ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Assessment Research

  • SOAR in The Real World Survey

    Sponsored by: D3 Security

    Over the past few years, SOAR has emerged as an important tool for large organizations in their perpetual fight against data breaches, ransomware, and other cyberattacks. The evolution of SOAR has been rapid. In this report, learn everything you need to know about SOAR.

  • How the Now Platform Enables Effective Cybersecurity and Risk Presentations to the Board of Directors

    Sponsored by: ServiceNow

    Read about the common challenges that IT, security, risk, and audit leaders often face when meeting with their board of directors and how to overcome them.

  • Denver Simplifies and Accelerates Vendor Risk Management with ServiceNow

    Sponsored by: ServiceNow

    For the city and county of Denver, information security is critical. The organization deals with many different types of sensitive information, including the personal data of its citizens. This case study reveals how ServiceNow was able to simplify its vendor experience with a risk survey portal, automated backend processes, and much more.

  • Continuous Risk Monitoring for Vulnerabilities

    Sponsored by: ServiceNow

    In this demo, take a closer look at ServiceNow’s continuous risk monitoring platform and discover how it can help your organization meet its GRC standards by identifying the risks of unpatched vulnerabilities and resolving them quickly. Continue to watch the complete presentation.

  • Complexity in Cybersecurity Report 2019

    Sponsored by: IBM

    The evolving nature of security has led organizations to adopting a wide array of disjointed security tools. This overly siloed environment leads to complexity, which ultimately affects overall security efficacy. In this report, uncover results from a Forrester study into the current state of security complexity & the effect it’s having.

  • Managed Vulnerability Assessment

    Sponsored by: Arctic Wolf Networks, Inc.

    In this buyer’s guide, discover how vulnerability assessment and management can give you the visibility you need to prioritize security tasks.

  • Cyber Risk Spotlight Report: 11 Metrics to Watch

    Sponsored by: Arctic Wolf Networks, Inc.

    According to Gartner, it takes hackers on average fewer than 8 days to exploit a vulnerability. In this report, dive into the key metrics every security team needs to better secure their operations and help prevent cyberattacks.

  • Supporting GRC with Business Continuity and Disaster Recovery

    Sponsored by: Cirrus Data Solutions

    Read this exclusive guide to discover how BC can support GRC initiatives and how to use the data acquired during BIA and RA activities to support GRC.

  • Threats of Surveillance Tools: Spyware and Stalkerware

    Sponsored by: RSA Conference

    Digital monitoring of workers, children and spouses is more commonplace than ever. But what happens when the line between monitoring and spying becomes blurred? Tune in to this RSAC podcast as two security experts share the work they’ve been doing to help protect victims and their personal data from unwanted surveillance.

  • Leading Change for CISOs: Embedding a Secure Culture

    Sponsored by: RSA Conference

    There was a time when cybersecurity was strictly a concern for IT departments, but those days are long gone. In today’s far-reaching threat environment, cybersecurity needs to be baked into the very fabric of a company. In this webcast, learn how organizations can leverage organizational change models for an all-inclusive culture of security.

  • ThreatQ for Government Agencies

    Sponsored by: ThreatQuotient

    As government agencies are considered critical infrastructure, they are under constant attack from hackers, political activists and foreign state-sponsored actors. The first step to detecting, responding and recovering from incidents is finding a way to increase situation awareness. Download this brief to learn more.

  • Protecting Intellectual Property: Black, White, and Shades of Gray

    Sponsored by: InteliSecure

    Complying with data privacy regulations is important, but rarely is regulated data the only data worth protecting. Losses associated with regulatory fines present far less risk than the potential losses associated with intellectual property theft. In this white paper, learn how a data protection program can help you protect even unstructured IP.

  • 6 Practical Approaches to Bridge the Cybersecurity Talent Shortage

    Sponsored by: Alert Logic

    Many organizations are adopting new and emerging technologies faster than they can address related security issues. The situation is further exacerbated by the industry’s skills and resources gap. In this white paper, discover 6 practical approaches to bridge the cybersecurity skills and resource gap in your organization.

  • Ransomware - Protect Your Data

    Sponsored by: Commvault

    One trend that is gaining popularity in ransomware recovery is a holistic solution with an ability to align recovery operations to the value of the data. Tune into this webcast to view the key takeaways from this Gartner research, analyze real-world ransomware case studies, and discover the 4 key elements of a risk mitigation strategy.

  • New Topics on the New Security+ SY0-501 Exam

    Sponsored by: Global Knowledge

    In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.

  • Machine Learning Applications for Banking Fraud Detection

    Sponsored by: Dataiku

    AI-based systems can augment regulatory alert systems and improve analysts’ workflow by reducing noise without discarding results. Access this paper to view the 3 types of anomalies to look out for, understand examples of how banks use fraud and anomaly detection, and learn how to build a basic, machine learning-based fraud detection system.

  • Beginner's Guide to Employee Monitoring

    Sponsored by: ActivTrak

    On the surface, employee monitoring systems might seem like a fancy way to babysit employees. However, this technology stands as a far more valuable tool than people give it credit for. In this white paper, learn about several security benefits of employee monitoring systems.

  • Respond to the Changing Mobility Landscape

    Sponsored by: Smarsh

    As employees rapidly adopt mobile devices for work communications, a challenge was created for organizations needing to capture and review all business communications for regulatory or public records response purposes. In this white paper, learn how organizations can build a strong, compliant mobility ecosystem.

  • State and Local Governments Chart Their Path Toward Improved Digital Security

    Sponsored by: Dell Technologies

    State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.

  • IT Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell Technologies

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

  • Accelerating Security Response

    Sponsored by: ServiceNow

    While financial institutions have always been aware and working on reducing threats, new challenges continue to emerge, making it ever harder to keep managing risks and resources in this critical area. In this white paper, learn about some of these new challenges and how financial institutions are leveraging ServiceNow to address them.

  • Critical Watch Report: 2019

    Sponsored by: Alert Logic

    SMBs are under greater pressure than ever to address cyberthreats. The principal challenge for SMBs is that they must face these threats with fewer security resources than large enterprises. In this report, explore 9 takeaways that illustrate SMBs difficulties to keep pace with the changing security landscape.

  • Evaluation Criteria for Choosing an ICS Cybersecurity Monitoring System

    Sponsored by: Claroty

    A rapidly changing threat landscape, combined with convergence between traditional IT and industrial control networks is having a dramatic impact on the risk to industrial control systems. In this white paper, explore key criteria leading organizations are using to evaluate and select an appropriate monitoring system for industrial networks.

  • Enabling Effective Data Protection

    Sponsored by: InteliSecure

    Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.

  • Ransomware Attacks: How to Get the Upper Hand

    Sponsored by: Cisco Umbrella

    The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.