ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Threat Predictions

    Sponsored by: Fortinet, Inc.

    As technology continues to evolve, there is a growing criminal element looking to exploit new opportunities the digital society brings. This white paper reveals predictions regarding the future threat landscape, offers insight into specific threats, and provides mitigation tactics to enhance security.

  • Why Device Risk is an Essential Element for Your MFA Strategy

    Sponsored by: iovation, Inc.

    Take a look at this webinar to gain insight into device risk to learn how to improve multifactor authentication and user experience within mobile devices.

  • Are you Missing 82% of Your Ethics & Compliance Reports?

    Sponsored by: Navex Global

    40% of employees who see misconduct never report it, according to the ECOA National Business Ethics Survey. Take a look at this white paper to learn why an effective ethics and compliance program is crucial to business intelligence.

  • The Anatomy of a Data Breach

    Sponsored by: SailPoint Technologies

    43% of the time data breaches are directly caused by insiders, according to SailPoint Technologies. Explore this white paper to gain insight into the anatomy of data breaches through 4 phases to help protect your organization against falling victim to such attacks.

  • Who Owns Your Data?

    Sponsored by: SailPoint Technologies

    7 in 10 users have access to data they shouldn't, according to SailPoint's Market Pulse Survey. This e-book explores IAM and data protection strategies to ensure your organization is taking the correct precautions when protecting access to your data.

  • Innovation and Technology for GRC

    Sponsored by: Navex Global

    A comprehensive governance, risk and compliance program enables enterprise leaders to mitigate risks, reduce compliance breaches, and improve business performance. This roundtable resource provides detail into governance, risk and compliance programs through insight from 6 experts in the field, who answer 11 relevant questions.

  • Orchestration of App-Driven Security Policies

    Sponsored by: Silver Peak

    Take a look at this webcast to discover how to orchestrate security policies within applications.

  • Ethics & Compliance Third-Party Risk Management Benchmark Report

    Sponsored by: Navex Global

    Third-party risk management is a top concern among compliance leaders. Explore this 64-page report to help benchmark your third-party risk management program and improve performance with trends and best practices.

  • Magic Quadrant for Security Information and Event Management

    Sponsored by: LogRhythm, Inc.

    Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. This Gartner report reveals strengths and cautions of different vendor's security information and event management products as well as a market overview.

  • Definitive Guide to Incident Management

    Sponsored by: Navex Global

    Explore this 28-page guide to gain insight into incident management through advice and examples to help companies implement and manage effective ethics and compliance programs.

  • Understand the State of Identity and Access Management

    Sponsored by: SailPoint Technologies

    IAM continues to fight for priority in organizations' security strategies. This Forrester report outlines budgeting and spending, policies and tools in use, tech adoption plans, and other key IAM trends in enterprise organizations to help security pros assess their own IAM strategy.

  • Executing a Lockdown on Cybersecurity Threats

    Sponsored by: Navex Global

    Cybersecurity preparedness and keeping up with the latest developments in security is essential in protecting your organization. This e-book addresses tactics to mitigate risks of cybersecurity threats and offers strategies to take if your organization has been attacked.

  • Top Global GRC Risks

    Sponsored by: Navex Global

    According to MIT Sloan School of Management, businesses with superior governance practices on average generate 20% greater profits than other companies. Explore this Compliance Week e-book to uncover the top 10 global compliance trends as well as current policies and regulations to help boost your GRC strategy.

  • Key Considerations in Selecting a Customer IAM Solution

    Sponsored by: Janrain

    The rise of the social customer creates opportunities for organizations to develop deeper relationships with customers in support of business objectives. Explore this white paper to gain insight into selecting a customer IAM strategy that works best for your organization.

  • Anti-Bribery and Corruption Risk Assessment Checklist

    Sponsored by: Navex Global

    This Anti-Bribery and Corruption Risk Assessment Checklist outlines how to implement an effective anti-bribery compliance program using a methodology of protecting, detecting and correcting to manage core program components.

  • GDPR Primer and Readiness Assessment

    Sponsored by: Janrain

    This data sheet provides a GDPR readiness assessment to ensure your organization will achieve compliance by May 2018.

  • EMEA & APAC Ethics & Compliance Benchmark Report

    Sponsored by: Navex Global

    This report reveals key data points that compliance professionals can use to benchmark and assess their ethics and compliance program performance and move toward predictive risk mitigation.

  • EMEA & APAC Culture and Compliance Benchmark Report

    Sponsored by: Navex Global

    This report details challenges faced by ethics and compliance professionals headquartered in EMEA and APAC and provides objectives, pain points and strategies for ethics and compliance professionals across industries.

  • Report: Customer Identity and Access Management

    Sponsored by: Janrain

    In this Forrester report, explore a 20-criteria evaluation of customer IAM providers to help security pros make the right choice for their digital business.

  • SmartProtect Program: Solution Brief

    Sponsored by: Corero Network Security

    To avoid damage to reputation and brand, organizations are looking for DDoS mitigation techniques that have evolved to meet the changing threat landscape. Take a look at this technology overview to decide if this DDoS protection strategy is right for your organization's network security needs.

  • Top Trends That Will Shape CIAM in 2018 and Beyond

    Sponsored by: Janrain

    In order for digital businesses to manage, govern, and secure customers' access to systems and data without hurting the customer experience, businesses should implement a customer IAM strategy. This Forrester report details 12 key trends shaping the customer IAM landscape and how security and risk pros can respond to them in a productive manner.

  • Executive Review: Consumer Identity and Access Management

    Sponsored by: Janrain

    Consumer IAM is the fastest growing specialty in IAM that has emerged in the last few years to meet evolving business requirements. Explore this executive review to gain insight into consumer IAM and how it can help you improve your existing IAM and security strategy.

  • Accelerate Your Response to the GDPR

    Sponsored by: Oracle

    This paper summarizes several key requirements of the GDPR and maps out how you can accelerate your response and comply with the regulation by May 2018.

  • Revolutionizing the Sharing of Personal Data

    Sponsored by: Evident

    The average number of records stolen in a data breach is 24,089, according to IBM Security. This resource provides information into securing personal, sensitive data to minimize the risks of a data hack in order to protect your business.

  • Windows 10: If Compatibility is Not a Problem, What Is?

    Sponsored by: Flexera Software

    Explore this white paper to gain insight into the security challenges of adopting Windows 10 and how to reduce risks when implementing and using the software.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.