When organizations build their Governance, Compliance, and Risk (GRC) strategy, it is often at their infancy. Over time, as teams grow and projects become more complex, these strategies can become outdated and siloed to specific departments.

Because GRC impacts your entire organization, it is critical to have the right processes and technology in place so that only the right people have the right information, at the right time. Managing controls correctly allows you to track and monitor ongoing GRC performance to drive down costs and help you meet your business goals.

Join a discussion with Perforce experts, Tzvika Shahaf (Director, Product Management) and Christopher Gerg (Chief Information Security Officer) to learn more about:

  • Market trends that support GRC initiatives.
  • Steps organizations can take to mature their GRC model.
  • Implementation methods that streamline operational processes. 
  • Tools that support compliance and risk mitigation. 

Learn how Helix ALM can help you meet your GRC goals.

TRY HELIX ALM FREE

Presenters
image-author-tzvika-shahaf

Tzvika Shahaf

Director of Product Management

Tzvika Shahaf, Director of Product Management at Perforce. Tzvika is an expert for Agile and Product lifecycle management, helping enterprises focus on shipping high-quality business-critical applications fast, while reducing risk and inefficiency in their process. Tzvika is highly focused on traceability and meeting the product requirements based on the power of visualization, reporting and analysis of data.

Tzvika is co-author of two industry must-read professional books: Continuous Testing for DevOps Professionals (a practical guide from industry experts) & Accelerating Software Quality – Machine Learning & Artificial Intelligence in the Age of DevOps. Tzvika is also a speaker and presenter in global industry events about continuous testing, Agile lifecycle management, traceability and more.

headshot-christopher-gerg

Christopher Gerg

Chief Information Security Officer (CISO), Perforce Software

With a technical foundation, Christopher approaches managing an information security program through a foundation of practical, actionable approaches to protecting the confidentiality, integrity, and availability of systems, networks, services, and data. His experience ranges from network engineering to executive leadership roles with highly regulated industries.