Risk Assessment Research
-
Information Security Threats: Building Risk Resilience
Sponsored by: TechTarget SecurityEnterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
-
Targeted attacks: Preparation and Mitigation
Sponsored by: TechTarget SecurityThis expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.
-
Guide to OCC updates to governance ruling
Sponsored by: Iron MountainConsult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.
-
An Expert Guide to the PCI DSS 3.0
Sponsored by: TechTarget SecurityThis expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
-
Identity Management: Implementation And System Support
Sponsored by: OpenIAMIn this e-guide, IT experts Randall Gamby and Nilesh Shirke discuss how identity and access management (IAM) and compliance influence each other to help organizations meet business initiatives. Click now for implementation best practices and IAM benefits that go beyond security.
-
EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager
Sponsored by: IBMMany security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data.
-
The State of Next-Generation Market- and Credit-Risk Analytics
Sponsored by: IBMAccess the following white paper to gain a firsthand look at the next-generation market and credit-risk analytics that are helping many companies through this touch economic time.
-
Business Transformation: Exploring the Requirements of a Strategic Business Transformation
Sponsored by: Hewlett-Packard EnterpriseTo keep up with market demands and trends, it is important for organizations to transform their business. This guide explores business transformation and how it reduces risk and cost
-
Mastering Risk with Business Forecasting
Sponsored by: IBMThis paper discusses how it is risk management practices that play a key part of managing risk today, and shows how developing a more sophisticated understanding of risk and building the management capabilities to match can help organizations stay afloat during tumultuous times.
-
Rentokil Initial Improves Software Asset Management
Sponsored by: Flexera SoftwareRentokil Initial, one of the largest business services companies in the world, was struggling with managing their software assets. In this case study, find out how Rentokil was able to implement a mature software asset management process and gain complete control over their software licenses, for reduced costs and lower risk.
-
6 Steps to SIEM Success
Sponsored by: AT&T CybersecurityIn this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
-
Three Mistakes Companies Make When It Comes to Vulnerability Management
Sponsored by: Core Security TechnologiesIn this resource, get 3 self-assessment questions to establish whether or not your approach to vulnerability management is truly successful at mitigating future security risks.
-
Liquidity risk management; Assessing and planning for adverse events
Sponsored by: IBMThis paper takes a close look at the factors involved in the recent crisis and the patterns that resulted in widespread liquidity problems. It also points to specific vulnerabilities faced by financial institutions currently, and highlights best practices for liquidity risk management
-
An insurance firm eases regulatory compliance while reducing risk
Sponsored by: IBMLearn how an insurance firm worked with IBM to ease its regulatory compliance while reducing risk.
-
Beyond the Next Generation: Meeting the Converging Demands of Network Security
Sponsored by: IBMRead this whitepaper to learn more about rising to the converging demands of network security. Topics covered include the evolution of network security, the development of "next-generation" approaches, use cases and more.
-
Strategy guide to business protection for hospitals
Sponsored by: HP and Intel® Xeon® processorsThis white paper demonstrates how hospitals can manage risk and keep critical IT infrastructure up and running. Read now to learn how you can avoid unplanned downtime, ensuring compliance and the highest quality of patient care.
-
IT Reputational Risk Study Overview
Sponsored by: IBMThis short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
-
Where BCDR and GRC Come Together: A CIO's Guide
Sponsored by: EssextecIn this e-guide, our experts from SearchSecurity.com will help you establish better security with this IT disaster preparation and recovery guide for enterprise CIOs.
-
Threat Detection (Antivirus Intrusion Prevention)
Sponsored by: TechTarget SecurityAntivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
-
The Custom Defense - Your Answer to APTs
Sponsored by: Trend MicroExplore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
-
Combating risk with predictive intelligence: An analytical approach to enterprise risk management
Sponsored by: IBMView this resource to learn more about how your organization can respond and increase their focus on refining sales and operations planning processes. It outlines how companies can reevaluate and distribute their channel strategies and strengthen relationships.
-
Calculating Cloud ROI : From the Customer Perspective
Sponsored by: TechTarget ComputerWeekly.comThis white paper lays out a framework to help IT and business decision makers calculate the return on investment of cloud services.
-
Risk Management for Cloud Computing
Sponsored by: TechTarget CIOThis expert resource provides in-depth insight and risk management advice for IT leaders looking to benefit from the cloud. Read now for 20 questions that should be asked of every cloud provider, as well as well as advice for creating harmony between compliance and information security functions, and much more.
-
Network Security Essential Guide
Sponsored by: TechTarget SecurityThe increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy.
-
Cloud Costs and Management Considerations
Sponsored by: CSCThis expert E-Guide provides considerations you should keep in mind when moving to the cloud – especially when it comes to security and risk tolerance – and offers expert advice on how to foster cloud adoption in your enterprise.