The world's premier online risk forum for professionals and service providers

A message to all members of GlobalRisk community

Dear GlobalRisk Community member,
Each week we review various resources from our sponsors. These free, highly informative, and non-commercial corporate research documents are written by top executives of large corporations.

This week we are presenting you these three important “topics”: (1) IT Security, (2) IT Strategy and Governance, (3) Risk, Accounting and General News.  The main sponsors of this issue are IBM, Intacct, Bloomberg, Oracle.

Remember, you only have to enter your information ONCE... after that, just enter your email address and you can download as many as you want. Since some have limited availability, we recommend you download the ones you are interested in immediately.


THE OVERVIEW OF THE TOP RESOURCES:

RISK, ACCOUNTING AND GENERAL NEWS:
1. See the Big Picture Through Bloomberg Government: http://bit.ly/BloombergGovernment.
2. Eight Rules For Investing in a New Accounting Systemhttp://bit.ly/AccountingSoftwareAnalysis
3. Restoring Trustability to Financial Serviceshttp://bit.ly/RestoringTrustInfor
4. Data Quality for BASEL II: http://bit.ly/BaselDataQuality
IT SECURITY:
5. Securing Your Applications - Start Now: http://bit.ly/SecureYourApplications
6. Protect Your Business from the Coming Malware Storm: http://bit.ly/MalwareStormProtection
7. Secure / Managed File Transfer:http://bit.ly/SecuredFileTransfer
8. High Availability and DR Using App. Grid Technology:http://bit.ly/HighAvailability
9. A single, secure solution for document-sharing, web meetings, social business and more:
10. Top Eight Identity & Access Management Challenges with SaaS Applications:
11. Justifying IT Security: Managing Risk & Keeping Your Network Secure:
12. How to Protect Your Small or Midsized Business w/Proven, Simple, & Affordable VMware Virtualization: http://bit.ly/VMwareVirtual
IT STRATEGY AND GOVERNANCE:
13. Optimizing Your IT Strategy for Risk Management: http://bit.ly/ITSecurityDell
14. Financial Strategy in a Cloud Era - How to Achieve Returns Without Losing Control:
15. Modernizing Application Platforms for Cost-Effective Cloud Readiness: IDC Report:
16. IT 3.0 Manifesto - Finally, IT for the People:
17. Global Records Compliance: What You Need to Know:
18. Business in the Cloud: Will Your Internet Connectivity Provide a Positive ROI?:
19. Conquering Compliance Complexity with the Cloud:
__________________________________________________________________________________________
DETAILED DESCRIPTION: 
RISK, ACCOUNTING AND GENERAL NEWS:
RESOURCE 1. See the Big Picture Through Bloomberg Government.

The Obama Administration has stepped up the government's role in rulemaking and enforcement. Some businesses couldn't be happier. Below are some topics in the recent issues of BGov. 

MAKING THE MOST OF DODD-FRANK
THE REGULATOR: WHY BUSINESS LOVES RULES (REALLY)
THE COST OF MEASURING GREENHOUSE GASES
TIGHTER RULES FOR MILITARY MAINTENANCE
TAX PREPARERS BRACE FOR A SHAKEOUT
Be the first to receive a FREE copy of Bloomberg Government Insider when you sign up and request a demo today.
http://bit.ly/BloombergGovernment
2. Charting a Better Course For Your Business: Eight Rules For Investing in a New Accounting System
A good financial and accounting system should propel your business forward. It should give you the specific insights you need to spot the storms ahead, help you maximize resources with streamlined processes, and be nimble enough to help you navigate the changing currents of today's business environment. Download this white paper to make sure you have the facts straight about what to look for-and what to look out for.
Evaluating new accounting systems can be a complex and challenging project.
Ensure you make the right decision for your company by getting expert advice from one of CPA Technology Advisor's Top 25 Thought Leaders in Public Accounting, Geni Whitehouse, as she outlines the eight rules for investing in a new accounting system.
Download the "Eight rules for investing in a new accounting system" whitepaper and discover how to: 
Choose the right environment for a faster close with strong audit and control capabilities
Support sophisticated reporting requirements for a diverse set of stakeholders
Easily comply with regulatory requirements by complying with GAAP and IFRS accounting standards
Build the right foundation for growth that includes multiple entities and currencies
http://bit.ly/AccountingSoftwareAnalysis
3. Restoring Trustability to Financial Services
How banks and other financial firms can rebuild and measure the trust they've established with customers.
Building trust takes time. And when trust has been damaged, whether by real or perceived actions, companies must work harder and smarter to ensure they are taking every possible action to continually enhance the customer's trust. In this 1to1 Executive Dialogue, Don Peppers, Founding Partner at Peppers & Rogers Group, and MJ Crabbe-Barberis, a CRM expert who has led strategies for Fortune 100 companies including JPMorgan Chase and Citibank, discuss trustability within the financial services sector.
http://bit.ly/RestoringTrustInfor
4. Data Quality for BASEL II
Today financial services institutions must meet the standards for data quality attestation by the FFEIC regulators of risk reporting. This paper discusses the platform and domain expertise needed to support the rigorous demands of commercial and retail risk reporting.
http://bit.ly/BaselDataQuality
__________________________________________________________________________________________
IT SECURITY:
5. Securing Your Applications - Start Now
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications. If your organization hasn't gotten started yet in the area of application security - in spite of the dynamic nature of the application security threat landscape, the size and diversity of your application software portfolio, and the significant financial impact of the average application security-related incident - do it because of the positive impact on your bottom line. This Analyst Insight reviews several practical steps you can take to start now.
http://bit.ly/SecureYourApplications
6. How to Protect Your Business from the Coming Malware Storm
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
The malware storm will force the cost and complexity of premise-based protection to levels sustainable only by national governments and multinational corporations. To keep from being overwhelmed, small and midsize businesses must move defenses outside their own walls, to stop malicious code before it reaches their gateways, servers, and data stores. This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
http://bit.ly/MalwareStormProtection
7. Secure / Managed File Transfer: Why You Should Be Looking More Closely Right Now
This Aberdeen Group research shows why you should be looking more closely right now at secure/managed file transfer solutions.
The increasing volume, variety and velocity of enterprise data is colliding with market trends in collaboration, consumerization and overall complexity of IT infrastructure to increase the value of secure and reliable mechanisms to transfer files from person to person, system to system, application to application or business to business. To balance enterprise policy and end-user productivity in this environment, Aberdeen's research shows why you should be looking more closely at secure / managed file transfer solutions.
http://bit.ly/SecuredFileTransfer
8. High Availability and Disaster Recovery Using Application Grid Technology
Many businesses are totally dependent on critical computer-based services for their operations. Yet only 50 percent of businesses have a plan for maintaining the availability of these computing services in the face of unplanned computer downtime.
Many businesses are totally dependent on critical computer-based services for their operations. Yet only 50 percent of businesses have a plan for maintaining the availability of these computing services in the face of unplanned computer downtime. This article shows how an application grid built on Oracle Fusion Middleware can not only prevent unplanned outages, but it can improve the overall performance of mission critical business applications. 
http://bit.ly/HighAvailability
9. A single, secure solution for document-sharing, web meetings, social business and more
Meet Jane. Jane works in IT and struggles with keeping documentation up-to-date, file sharing and versioning problems, and keeping internal business units from using unapproved, non-secure services for sharing company documents internally and externally and holding web meetings. 
She's ready to call it quits until John saves the day with an online collaboration solution from Central Desktop that can help her: 
Standardize tools and data with a single, secure solution that supports SSO
Organize and share information with IT staff, engineers, internal departments, vendors, contractors and clients
Create wiki-based knowledgebases
Manage global teams and projects
Leverage social capabilities for improved collaboration 
>>>Register to learn more
http://bit.ly/DocumentSharingSolution
10. Top Eight Identity & Access Management Challenges with SaaS Applications
This white paper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
http://bit.ly/IdentityChallenges
11. Justifying IT Security: Managing Risk & Keeping Your Network Secure
This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.
The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.
http://bit.ly/JustifyITSecurity
12. How to Protect Your Small or Midsized Business w/Proven, Simple, & Affordable VMware Virtualization
Download this white paper to learn more about how virtualization can keep your business running through many types of planned and unplanned IT outages
The cost of downtime and/or lost data can be devastating. For this reason, business continuity and disaster recovery (BC/DR) is becoming a critical mandate. Virtualization can keep your business running through many types of planned and unplanned IT outages. Download this white paper to learn more. 
http://bit.ly/VMwareVirtual
__________________________________________________________________________________________
13. Optimizing Your IT Strategy for Risk Management
The consequences of inadequate risk management range from significant revenue loss and lost market share to damage to your brand and business reputation. Read this whitepaper to find out more.
Business risk can come from within your organization or from the outside, even in the form of natural disasters and other unanticipated events. The consequences of inadequate risk management range from significant revenue loss and lost market share to damage to your brand and business reputation.
http://bit.ly/ITSecurityDell
 14. Financial Strategy in a Cloud Era - How to Achieve Returns Without Losing Control
Financial executives need to have a no-compromise approach to financial modeling and application choice, irrespective of where these applications are deployed.
In the cloud computing era, many organizations are driven to leverage SaaS for cost-saving reasons, but to implement solutions only offered by SaaS may limit application choices. In order to achieve profitability/ margin growth and cost reduction, financial executives must leverage solutions with the best features and functionalities that support their underlying business processes. This research report by the Aberdeen Group takes a look at how financial executives can have a no-compromise approach to financial modeling and applications choice - by adding, keeping or changing business applications - without losing control or increasing the risk of non-compliancy, irrespective of how or where their applications are deployed.
http://bit.ly/FinStrategy
15. Modernizing Application Platforms for Cost-Effective Cloud Readiness: IDC Report
With increasing complexity confronting business, application platform modernization is no longer an option. IDC presents a closer look at the structural changes required to successfully evolve to a cloud-ready application platform. This includes lightweight frameworks, support of container to house business logic, in-memory data management, queuing and messaging middleware, monitoring and application management. All provided by VMware® vFabricTM Cloud Application Platform. Learn how VMware vFabricTM delivers cost savings, agility, and responsiveness to meet modern application challenges.
http://bit.ly/ModernAppPlatform
16. IT 3.0 Manifesto - Finally, IT for the People
Read on to discover how modern IT organizations transform to achieve IT 3.0.
Enterprise IT is now fixed at the core of the business and remaining barriers between IT and the business are coming down quickly. IT is transforming now and we are witnesses, but who will be active participants and who will be passed by? Read on to discover how modern IT organizations transform to achieve IT 3.0.
http://bit.ly/ITManifesto
17. Global Records Compliance: What You Need to Know
This IDC White Paper discusses the impact of the critical records management, data retention, and data protection regulations across key geographies. It concludes with recommendations for developing global information governance best practices.
After the global economic and geopolitical turmoil of the past two and a half years, increased regulatory oversight will undoubtedly become the norm. Organizations therefore need to be cognizant of their obligations and execute plans to manage information consistent with the records management, data retention, and data protection requirements across the countries in which they operate. This IDC White Paper sponsored by HP + Intel discusses the impact of those regulations across key geographies and provides recommendations for developing global information governance best practices.
http://bit.ly/RecordsCompliance
18. Business in the Cloud: Will Your Internet Connectivity Provide a Positive ROI?
This white paper uncovers a simple Return on Investment (ROI) approach, enterprises can leverage to quantify the value of best-in-class connectivity.
Availability and speed are critical performance metrics for the connectivity services which underpin virtually every online application or service. Using a simple Return on Investment (ROI) approach, enterprises can quantify the value of best-in-class connectivity. What are the tangible financial drawbacks when you experience outages or latency? How do you measure your risk and then mitigate it? This paper addresses all the factors associated with being able to calculate your own ROI.  
The relative value of online performance options can be measured in dollars and cents by evaluating the impact on revenues, churn, site abandonment rates and customer retention of different connectivity options. Internap has established ROI as a tool to compare its connectivity solutions to that offered by alternative providers. By comparing the incremental revenue driven by an Internap connectivity solution, you will experience the benefits of a premium solution that ensures a greater economic return from an online application infrastructure.
http://bit.ly/BusinessInTheCloud
19. Conquering Compliance Complexity with the Cloud
Cloud-based archives offer the cost savings, ease of use, and scalability of the cloud coupled with best-of-breed security from a trusted provider for defensibly handling high-risk enterprise data. Download this whitepaper to find out more now!
Enterprise customers struggling with continued data growth are increasingly turning to cloud-based applications to avoid the cost and administrative burden of maintaining on-premises IT infrastructure. Growing litigation and compliance demands have only compounded data retention and retrieval problems, leading to new cloud-based archiving options that better manage costs while transferring risk and complexity. Cloud-based archives offer the cost savings, ease of use, and scalability of the cloud coupled with best-of-breed security from a trusted provider for defensibly handling high-risk enterprise data. 
This whitepaper deals with:
Trends in e-mail archiving;
The benefits of SaaS implementation & deployment;
Choosing the right solutions provider.
http://bit.ly/CloudTtrendsToday
_________________________________________________________________________________________

The complete list of the best free resources and executive insight from the best firms you can find via the link below.

http://globalriskcommunity.com/profiles/blogs/case-studies-whitepapers-and

As we in constant search for new resources for further discussions, we’d love your help determining topics for which you need resources – presentations, case studies, webinars, articles, etc. Therefore, our question is:

*** What are TOP topics for which you need resources? Please reply by posting your comments via the link below:

http://globalriskcommunity.com/profiles/blogs/case-studies-whitepapers-and

Colleague, does your company have a solid resource to contribute to our members? Please apply for our partner's exchange here: http://www.globalriskconsult.com/businesspartner.php

____________________________________________________________________________________________

Thank you for being here.

Boris Agranovich,

GlobalRisk Community, founder