read more…

This book provides a practical set of detailed steps to implement an Information Governance program, as well as the associated automation.

IBM has assembled a comprehensive approach to Information Governance that delivers the industry's strongest portfolio of products, services, and best practices to address every organization's needs.

 

====> http://bit.ly/DataGovernanceEBook

 

Read more…

2011 Web Security Report

This security report examines Web behavior and the malware to which users are most frequently exposed. Analyzing Web requests from the Blue Coat WebPulse service, which weekly rates nearly three billion requests in real-time, this report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.

 

The 2011 Web-based threat landscape continues to become more sophisticated, utilizing a combination of techniques

Read more…

Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.

Gartner claims consumerisation of IT is the #1 technology trend today. The invasion of smartphones, tablets, consumer apps, and social media can’t be stopped or ignored. So use this technology—it’s to your advantage. "This is very much lik

Read more…
When people talk about security or risks in the cloud, they are usually talking about governance.  But cloud governance extends beyond security and into legal and regulatory procedures, transparency, service levels, indemnification and other issues.  Do you have an effective cloud governance plan?  This whitepaper guides you through best practices for ensuring your applications and data can safely move between clouds – whether they are private, public or hybrid.
http://bit.ly/ITCloudGovernance
Read more…

Recently organizations have been faced with the increasing threat of cyber attacks, whether from external hackers such as lulzsec or from internal attacks such as wikileaks.  Your customers' personally identifiable information, organization's intellectual property, and confidential files are all vulnerable to attack.

How prepared is your IT Risk Management? How vulnerable is your organization to a cyber-attack?  What would the consequences of a cyber-attack be on your organization? Your board nee

Read more…

26 January 2011

Paul Clarke from eFinancialCareers

Spending on risk management technology continues to be a priority for investment banks going into 2011. But, with salaries for IT professionals in this area already on the increase, firms are looking outside of the financial sector for expertise.

Yet more IT dollars will be gobbled up by risk management projects within investment banks this year, as they look to align their risk management with business strategy and investment operations. The up

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead