All
NORCONS
direct connect
Events
Transcripts
Poll Results
Not a Member? Learn More

17605 NOREX direct connect Users and Counting

Connecting directly with your peers has never been easier. This dynamic online community of project-oriented IT professionals connects your staff with similarly-tasked members. Initiate or join conversations of your choice as members post and share behind a secured log-in. Gaining actionable project insight and perspectives from multiple sources is your tactical edge.

Create New Topic

Do you need additional assistance? Please contact the NOREX Information Team.

06/19/18

Data Governance RFP

Looking for an RFP for Data Governance tools such as IBM Information Server Suite, Informatica Governance Suite, Collibra, etc. … read more ›

0 Comments
06/19/18

NERC CIP

Would like to chat with others dealing with NERC CIP. … read more ›

1 Comments
03/29/18

Assessing Cyber Insurance Coverage

A member is seeking resources and information to learn how to assess cyber insurance. What items or events should be covered, dollar limits, cost and … read more ›

3 Comments
04/11/18

In search of training for new information security staff

Spinning up a number of staff into information security team which have not yet had any formal training. What online resources would be good for … read more ›

5 Comments
06/14/18

What product do you use for hypervisor-level antivirus for server/PC endpoint VMs?

I'm shopping for a hypervisor-based antivirus product to run on the ESX hosts in our vCenter. Although we don't have many Hyper-V hosts, it would … read more ›

0 Comments
05/09/18

Active Shooter policies and procedures

My facilities team/EHS team approached me to aid them with identifying a technical solution for an active shooter situation. We have employees with cell phones … read more ›

12 Comments
04/13/18

SOX Compliance Question

When any User leaves our organization the following occurs: We disable their AD account If they are embedded in AD email group – they are … read more ›

1 Comments
06/13/18

Who has implemented ThreatMetrix or Iovation?

Looking to gain feedback/insight from members that have implemented and/or are using ThreatMetrix or Iovation. https://www.threatmetrix.com/ https://www.iovation.com/ read more ›

0 Comments
06/01/18

Issue Sending Batch Emails Using Microsoft Dynamics 365

We have recently moved to Microsoft dynamics 365 for our financial system. Part of the process we have is to send a batch email (100+ … read more ›

1 Comments
05/23/18

Anyone using a Zero Trust Network (ZTN)?

Is anyone in the NOREX organizations using Zero Trust Network (ZTN). If there is someone using a ZTN any chance I could chat with them? … read more ›

1 Comments
06/06/18

FAQs for Rolling out OKTA MFA

Can any members provide sample FAQs for a member that is rolling out OKTA MFA? … read more ›

1 Comments
06/05/18

What are you using for Privileged Access Management?

Member is looking for a list of solutions NOREX peers are using for Privileged Access Management (PAM). Feedback on BeyondTrust and Thycotic as well as … read more ›

1 Comments
06/01/18

Intune Mobile Application Management (MAM) cultural dilemma.

Our company is moving from AirWatch to Intune. Left on the decision making table is how hard to push on Mobile Application Management (MAM). We … read more ›

3 Comments
05/03/18

Office 365 and the Microsoft EMS Suite

I'm looking for a member who has implemented the Microsoft EMS (Enterprise Mobility + Security) Suite along with Office 365. I am very interested in … read more ›

2 Comments
06/08/18

Security Audit Vendor Recommendations

An Ontario member is looking for security audit vendor recommendations. … read more ›

1 Comments
06/07/18

Looking for examples of implemented information security risk management process

We are looking for examples of implemented processes for information security risk management. In your environment today, what does your process document look like? What … read more ›

0 Comments
06/06/18

Encryption Tool for Gmail

What are others using as an encryption tool for Gmail? … read more ›

1 Comments
05/16/18

Protecting Excel Templates

We have many proprietary excel templates with complex formulas we have developed in our organization and are wondering what technologies might be available to prevent … read more ›

5 Comments
06/01/18

Experiences with Data Encryption

We are planning to set up an encryption program and are looking for others who have had experience with data encryption. We are interested in … read more ›

1 Comments
05/24/18

Disaster Recovery Planning

Disaster Recovery Planning Questions: - What should be considered during the training? Any example of training materials would be helpful. - Do all IT individuals … read more ›

1 Comments
05/18/18

How are others adopting MFA and the use of personal cell phones?

We are in the midst of rolling out MFA (Multi-Factor Authentication) and the use of Microsoft Authenticator. A specific area of focus for us is … read more ›

3 Comments
05/24/18

Password Vault

Can you assist me in discovering what companies are doing from a password vault standpoint? This is something we would use for key admin/website/application passwords. … read more ›

4 Comments
05/15/18

Network User Behavior Analysis Tools

A member is interested in solutions other organizations are using that monitors, alerts and takes action against suspicious activity and user behavior. This solution should … read more ›

5 Comments
05/07/18

Cloud Access Security Brokers (CASB) Recommendations

We are evaluating a couple of cloud CASBs. Does anyone have any reviews, comparisons, or recommendations on the Symantec CloudSOC CASB and/or Microsoft Cloud Access … read more ›

1 Comments
05/11/18

External Emails

Notice: This message originated outside of Your company name. We are starting to see more companies add this highlighted line to the beginning of incoming … read more ›

4 Comments