ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Assessment Research

  • IBM Information Lifecycle Governance Maturity Assessment

    Sponsored by: IBM

    Increasing storage and maintenance costs, duplication of resources, the lack of trusted content, and exposure to risks and litigation are problems plaguing many enterprises today. So why are company's holding on to every bit of data? Take this assessment to determine your level of information governance maturity and see how much more you can grow.

  • Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

    Sponsored by: AlienVault

    Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.

  • Cost of a Data Breach Calculator

    Sponsored by: IBM

    This short survey helps you identify your organization's risk profile, which includes your organization's risk of experiencing a data breach, the average cost per compromised record and the total cost of a data breach to your organization.

  • Insider Threats: How to Spot Trouble Quickly with AlienVault USM

    Sponsored by: AlienVault

    Join us for this technical demo showing how USM can help you detect malware infections on end-user machines, insiders misusing network resources, and users engaging in suspicious behaviors.

  • Mitigate Model Risk and Reduce Model-Related Costs

    Sponsored by: SAS

    By establishing risk mitigation and cost reduction strategies targeted at model implementation and operation, you can easily identify models that are vital for guiding the direction of your business. Discover an approach to model risk management that supports your internal decision-making processes.

  • Visual Analytics for Improving Risk Calculation

    Sponsored by: SAS

    Banks are under pressure to meet compliance standards and improve risk calculation. Discover a software suite that provides you with big data analytics capabilities to implement these changes. Plus, find out how a tier 1 European bank implemented this software successfully and learn how you can improve data quality and visualization too.

  • The Anatomy of a Ransomware Attack

    Sponsored by: Exabeam

    Read this research report to understand the business models used by ransomware network operators and how you can detect and disrupt ransomware in your corporate environments.

  • The Four Steps to Effective Risk and Compliance Management for Financial Services

    Sponsored by: IBM

    This white paper illustrates why convergence is key to maximizing governance efforts and provides 4 steps financial services organizations can take to mitigate compliance risks.

  • Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust

    Sponsored by: LogRhythm, Inc.

    Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.

  • How Industry Collaboration Mitigates Cybersecurity Risks

    Sponsored by: LogRhythm, Inc.

    Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.

  • How Strongarm's Malware Protection Solution Works

    Sponsored by: eTECH Channel

    You need an efficient way to stop malware from damaging your customers' businesses. Discover simple and automated malware protection that will help you protect customer networks while minimizing complexity.

  • Take a Behavioral Bite Out of Crime

    Sponsored by: Infor

    44% of retail shrink is due to employee theft. This is the greatest threat to profitablity at store level. This white paper, based on an extensive study, presents hiring strategy improvements that your organization can quickly adopt.

  • The Security Survival Guide for Growing Businesses

    Sponsored by: Trustwave

    This guide shows you step by step why your security may be suffering and offer practical tips for addressing critical points so you can take your data protection to the next level.

  • Reference Guide: Acceptable Use Policy

    Sponsored by: Navex Global

    This reference guide provides an example of an acceptable use policy of computer systems at an organization. Use this sample as a guideline for developing your own policy.

  • 6 Easy Ways to Advance Your Cybersecurity Program When You Have a Small Team

    Sponsored by: ThreatConnect

    This paper outlines 6 steps you can take to prioritize threat data, automate manual tasks, and streamline your workflow. With the right tools in place, you can turn your small band of brothers into an army suited to take down all of today's sophisticated threats.

  • IT Security for Retail

    Sponsored by: Trustwave

    This white paper emphasizes a multi-layer defense program against attacks. This approach helps you avoid infection, halt propagation, stop exfiltration and unify your security systems.

  • Get the Incident Responder’s Field Guide: Lessons from a Fortune 100 Incident Response Leader

    Sponsored by: Digital Guardian

    The Digital Guardian Incident Responder's Field Guide provides a formal, coordinated approach for responding to security attacks that affect information assets. Written by Tim Bandos, a former Fortune 100 cyber security leader, this e-book provides easy-to-follow steps for crafting an Incident Response plan.

  • IT Security for Financial Sector

    Sponsored by: Trustwave

    Learn why threats are growing and how to keep up with them in this white paper. See where financial organizations around the world are falling short of best security practices and how you can avoid making the next $50 million mistake.

  • 7 Best Practices to Secure Your Data on AWS

    Sponsored by: Rackspace

    This webinar features two AWS-certified professionals who will help you understand how to secure your data on the AWS platform. They will discuss seven best practices for securing data at rest and how those strategies can decrease your risk of a catastrophic data leak.

  • 2016 Security Pressures Report

    Sponsored by: Trustwave

    The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.

  • 3 Steps to Create a Data Protection Lifecycle Management Strategy

    Sponsored by: Iron Mountain

    Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.

  • Security and Innovation Converge at Open Source Linux

    Sponsored by: Red Hat

    Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.

  • Migration Best Practices for Red Hat Enterprise Linux

    Sponsored by: Red Hat

    As IT systems age, they become more brittle. Download this white paper to understand the benefits of adopting the latest release of Red Hat Enterprise Linux—which will mitigate risk in the lifecycle of your server platform, and decrease the vulnerability of systems to security threats.

  • BYOD and mHealth: Navigating Security and HIPAA

    Sponsored by: Optum

    Learn best practices to implement when using a BYOD device for patient care. Discover which applications are secure and compliant with HIPAA standards and which you should steer clear from.

  • See Why Network Monitoring Tools are Critical in today's Hyperconnected World

    Sponsored by: eTECH Channel

    This e-guide helps you determine how to best implement your NPM on day one. You'll learn why these performance-oriented network monitoring systems bear watching and how to resolve downtime issues.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.