IT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs

IT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs
IT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs

Click here to register

IT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs

This 10 minute webcast features Derek Brink, principle analyst for the security, risk and compliance practice at Aberdeen Group Research. His presentation features the highlights of a recent study which examines the practices of best in class companies in the area of governance, risk and compliance (GRC). You'll discover that despite the emphasis on GRC there are still many companies not able to achieve best in class results.

You'll be introduced to the Steps for Success in achieving GRC with practical suggestions for what you can do now to improve the visibility of IT security while reducing operating costs. Listen as Derek describes the benefits some companies have earned from making these simple investments in baseline technologies and processes.


Featured speaker:
Derek E. Brink, CISSP
Vice President and Research Fellow, IT Security and IT GRC
Aberdeen Group, a Harte-Hanks Company

Sponsored by 

Intellitactics offers right-sized security management solutions for every organization and budget. Intellitactics SAFE (easy to use appliances) and ISM (extensible security management software) automate logging, event management and incident response. Audit ready reporting, in depth visual analytics and alerting save time and money, automate compliance and strengthen security across the enterprise.  Read what customers say at www.intellitactics.com
close

Next Article in Vendor Webcasts

Sign up to our newsletters

More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...