All
NORCONS
direct connect
Events
Transcripts
Poll Results
Not a Member? Learn More

17620 NOREX direct connect Users and Counting

Connecting directly with your peers has never been easier. This dynamic online community of project-oriented IT professionals connects your staff with similarly-tasked members. Initiate or join conversations of your choice as members post and share behind a secured log-in. Gaining actionable project insight and perspectives from multiple sources is your tactical edge.

Create New Topic

Do you need additional assistance? Please contact the NOREX Information Team.

01/19/18

SSN Policies/Procedures Related to Sharing Information in Education

Member interested in seeing social security number policies or policies related to how organizations share or don't share social security numbers. Organizations that work with … read more ›

2 Comments
Closed Topic
01/30/18

Risk Register Template

Do any members have a template for a Risk Register that they could share? … read more ›

1 Comments
Closed Topic
01/08/18

What percentage of endpoints have local admin rights?

A member in the manufacturing sector is asking what percent or count of endpoints have local admin rights? This can be for any reason, they … read more ›

3 Comments
Closed Topic
12/05/17

GDPR approved Incident Response Plan

Can anyone share examples of policies around a GDPR approved incident plan? … read more ›

2 Comments
Closed Topic
12/06/17

Publishing an App

Looking for information on the requirements to develop an application for publishing an app on iTunes or the Google Play Store? … read more ›

1 Comments
Closed Topic
12/15/17

Tools for Authoring Online Training

What tools are members using in authoring online training (Camtasia, Moodle etc.)? Need to be able to generate training videos, audio, visual, screen captures while … read more ›

1 Comments
Closed Topic
12/01/17

Requirement for multi-factor authentication for PCI DSS compliance

I am looking for information anyone can share (other than reading LONG regulation specs) about the January 2018 requirement for multi-factor authentication for Payment Card … read more ›

2 Comments
Closed Topic
10/23/17

Vendor Recommendations for Converting PDF's to Online Accessible Versions

I'm working on a project that involves posting 50-100 page PDFs online. Because our organization is committed to accessibility, we need those PDFs to be … read more ›

3 Comments
Closed Topic
10/30/17

SOX Internal Controls and Processes

Our organization is looking for SOX documentation regarding backups. We are looking to review what other companies have done as this will help us to … read more ›

2 Comments
Closed Topic
06/10/17

AHRQ Patient Safety Culture Survey

I am looking for members who have done the AHRQ Hospital and Clinics Survey. I would like to exchange ideas on how you have managed … read more ›

3 Comments
Closed Topic
06/08/17

Instant Messaging message retention

Does anyone have a requirement for IM retention and if so what product do you use? Is anyone familiar with Donoma StoneScribe? … read more ›

5 Comments
Closed Topic
09/07/16

PCI 3.2 Quality Assurance Manual

Hello everyone, I'm looking for a sample of a PCI 3.2 Quality Assurance Manual. Does anyone have one they can share? Thank you! … read more ›

1 Comments
Closed Topic
07/29/16

Third Party IT Security Auditors

We are looking for a third-party IT auditor. Can anyone tell me who they are using and answer the following questions: 1. What was your … read more ›

6 Comments
Closed Topic
07/01/16

Cyber Security Awareness Training

We are looking to replace SANS Securing the Human cyber-security training with a new product. We want a product that is 1) cloud based, 2) … read more ›

4 Comments
Closed Topic
05/16/17

Open Source Software Governance Process

We're looking for process examples for how to manage intake of Open Source software components and solutions into the Enterprise. Primarily focused on API and … read more ›

6 Comments
Closed Topic
04/27/16

Web Application Firewalls

We are looking at where/which web application firewall to deploy. This is to go in our DMZ in front of various web apps, and also … read more ›

1 Comments
Closed Topic
01/17/17

Freedom of Information (FOI) compliance tool

We are a provincial government entity seeking a tool to support freedom of information compliance. Vendor support is being discontinued for the current tool, CSDC … read more ›

1 Comments
Closed Topic
11/17/16

EMC centera / source one

looking for email archiving solutions to replace EMC centerra and sourceone. … read more ›

5 Comments
Closed Topic
09/21/16

Dell DDPE (Dell Data Protection Enterprise)

Hello, Has anyone rolled this encryption software out to an organization over 500+ seats? Can anyone please comment on the following topics: Pilot Solution Deployment … read more ›

2 Comments
Closed Topic
07/11/16

Software Enterprise Life Cycle Management

Has anyone had experience in planning lifecycles for enterprise solutions? We’re currently attempting to define and IT plan for managing the lifecycle of core software … read more ›

3 Comments
Closed Topic
12/14/16

Document Retention

We are looking for a consultant that specializes in helping mid size companies develop a document retention strategy and leading a project to clean up … read more ›

3 Comments
Closed Topic
11/23/16

Pen Test or Security Assessment recommendations?

Hello! We are looking to have an external (network) pen test done and possibly some other security assessments such as a physical pen test, internal … read more ›

4 Comments
Closed Topic
01/07/17

Business Associate Agreement samples for cloud hosts

Our safety & risk folks would like us to develop a business associate agreement (BAA) with any cloud vendor that we do business with that … read more ›

3 Comments
Closed Topic
03/23/17

Digital Asset Management (DAM)

Hello Norex Members, We are currently researching Digital Asset Management and would like to gather information from other organizations. If any Norex members are willing … read more ›

2 Comments
Closed Topic
03/05/17

BYOD security / IT risks

Does anyone have a list of risks associated with supporting BYOD w.r.t. Security, IT, Legal and Governance? Here is what I have so far. IT … read more ›

3 Comments
Closed Topic