Compliance
  Governance
  Risk-Management
  Security
  Webinars
ON DEMAND
IMA Internal Controls Series: Risk Assessment

workiva.gif

This IMA webinar, sponsored by Workiva, focuses on risk assessment—conceptualizing how it fits into an organization, discussing risk appetite, and understanding implementation factors associated with risk management. 

read more >


  Editor's Bookshelf
Inside CEO Succession: The Essential Guide to Leadership Transition

Inside_CEO_Succession_bookcover170w.jpg

As the demands from stakeholders for consummate leadership and good governance from a company's board of directors, its CEO, and its executive team increase, how the process of CEO succession is carried out has become more critical than ever before.

read more >

  More Bookshelf > >  

Rapid7 Launches Global Strategic Services Practice Rapid7_Percoco1.jpg
Nicholas Percoco
Vice President of Strategic Services
Rapid7


Rapid7, a leading provider of security analytics software and services, has announced the launch of a new Global Strategic Services Practice to help security executives and teams dramatically improve their ability to solve the cyber security challenges they face today and in the future.

read more >

  News
 > Industry’s First SaaS Agentless Endpoint Threat Detection
 > Is Internal Audit Ready to Step Up?
 > Vishing Module Takes a Bite Out of Automated Attacks
 > Multi-factor Authentication File Transfer Partnership
 > Intellinx Launches Healthcare Solution
 > User-Centric Solution Enables Rapid Response to Breaches
 > McAfee Announces SaaS Solution for Amazon Web Services
 > Cyberattacks Target 93% of Financial Services Firms
 > Unified Threat Management Technology for SMB
 > Now Is the Time for Secure DNS
  More News > >  
  Features
 > Completing the Journey: Women as Directors of Public Companies
 > The Home Depot Hack
 > The Unpaid Summer Intern that Could Cost You Millions
 > Open Source Software and the Call to Re-Assess Secure Shell Key Management
 > Military Level Security for Banks
 > No More Patch Tuesday for Windows XP – Are You Secure?
 > Detect and Respond
 > Hackers Defeat Conventional Authentication
 > Assume the Worst – Hackers Will Get In
 > Rights Structure as a Living Entity
  More Features > >  

Time for Grown-Ups To Run IT Security
Philip Lieberman
President
Lieberman Software

The latest repeats of the massive data breaches seen at Target and other major retailers should be proof that existing “detect-and-respond“ perimeter security solutions are utterly ineffective.

read more >

  People in the News
Dolinar to Chair AICPA Committee
Horwath_Dolinar2.jpg
Jim Dolinar
Managing Partner, Assurance Professional Practice
Crowe Horwath
The American Institute of CPAs (AICPA) has named Jim Dolinar, CPA chairman of the Financial Reporting Executive Committee (FinREC).

read more >

  More People in the News > >  
  Roundtable

The need to track the actions of users inside a company has greatly increased the amount of data that entities must collect to ensure a complete view of all activity.

read more >


Jim Pflaging
President and CEO
SenSage
  More Roundtables > >  



  Solutions
Scalable E-Discovery Through The Cloud

ZL Technologies, the leader in archiving, records management, and e-discovery software for large enterprises, has expanded its flagship product Unified Archive (UA) as a software-as-a-service solution (SaaS) through a close partnership with SunGard Availability Services.

read more >

  More Solutions > >  

  Success Story
HID Global Provides Secure Mobile Banking Solution

HID_Radstaak1.jpg

To address the growing, sophisticated needs of banking customers for “anytime, anywhere” access throughout the country, Hypo Alpe-Adria-Bank was seeking an integrated, authentication platform that could secure its internet and mobile banking.

read more >

  More Success Stories >  >  

About Us Editorial Advertise

© 2014 Simplex Knowledge Company. All Rights Reserved.   |   TERMS OF USE  |   PRIVACY POLICY