ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • Information Governance: Protect Your Company's Assets

    Sponsored by: Box

    This white paper explores how to leverage the cloud content management platform from Box to implement a sound information governance program for you organization. Discover how to reduce risks and gain control over who can see and use information and how it is kept.

  • Make Migration AWSome: Speed Up And De-Risk Your Migration To AWS

    Sponsored by: Amazon Web Services

    Those moving to AWS face a substantial move that needs to be planned out ahead of time. Read on to learn about a service that helps you prepare for your AWS migration while minimizing the risk associated with such a move.

  • How To Implement a Records and Information Management Risk Control Framework

    Sponsored by: Iron Mountain

    In this white paper, learn about records and information management (RIM) controls you can implement to mitigate data risk. For example, learn the 9 major categories of RIM risk controls, how you can parcel out the responsibility of these categories to your employees, and more.

  • Identify and Manage Fraud Better with Analytics

    Sponsored by: BAE Systems

    This white paper explores how to put the right analytics tools and practices in place to fight financial crime in an era of cloud and big data. Discover how predictive analytics can help identify fraudulent behavior and improve strategic decision-making even in the face of high data volumes and proliferating attack vectors.

  • SonicWall 2017 Threat Report: The State of the Cybersecurity Arms Race

    Sponsored by: SonicWall

    This SonicWall Annual Threat Report defines the cybersecurity battlefield and enables you to mount an impenetrable defense in 2017 and beyond.

  • 2017 Annual Threat Report

    Sponsored by: SonicWall

    This 2017 Annual Threat Report looks at both sides of the cybersecurity arms race: the attackers and the targeted organizations. Discover which areas of security are projected to see the most attention and learn how to overcome challenges like SSL encrypted traffic, higher instances of ransomware attacks, IoT security issues, and more.

  • You've Been Compromised - Now What?

    Sponsored by: Dell SecureWorks

    Explore three critical questions you must answer and decisively act upon at the first signs of a security breach. Discover these questions to ensure your organization can protect itself from costly security incidents.

  • The State of the Cybersecurity Arms Race

    Sponsored by: SonicWall

    In the war against cybercrime, no one gets to avoid battle. In this resource, industry expert Bill Conner provides insight into staying up-to-date on the latest threats and cybersecurity innovations shaping today's landscape.

  • Fighting the Latest Evolution of Money Laundering

    Sponsored by: BAE Systems

    This report explores how to meet the ever-growing threat of financial cybercrime. Discover how to take an integrated approach to detecting and preventing cybercrime that leverages anti-money laundering (AML) technologies, blockchains, machine learning, and more.

  • Announcing New and Enhanced SonicWall Email Security 9.0 with Capture ATP to Detect Zero-Day

    Sponsored by: SonicWall

    In 2016, ransomware attacks grew by 167x year-over-year to 638 million. As today's malware and ransomware pose ever evolving malicious, zero-day threats, organizations need to defend their networks beyond their perimeters. Discover how SonicWall can help you block ransomware, inspect email, and more.

  • Improving and Accelerating Fraud Detection and Prevention

    Sponsored by: BAE Systems

    This resource explores how to combat modern financial crime and compliance challenges and improve your organization's ability to detect and prevent fraudulent claims, even in complex, high-volume environments. Discover a platform that enables you to detect more fraud faster, improve detection accuracy, accelerate decision-making, and more.

  • 6 Steps to Proactive Cybersecurity Protection

    Sponsored by: BAE Systems

    Learn how to take a stratified approach to IT security that leverages threat intelligence to prevent breaches. Discover 6 steps to proactive cybersecurity protection and obtain the monitoring capabilities you're looking for.

  • Board Oversight of Cybersecurity Risk: A Framework for Inquiry

    Sponsored by: Dell SecureWorks

    Use this white paper as your tool for improving the board-management dialog on cybersecurity risk management. It will help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.

  • Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect Their Businesses

    Sponsored by: BAE Systems

    Go beyond simple risk management by implementing cybersecurity practices designed not only to prevent breaches but anticipate the damage and recover from attacks. Discover how to bolster endpoint security and data loss prevention by identifying potential attackers to improve your organization's threat awareness and put the right tools in place.

  • Navigating IT Transformation

    Sponsored by: HPE and IntelĀ®

    IT transformation is the hot new trend, but you've got some hoops to jump through first. This comprehensive IDG paper is here to report on some of the common troubles that your peers are having with their IT transformations and what you can do to avoid these costly mistakes.

  • The Potential ROI of Fraud Detection and Prevention Tools

    Sponsored by: BAE Systems

    This Forrester Total Economic Impact report examines an analytical platform that provides organizations with the tools to detect, investigate, and prevent insurance fraud while minimizing the impact to genuine customers. Discover the potential ROI of this fraud detection and prevention platform, deployed either on-premise or in the cloud.

  • Do You Know Who I Am? Know Your Customer Systems Market Update

    Sponsored by: BAE Systems

    Explore how Know Your Customer (KYC) systems provide organizations with the processes and workflows they need to assess the risk customers pose both at account opening and over time. Learn how to leverage KYC to boost customer onboarding and due diligence, improve risk management, integrate AML with KYC systems, and more.

  • The Ultimate Guide to Cybersecurity to Drive Profitability

    Sponsored by: Cisco Systems, Inc.

    This e-book explores how to turn cybersecurity success into a true competitive advantage that enables faster innovation. Discover how to secure your network to prevent costly downtime, equipment damage, compliance issues and more. Plus, learn how to leverage threat intelligence to bolster malware defense and improve network visibility.

  • 2017 Annual Cybersecurity Report

    Sponsored by: Cisco and Dimension Data

    This 2017 Annual Cybersecurity Report explores how to implement an integrated security architecture by connecting your security tools to work together in an automated, streamlined environment.

  • Managing the Risks of Cryptocurrency

    Sponsored by: BAE Systems

    This report explores how to defend against malware designed to attack cryptocurrencies in an increasingly virtual, mobile, and connected world. Read on to learn about the growing cryptocurrency landscape, how to navigate the cyber risks of virtual currencies, essential tips for protecting your financial institution, and more.

  • The new EUsecurityrequirements and you

    Sponsored by: Symantec & Blue Coat Systems

    This infographic reveals how to support compliance while reaping business rewards. Learn about tools that deliver real-time threat intelligence, policy-based data usage assurance, and 2 more compliant ways to use and store data.

  • When Downtime Takes a Bite out of Your Budget

    Sponsored by: Globalscape

    Unplanned downtime and data loss will ultimately affect an organization's bottom line. Discover how to develop a robust data protection strategy that helps defend your most critical assets and learn how to create visibility into data transfers, meet compliance, simplify disaster recovery, and more.

  • Your Data on the Move: Taking Back Control of Your Most Precious Asset

    Sponsored by: Globalscape

    This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.

  • Cybersecurity and Overcoming the Intelligence Disconnect

    Sponsored by: BAE Systems

    Cybersecurity is now a business risk issue like any other. In this research report, discover how to unite the two different perspectives of the C-Suite and IT decision-makers, especially in regards to what threats they think are greatest, who's accountable for defense, how to use outsourcing, and more.

  • Risk Assessment: The Roles Vendors and Frameworks Play

    Sponsored by: BitSight

    Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.