Loading...
­

Heading to GRC2017? Don’t miss these sessions!

Heading to GRC2017? Don't miss these sessions! Our close collaboration with SAPinsider this year has made it possible to extend a special registration discount off the on-site registration price: Register now and save $300 by [...]

How Much Did the Verizon Breach Cost?

How Much Did the Verizon Breach Cost? As Verizon was in the process of closing the $4.83 billion deal to acquire Yahoo, news hit about the largest data breach ever. Rumors were swirling that Verizon [...]

Understand the Financial Exposure of Access Risks

Understand the Financial Exposure of Access Risks Managing the access that business users have to enterprise applications is a balancing act. Granting too much access leaves organizations exposed to higher risk, but granting too little [...]

Top 5 Cybersecurity Breaches in January

Top 5 Cybersecurity Breaches in January Despite all of the security steps companies are taking, hackers are still finding their way in to an organization’s crown jewel assets. Here are the top 5 breaches reported [...]

On-demand Webinar: How Leading CISOs Are Tackling 2017 – LTM Research Enterprise Cybersecurity Survey Results

On-demand Webinar: How Leading CISOs Are Tackling 2017 - LTM Research Enterprise Cybersecurity Survey Results Should you be more concerned about internal threats? How often are systems breached? Do you need to be more focused [...]

SAPInsider: Are Your Financial Controls Ready for SAP S/4HANA? Identify Financial Risk Before Implementation

SAPInsider: Are Your Financial Controls Ready for SAP S/4HANA? Identify Financial Risk Before Implementation As organizations are transforming their business with SAP S/4HANA, they’re reinventing business processes and eliminating redundancies to focus more on exceptions [...]

Uncover the Financial Exposure of Access Risks

Uncover the Financial Exposure of Access Risks It’s a balancing act managing everyone’s access to your enterprise applications. Too much access leaves your company exposed to higher risk. Too little access keeps your people from [...]

Upcoming Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions

Upcoming Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions Is your business application landscape changing due to acquisitions or adoption of best of breed software applications? Planning your move [...]

Protect Your Crown Jewel Assets with Cisco Identity Services Engine and Greenlight Security Risk Analytics Integration

Protect Your Crown Jewel Assets with Cisco Identity Services Engine and Greenlight Security Risk Analytics Integration With billions on the line, it is critical for you to know when your crown jewels are vulnerable. The [...]

Greenlight Technologies Adds New Customers in the Automotive, Financial Services, Life Sciences, IT Services, and Manufacturing Industries

Greenlight Technologies Adds New Customers in the Automotive, Financial Services, Life Sciences, IT Services, and Manufacturing Industries Continues Growth in Fourth Quarter Flemington, NJ (January 19, 2017) – Greenlight Technologies, a pioneering leader in risk [...]