ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Assessment Research

  • Top 3 Security Risks for your SD-WAN Implementation

    Sponsored by: BT

    The visibility, control and agility that an SD-WAN can deliver to a global organization makes it very attractive, but it can come with significantly higher risks. In this webcast, Kevin Brown, Adrian Comley and Peter Sader discuss the top 3 security risks you need to consider to make sure your SD-WAN implementation is secure.

  • InfoSec Risk Management in Healthcare Environments a Primer to Assessing Technical Risk

    Sponsored by: CI Security

    In some healthcare organizations, risk assessment and risk management as it relates to cybersecurity are a bit of a mystery. In this white paper, learn how to assess your IT security risks.

  • 4 Ways SailPoint Predictive Identity Puts You in Control

    Sponsored by: SailPoint Technologies

    As digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.

  • For Dummies: Digital Transformation and Risk, ServiceNow Special Edition

    Sponsored by: ServiceNow

    In this For Dummies e-book, you’ll learn everything you need to know about digital risk management 101. Inside, find out how you can understand the different types of risks, establish policies, controls, and monitoring best practices, and apply 5 tips for secure digital transformation success.

  • Secureworks Security Maturity Model

    Sponsored by: Dell SecureWorks

    The Secureworks Security Maturity Model is designed to help organizations evaluate and understand their current security maturity in order to develop strategies and target areas for improvement. Want to learn more? View this webcast today.

  • The Pressing Need for Comprehensive Cyber Risk Management

    Sponsored by: ServiceNow

    There is a growing requirement to be able to assess and mitigate cybersecurity risks associated with IT environments. To get more insight into this trend, ESG surveyed IT and cybersecurity professionals involved in planning, implementing, and enforcing IT risk management. Download this research report to explore key findings.

  • 10 Cybersecurity Steps You Can Start on Today

    Sponsored by: Crosskey Cyber Security

    As a business leader in a small or medium sized high-risk business, you are overwhelmed by many things. And threats and regulatory requirements keep multiplying. In this blog post, explore a list of 10 cybersecurity steps you can start on today.

  • Evaluating Vendor Risk Management

    Sponsored by: Atlassian

    As organizations continue to adopt cloud services, assessing the security risk of each service through a standardized evaluation process becomes critical to preventing data breaches. This guide is designed to help your organization develop a security risk scoring system to evaluate potential risks. Download the guide to learn more.

  • Pulsant Delivers Complete Peace of Mind to Scottish Building Society

    Sponsored by: Pulsant

    The Scotland Building Society needed risk and revenue loss mitigation capabilities and a secure location for its production servers. Access this case study to view the disaster recovery solution that SBS implemented and the results that it led to, which included a resilient, highly secure data center.

  • SAP Compliance Risk Dashboard Appsian Real-Time Analytics

    Sponsored by: Appsian

    Compliance mandates such as SOX, GDPR, CCPA and others require organizations to maintain details of data access. View this data sheet to see how Appsian’s Compliance Risk Analytics dashboard equips SAP customers with direct, real-time visibility into the activity around high-risk business transactions.

  • How the Now Platform Enables Effective Cybersecurity and Risk Presentations to the Board of Directors

    Sponsored by: ServiceNow

    Read about the common challenges that IT, security, risk, and audit leaders often face when meeting with their board of directors and how to overcome them.

  • Denver Simplifies and Accelerates Vendor Risk Management with ServiceNow

    Sponsored by: ServiceNow

    For the city and county of Denver, information security is critical. The organization deals with many different types of sensitive information, including the personal data of its citizens. This case study reveals how ServiceNow was able to simplify its vendor experience with a risk survey portal, automated backend processes, and much more.

  • Continuous Risk Monitoring for Vulnerabilities

    Sponsored by: ServiceNow

    In this demo, take a closer look at ServiceNow’s continuous risk monitoring platform and discover how it can help your organization meet its GRC standards by identifying the risks of unpatched vulnerabilities and resolving them quickly. Continue to watch the complete presentation.

  • Managed Vulnerability Assessment

    Sponsored by: Arctic Wolf Networks, Inc.

    In this buyer’s guide, discover how vulnerability assessment and management can give you the visibility you need to prioritize security tasks.

  • Cyber Risk Spotlight Report: 11 Metrics to Watch

    Sponsored by: Arctic Wolf Networks, Inc.

    According to Gartner, it takes hackers on average fewer than 8 days to exploit a vulnerability. In this report, dive into the key metrics every security team needs to better secure their operations and help prevent cyberattacks.

  • Supporting GRC with Business Continuity and Disaster Recovery

    Sponsored by: Cirrus Data Solutions

    Read this exclusive guide to discover how BC can support GRC initiatives and how to use the data acquired during BIA and RA activities to support GRC.

  • Threats of Surveillance Tools: Spyware and Stalkerware

    Sponsored by: RSA Conference

    Digital monitoring of workers, children and spouses is more commonplace than ever. But what happens when the line between monitoring and spying becomes blurred? Tune in to this RSAC podcast as two security experts share the work they’ve been doing to help protect victims and their personal data from unwanted surveillance.

  • Leading Change for CISOs: Embedding a Secure Culture

    Sponsored by: RSA Conference

    There was a time when cybersecurity was strictly a concern for IT departments, but those days are long gone. In today’s far-reaching threat environment, cybersecurity needs to be baked into the very fabric of a company. In this webcast, learn how organizations can leverage organizational change models for an all-inclusive culture of security.

  • ThreatQ for Government Agencies

    Sponsored by: ThreatQuotient

    As government agencies are considered critical infrastructure, they are under constant attack from hackers, political activists and foreign state-sponsored actors. The first step to detecting, responding and recovering from incidents is finding a way to increase situation awareness. Download this brief to learn more.

  • Protecting Intellectual Property: Black, White, and Shades of Gray

    Sponsored by: InteliSecure

    Complying with data privacy regulations is important, but rarely is regulated data the only data worth protecting. Losses associated with regulatory fines present far less risk than the potential losses associated with intellectual property theft. In this white paper, learn how a data protection program can help you protect even unstructured IP.

  • New Topics on the New Security+ SY0-501 Exam

    Sponsored by: Global Knowledge

    In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.

  • Machine Learning Applications for Banking Fraud Detection

    Sponsored by: Dataiku

    AI-based systems can augment regulatory alert systems and improve analysts’ workflow by reducing noise without discarding results. Access this paper to view the 3 types of anomalies to look out for, understand examples of how banks use fraud and anomaly detection, and learn how to build a basic, machine learning-based fraud detection system.

  • Respond to the Changing Mobility Landscape

    Sponsored by: Smarsh

    As employees rapidly adopt mobile devices for work communications, a challenge was created for organizations needing to capture and review all business communications for regulatory or public records response purposes. In this white paper, learn how organizations can build a strong, compliant mobility ecosystem.

  • Tanium for Mergers & Acquisitions

    Sponsored by: Tanium

    The mergers and acquisitions outlook continues to show strong growth. However, acquiring companies face a long list of risks that must be assessed and carefully accounted for during due diligence. In this brief, learn how Tanium can help organizations accelerate the due diligence process and reduce risk.

  • Ransomware Attacks: How to Get the Upper Hand

    Sponsored by: Cisco Umbrella

    The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.