ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • A Business Case For Funding Your Insider Threat Program

    Sponsored by: Forcepoint

    Insider threat is a growing issue that often exceeds expectations. While most organizations go to great lengths implementing background checks to vet employees; often the accidental insider and outsider turned insider (due to compromise), are overlooked. It is time for a new protect from within mentality.

  • Three Critical Steps to Launch a Data Breach Response

    Sponsored by: AllClear ID

    With this guide, you'll learn about three critical steps in launching an effective incident response plan. Learn how to assemble a team, build communication channels with that team, draft different plans around specific incidents types and offer helpful services like identity theft protection.

  • Unless you prepare early, prioritize quality, and reserve capacity you are not ready for a breach.

    Sponsored by: AllClear ID

    This infographic shows you statistics from business executives and consumers on how they handle and perceive a data breach. Learn how to properly deal with a major breach now, before one occurs, instead of later, when it's too late.

  • 7 Key Factors of a Highly Effective Application Protection Solution

    Sponsored by: Arxan

    An effective application protection solution is paramount to safeguard the integrity and confidentiality of an application. This whitepaper discusses the key factors that enable an effective application protection solution.

  • Top 10 Zero-Day Exploits of 2015

    Sponsored by: Palo Alto Networks

    This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns. It also provides additional details on three particularly effective zero-day exploits in brief case studies.

  • Privileged Users

    Sponsored by: Forcepoint

    Damage caused by Privileged Users is the most extensive, hardest to mitigate, and hardest to detect. However, a solution exists to mitigate the threat of Privileged User abuse. Read the "Privileged Users: Superman or Superthreat?" whitepaper for best practices and strategies for mitigating the threat within your organization.

  • Defeating the Threat Within

    Sponsored by: Forcepoint

    Your critical data will be stolen by someone who interacts with your network daily. Accidental or malicious, it will happen and you need the right plan before it happens. Learn from our top security experts the key to evading and understanding malicious user behavior.

  • ROI for Threat Intelligence

    Sponsored by: ThreatConnect

    Not all intelligence is created equal. Learn how to make informed decisions about threat intelligence (TI) for your particular organization. Done right, you can sharpen your defenses, save time, and make better strategic decisions on your security using TI.

  • Breach response: It's about keeping your customers safe

    Sponsored by: AllClear ID

    Learn how to deliver a timely, organized breach response that boosts customers' confidence, repairs customers' identities if they've been victimized and helps minimize irreparable damage to your brand. Ensure peace of mind by giving your assurance that your organization values both their identities and their loyalties.

  • Breach response isn't about losing data. It's about keeping your customers.

    Sponsored by: AllClear ID

    The time to prepare for a data breach is today. Give your customers reassurance that they are taken care of and help resolve any harm done to their identity. Learn how to respond to customer queries effectively and reduce customer response time for any size breach to as little as 48 hours.

  • Building a Vendor (IT) Risk Management Program

    Sponsored by: BitSight

    Understand a vendor's security posture without requiring expensive site visits and penetration tests. Assess your vendors more frequently and focus efforts on those who have serious security issues.

  • Neutralize Emerging Threats: Reducing the Time to Discover and Recover Transcript

    Sponsored by: Intel Security

    Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.

  • HITRUST CSF Certification – Frequently Asked Questions

    Sponsored by: Coalfire

    What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.

  • Breach Response: Preparing for the Threat; Controlling the Chaos

    Sponsored by: AllClear ID

    Examine past breaches, in this report, to learn the tangible benefits of being well-prepared for a cyber attack. Other benefits, like good data governance and responsible stewardship, are less tangible, but inspire confidence and can reinforce your good reputation. Discover how to emerge from every data breach unscathed, public image intact.

  • Net Diligence Cyber Claims Study 2014

    Sponsored by: AllClear ID

    This study helps you risk understand the true impact of data insecurity by consolidating claims data from multiple insurers. The combined pool of claims is sizable enough that it allows us to ascertain real costs and project future trends.

  • The Cost of Unintentional Insider Threat

    Sponsored by: Forcepoint

    A high rate of Unintentional Insider Threats (UIT) sheds light on the demands of today's workplace culture in the United States. Work cultures are unlikely to change anytime soon, but there are tools and programs that can help any work environment with a UIT problem. To find out more, read the report.

  • BitSight Global View

    Sponsored by: BitSight

    This report shows you the security performance results of 250 random organizations per country from the U.S., the U.K., Singapore, Germany, China and Brazil during May 1, 2015 until May 1, 2016. It can help your organization's security stance as you move forward into new, global markets.

  • Don’t Let “Trusted” Vendors Become Cyber-Breach Enablers

    Sponsored by: BitSight

    Learn how to evaluate vendors' security ratings simply and effectively. Police vendors entrusted with handling your sensitive data and greatly enhance your vendor risk management program no matter where it is on the maturity curve.

  • Why Traditional Security Fails

    Sponsored by: Intel Security

    Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.

  • The Top Five Requirements for Secure Enterprise File Sync and Sharing

    Sponsored by: Citrix

    Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.

  • EMEA: Rethinking the Cyber Security Disconnect to Save Money

    Sponsored by: VMware

    Discover five ways you can improve your security posture today and instruct employees on more secure data handling. Learn why it's important for business leaders in Africa, Europe, and the Middle East to understand cyber security as a top priority and ultimately save money in mitigating threats rather than reacting to them.

  • IBM Security QRadar: SIEM Product Overview

    Sponsored by: IBM

    In this e-guide, expert Karen Scarfone looks at QRadar, IBM's enterprise security information and event management (SIEM) tool. Learn how its features allow you to easily collect log data from hosted assets, operating systems, applications, vulnerabilities and user behavior.

  • Top 10 Reasons to choose EMC Data Protection Solutions

    Sponsored by: Richardson Eyres

    Learn 10 reasons why changing your data protection platform to enable efficiency and TCO is a must. Discover enterprise-class data protection across on premise, virtualized, hybrid, and cloud consumption models.

  • Cybersecurity skills shortage demands new workforce strategies

    Sponsored by: IBM

    The race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles. This e-guide discusses organizations' want for better qualified candidates and reveals what skills exactly most security professionals are currently lacking.

  • Intelligent Endpoint Threat Defense

    Sponsored by: Intel Security

    Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.