ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • Mid-Year Cybersecurity Report 2017

    Sponsored by: Cisco Systems, Inc.

    Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.

  • How Energy & Utilities Companies Can Use Data Analytics for Digital Transformation

    Sponsored by: MicroStrategy Incorporated

    The energy and utilities industry faces a vast number of challenges today: Navigating price volatility, running large global operations, effectively managing risk and changing regulations—and staying profitable. Learn how MicroStrategy 10 can help energy and utilities companies capture data for analytics to drive efficiency and performance.

  • Why Security in DevOps is Essential to Software Development

    Sponsored by: SearchSecurity.com

    What is the point of releasing new software that's loaded up with security vulnerabilities? Take a closer look at this handbook to reveal how IT professionals can fit security into their development process and how they will benefit from doing so.

  • GDPR Primer for the C-Suite and Board of Directors

    Sponsored by: CyberArk Software, Inc

    Take a closer look at this white paper to reveal what executives and board members need to know to prepare for the GDPR.

  • Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

    Sponsored by: CyberArk Software, Inc

    Discover why securing and managing privileged accounts should be an integral part of your organization's strategy in achieving SWIFT CSCF compliance.

  • Get your Enterprise Ready for GDPR

    Sponsored by: CyberArk Software, Inc

    Take a closer look at this white paper to reveal a checklist for securing personal data to prepare for the GDPR.

  • IBM Cloud Secure Virtualization: Your Key to Simplifying GDPR Compliance

    Sponsored by: HyTrust

    Time is running out for firms to comply with the GDPR. Take a closer look at this white paper to reveal how to simplify your compliance efforts.

  • Become GDPR-Ready

    Sponsored by: Avnet

    If organizations do not know what data they hold and where it is, they will not be able to comply with GDPR, risking their businesses. Read this white paper to reveal insight to prepare for the GDPR.

  • 2017 GDPR Report

    Sponsored by: Avnet

    Research by Vanson Bourne shows that 86% of organizations worldwide are concerned that a failure to adhere to the upcoming GDPR could have a major negative impact on their business. Take a closer look at this white paper to reveal research statistics regarding GDPR compliance.

  • 360 Data Management For GDPR

    Sponsored by: Avnet

    In an effort to prepare for the GDPR, organizations are trying to move from slow-moving, traditional approaches to digitally-driven operations that capitalize on previously inaccessible market opportunities.

  • Evolution of Incident Response

    Sponsored by: IBM Resilient

    A recent survey revealed that data breach and data theft outranked natural and manmade disasters and IT system failures as the largest threat to an organization's reputation. The old days of incident response, will no longer suffice to keep your organization safe. Learn how IR has evolved and how you can improve yours.

  • Orchestrated Response: A Game-Changing Strategy

    Sponsored by: IBM Resilient

    Uncover how organizations have improved their security posture by using advanced security automation and orchestration strategies to alleviate cyber threats.

  • Optimize your AML Investigation Productivity

    Sponsored by: Attivio, Inc.

    Read this e-book to reveal a holistic view of risk and compliance to strengthen your anti-money laundering software.

  • Study on the Cyber Resilient Organization: United Arab Emirates

    Sponsored by: IBM Resilient

    Take an in-depth look at this Ponemon study to reveal factors effecting cyber resilience. Learn more about activities to improve it, barriers, and threats.

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

  • GDPR: The State of Play

    Sponsored by: ComputerWeekly.com

    An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play.

  • Pervasive Encryption: A New Paradigm for Protection

    Sponsored by: IBM

    The increasing integration between cyberspace and the physical world has exponentially expanded the opportunities for theft, damage, and corruption. Take a look at this report to discover trend and risk information through a security examination of different organizations.

  • How to Implement NIST CSF : A 4-Step Journey to Cybersecurity Maturity

    Sponsored by: Rsam

    Read this white paper to discover how a NIST Cybersecurity Framework platform provides users like you with strong security and threat protection against possible attackers.

  • Balancing Security Investments

    Sponsored by: Dell SecureWorks

    Lack of a clear security strategy for the cloud may prevent your enterprise from fully realizing the business benefits of the cloud. In this Frost & Sullivan research report, learn which best practices to follow to gain security capabilities within the cloud. Jump to page 10 for the dimensions of the information security maturity model.

  • 6 Steps to Implementing a Risk-Based Security Approach

    Sponsored by: Dell SecureWorks

    It is difficult to defend against something when you do not know what exactly you are defending against. Take an in-depth look at this white paper to uncover 6 steps to implementing a risk-based security approach to enhance your security posture.

  • EU GDPR Compliance Puts Focus on Data Tracking, Encryption

    Sponsored by: Ivanti

    In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.

  • Your Employee Security Checklist: 10 Tips

    Sponsored by: Kaspersky Lab

    Careless employees were the single biggest cause of serious incidents involving data loss or leakage— involved in 1 in 5 serious data breaches. Find 10 tips for employee security to prevent serious incidents at the employee level.

  • WhoDunIt? The Mystery of the Advanced Persistent Threat (APT)

    Sponsored by: Kaspersky Lab

    For companies that experienced a targeted cyberattack, 68% report data loss or exposure as a direct result of the attack. Advanced Persistent Threats (APTs) are even more disconcerting. Learn how to protect your company's sensitive information from APT attacks, and discover real-world examples of companies who used Kaspersky for attribution.

  • How to Enhance AWS Security

    Sponsored by: Splunk

    Here, you'll uncover guidance on enhancing AWS platform security, to quell data protection concerns. Access now to see how AWS can deliver top-notch security, as well as facilitate an adaptive environment armed with the actionable insights needed to help thwart and prevent future threats.

  • Governance, Risk, and Compliance: Transform Inefficient Processes

    Sponsored by: ServiceNow

    Governance, risk, and compliance is a constant concern for enterprises that must keep up with changes in the global regulatory environment and industry standards. Learn how to transform inefficient processes into a unified GRC program.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.