ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Assessment Research

  • Innovation and Technology for GRC

    Sponsored by: Navex Global

    A comprehensive governance, risk and compliance program enables enterprise leaders to mitigate risks, reduce compliance breaches, and improve business performance. This roundtable resource provides detail into governance, risk and compliance programs through insight from 6 experts in the field, who answer 11 relevant questions.

  • Definitive Guide to Compliance Program Assessment

    Sponsored by: Navex Global

    A strong ethics and compliance program improves organizational culture, protects corporate reputation and enhances employee engagement. This compliance guide offers organizations assistance in evaluating and improving their ethics and compliance programs through industry evidence and insights.

  • Anti-Bribery and Corruption Risk Assessment Checklist

    Sponsored by: Navex Global

    This Anti-Bribery and Corruption Risk Assessment Checklist outlines how to implement an effective anti-bribery compliance program using a methodology of protecting, detecting and correcting to manage core program components.

  • 5 Practical Ways to De-Risk Your Big Projects

    Sponsored by: Energized Work

    Every project carries risk, and if it doesn't, it's probably not going to add much value to your business. Learn how to effectively manage goals, communication, and user acceptance when undergoing complex digital business projects.

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

  • Governance, Risk, and Compliance: Transform Inefficient Processes

    Sponsored by: ServiceNow

    Governance, risk, and compliance is a constant concern for enterprises that must keep up with changes in the global regulatory environment and industry standards. Learn how to transform inefficient processes into a unified GRC program.

  • Effectively Monitor, Prioritize, and Automate Response to Third-Party Risk

    Sponsored by: ServiceNow

    While assessing vendor risk on a regular basis is critical, it can often be an extremely time-consuming and error-prone exercise involving spreadsheets, email, and rudimentary risk management tools. Learn how to build a more advanced vendor risk management program.

  • Strengthen Your Ransomware Strategy

    Sponsored by: AdvizeX Technologies

    Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.

  • Beyond your company boundaries

    Sponsored by: ComputerWeekly.com

    Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly.

  • Key Issues for E-Discovery and Legal Compliance

    Sponsored by: Smarsh

    Managers are often worried their organizations will be sued at some point, but most aren't adequately prepared to deal with e-discovery issues. In this Osterman Research report, uncover insight from the results of an in-depth survey of decision makers and influencers at mid-sized and large organizations.

  • How this Large North American Retail Chain Achieves Compliance, Minimizes Risk, and Mitigates Threats

    Sponsored by: Rapid7

    In this case study, learn how, by adopting this vulnerability scanning system this North American retail chain's IT team able to go beyond compliance assessments to get actionable security information, and more.

  • When Software Goes Rogue

    Sponsored by: BDNA

    How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.

  • Focus: how to avoid being hit by ransomware

    Sponsored by: ComputerWeekly.com

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

  • NSS Labs Advanced Endpoint Protection Test Report

    Sponsored by: McAfee, Inc.

    NSS Labs performed an independent and rigorous test of the McAfee Endpoint Security v10.5 product to see how it stacks up against the competition. This report provides detailed information about this endpoint strategy and its security effectiveness.

  • The Importance of Incident Management Services

    Sponsored by: Dell SecureWorks

    The worst time to realize you are not prepared for a security incident is during a breach. Without a proven response plan or strategy, stressed personnel must make crucial decisions without a clear sense of order and priority. Discover how to prepare your enterprise for a security incident in this white paper.

  • When Downtime Takes a Bite out of Your Budget

    Sponsored by: Globalscape

    Unplanned downtime and data loss will ultimately affect an organization's bottom line. Discover how to develop a robust data protection strategy that helps defend your most critical assets and learn how to create visibility into data transfers, meet compliance, simplify disaster recovery, and more.

  • Your Data on the Move: Taking Back Control of Your Most Precious Asset

    Sponsored by: Globalscape

    This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.

  • Object Storage 101

    Sponsored by: ComputerWeekly.com

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.

  • Cyber security solutions from IBM

    Sponsored by: IBM

    Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection.

  • Develop Your Information Security Management System

    Sponsored by: SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

    This Forrester Research report explores how to use an information security management system (ISMS) to improve risk management and strengthen security processes. Find out how to derive daily value from an ISMS, increase customer data protection, leverage KPIs and threat intelligence, and more.

  • Why Organizations Still Struggle to Digitally Transform & Innovate

    Sponsored by: TechData - Veeam

    Over 80% of enterprises deal with a data availability gap. Do you know how many millions that gap is costing you? Access this white paper to learn how to close the availability and protection gaps, quantify your availability goals, see how these challenges are impacting your digital transformation strategies, and more.

  • Managed Detection and Response

    Sponsored by: Dell SecureWorks

    Being resilient to a threat from an advanced adversary is dependent on your organization's integrated capabilities to quickly detect them and respond. In this white paper, learn how you can employ and tune the security tools at your organization to combat today's threats.

  • Risk Assessment: The Roles Vendors and Frameworks Play

    Sponsored by: BitSight

    Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.

  • Pilot Light DR for Amazon Web Services

    Sponsored by: CloudVelox

    Speed, safety, and cost are all central concerns surrounding disaster recovery (DR). This is where cloud comes into play. Access this data sheet to learn about the key functions that cloud-based DR for AWS delivers and how they'll impact your business.

  • Methods for Preventing Hospital Ransomware Infections and Cyberattacks

    Sponsored by: Cisco Umbrella

    The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.