Research Library

Powered by

Risk Assessment Research

  • Vendor Assessment: Print and Document Security

    Sponsored by: HP

    This IDC market report assesses HP as a print and document security services provider and their ability to prevent data and device-level security breaches.

  • Employee & Device Monitoring: Dispelling the Myths

    Sponsored by: Forcepoint

    Watch this webcast to learn how the rise in workforce cyber threats as well as the legal restrictions 3 countries are putting the pressure on CISOs to improve their device monitoring. Then learn how you can create a powerful and proactive insider threat program.

  • Real-Time Threat Prevention lets Managed IT Services Provider Vology Thrive

    Sponsored by: Juniper Networks

    An IT consulting company, Vology sought to protect corporate headquarters and branch offices from advanced threats in email messages and websites. In this case study, discover how Vology turned to an advanced threat protection tool that constantly analyzes email and web files to detect advanced persistent threats

  • Demystifying IT Risk to Achieve Greater Security & Compliance

    Sponsored by: Lynx Technology Partners

    Discover 4 steps to help you create effective risk management so that you can get a better picture of the threats facing your organization and improve your defense against them.

  • Using Threat Analytics to Protect Privileged Access and Prevent Breaches

    Sponsored by: CA Technologies

    The rise in cyberattacks points to one trend: Static access controls are not enough. Read this white paper to learn 4 steps to using analytics to protect your enterprise from threats both inside and outside your organization.

  • Service Visibility: Clear Road Ahead

    Sponsored by: ServiceNow

    How can efficiently mapping IT infrastructure to business critical services increase service visibility and improve your service delivery? This e-book reveals how service visibility can help you quickly spot the IT issues that threaten your business services.

  • Service Outages Assessment Tool

    Sponsored by: ServiceNow

    To better understand your IT service health and your risk for service outages, take a few minutes to complete this Service Outage Health Check scorecard. You'll get insights on risk factors that can cause service outages, disrupt your business, and ultimately impact ļ¬nancial performance.

  • The Bulletproof Brief: How to Get Your Next Digital Project Off to the Start it Deserves

    Sponsored by: Energized Work

    In this resource, uncover 7 key points to help you kick-start the process pf creating a bulletproof brief and set your project up for success from the start.

  • 5 Practical Ways to De-Risk Your Big Projects

    Sponsored by: Energized Work

    Every project carries risk, and if it doesn't, it's probably not going to add much value to your business. Learn how to effectively manage goals, communication, and user acceptance when undergoing complex digital business projects.

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    Sponsored by:

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

  • Effectively Monitor, Prioritize, and Automate Response to Third-Party Risk

    Sponsored by: ServiceNow

    While assessing vendor risk on a regular basis is critical, it can often be an extremely time-consuming and error-prone exercise involving spreadsheets, email, and rudimentary risk management tools. Learn how to build a more advanced vendor risk management program.

  • Strengthen Your Ransomware Strategy

    Sponsored by: AdvizeX Technologies

    Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.

  • Beyond your company boundaries

    Sponsored by:

    Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly.

  • Key Issues for E-Discovery and Legal Compliance

    Sponsored by: Smarsh

    Managers are often worried their organizations will be sued at some point, but most aren't adequately prepared to deal with e-discovery issues. In this Osterman Research report, uncover insight from the results of an in-depth survey of decision makers and influencers at mid-sized and large organizations.

  • How this Large North American Retail Chain Achieves Compliance, Minimizes Risk, and Mitigates Threats

    Sponsored by: Rapid7

    In this case study, learn how, by adopting this vulnerability scanning system this North American retail chain's IT team able to go beyond compliance assessments to get actionable security information, and more.

  • When Software Goes Rogue

    Sponsored by: BDNA

    How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.

  • Focus: how to avoid being hit by ransomware

    Sponsored by:

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

  • Innovation and Technology for GRC

    Sponsored by: Navex Global

    A comprehensive governance, risk and compliance program enables enterprise leaders to mitigate risks, reduce compliance breaches, and improve business performance. This roundtable resource provides detail into governance, risk and compliance programs through insight from 6 experts in the field, who answer 11 relevant questions.

  • Definitive Guide to Compliance Program Assessment

    Sponsored by: Navex Global

    A strong ethics and compliance program improves organizational culture, protects corporate reputation and enhances employee engagement. This compliance guide offers organizations assistance in evaluating and improving their ethics and compliance programs through industry evidence and insights.

  • Anti-Bribery and Corruption Risk Assessment Checklist

    Sponsored by: Navex Global

    This Anti-Bribery and Corruption Risk Assessment Checklist outlines how to implement an effective anti-bribery compliance program using a methodology of protecting, detecting and correcting to manage core program components.

  • Cyber security solutions from IBM

    Sponsored by: IBM

    Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection.

  • Develop Your Information Security Management System

    Sponsored by: SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

    This Forrester Research report explores how to use an information security management system (ISMS) to improve risk management and strengthen security processes. Find out how to derive daily value from an ISMS, increase customer data protection, leverage KPIs and threat intelligence, and more.

  • Why Organizations Still Struggle to Digitally Transform & Innovate

    Sponsored by: TechData - Veeam

    Over 80% of enterprises deal with a data availability gap. Do you know how many millions that gap is costing you? Access this white paper to learn how to close the availability and protection gaps, quantify your availability goals, see how these challenges are impacting your digital transformation strategies, and more.

  • Managed Detection and Response

    Sponsored by: Dell SecureWorks

    Being resilient to a threat from an advanced adversary is dependent on your organization's integrated capabilities to quickly detect them and respond. In this white paper, learn how you can employ and tune the security tools at your organization to combat today's threats.

  • Risk Assessment: The Roles Vendors and Frameworks Play

    Sponsored by: BitSight

    Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.