Risk Assessment Research
-
2010 Endpoint Risk Assessment: Internal Vulnerabilities
Sponsored by: PromisecThis study will show you the most common security issues that were found and how they were dealt with by the various organizations.
-
Internal Controls Checklist for Corporate Data Protection and Compliance
Sponsored by: TechTarget SecurityIn this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
-
Methodology for Information Quality Management
Sponsored by: Harte-Hanks Trillium SoftwareThis paper discusses how Trillium Software extends that principle to ensure services are driven by data governance defining the criticality and use for the data, and establishing roles and responsibilities within the business and IT to achieve business goals and objectives.
-
Presentation Transcript: Client-Side Security Issues - The Twilight Zone of Web Security
Sponsored by: IBMThis presentation transcript discusses the various types of JavaScript client-side issues that exist in today’s Web applications, their prevalence on the internet and how to locate and fix them.
-
Handle with Care: Calculating and managing risk is tricky business
Sponsored by: TechTarget ComputerWeekly.comIn this inaugural issue of Information Security Europe, our cover story dives-deep into the difficult task of calculating and managing risk in the ever-changing European threat landscape.
-
The Systems Engineering Balancing Act: Choosing an Optimum Development Approach
Sponsored by: IBMThis thought leadership white paper proposes a combination of requirements-driven, model-driven and test-driven approaches as a mechanism for delivering systems development projects at a reduced cost and risk.
-
Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives
Sponsored by: ISACAGlobalization and recent economic pressures have resulted in increased requirements for the availability, scalability and efficiency of enterprise information technology (IT) solutions.
-
E-Guide: Risk Management and Compliance Enforcement for the Financial Industry
Sponsored by: IBMThis e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models.
-
Smart Decision Making in the Era of New Financial Challenges
Sponsored by: Oracle CorporationRead this white paper to learn why the Monte Carlo modeling method provides a beacon of financial sanity and reliability at time when consumer confidence is at an all-time low and managers face new levels of accountability and keen public scrutiny in their decision-making.
-
Optimize Data Management for Smarter Banking and Financial Markets E-Book
Sponsored by: IBMThis e-book explains how smarter banks can anticipate customer needs and deliver innovative products faster, more consistently and more nimbly than the competition. They have full visibility of their risk position and customer needs. And they respond quickly to both challenges and opportunities. Read on to learn how to become a smarter bank.
-
IBM Smart Analytics System offerings powered by IBM System X Servers video
Sponsored by: IBMThis 8 minute video illustrates how customers can quickly turn data into insights to support analytics, reporting and BI needs with solutions built on IBM System x, IBM System Storage and IBM Software.
-
Information Security Magazine: “Health Care Data Protection”
Sponsored by: Information Security MagazineThis month’s Information Security Magazine Online cover story dissects the recent HIPAA revisions made by the HITECH Act.
-
E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
Sponsored by: Safestone TechnologiesThis expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
-
March Issue of Information Security magazine: “Virtual Certainty: VMs introduce a new security dynamic”
Sponsored by: Information Security MagazineThis month’s Information Security Magazine Online cover story explores the need for sound security and risk management strategies around virtualization technology.
-
Presentation Transcript: Taming the Data Demons: Leveraging Information in the Age of Risk
Sponsored by: IBMCheck out this presentation transcript from IBM as it discusses the advantages of implementing a holistic approach to data risk management, and provides both the “why” and “how” to begin putting a holistic data risk management program to work in businesses of all sizes.
-
Presentation Transcript: Protect Data and Client Trust - An End-to-End Approach to Protecting Your Client Applications and Organizations
Sponsored by: IBMThis presentation transcript of the webcast “Protect Data and Client Trust: An End-to-End Approach to Protecting Your Client Applications and Organizations” outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization.
-
Strengthening Governance, Risk, and Compliance in the Banking Industry
Sponsored by: SAP America, Inc.Learn the reasons why a holistic view of risk in your company is essential in times of financial turbulence - and how many companies are adding value through governance, risk, and compliance (GRC) initiatives. Read this report to learn more. (Economist Intelligence Unit, 2009)
-
Presentation Transcript: What’s New with Rational Application Security?
Sponsored by: IBMEvery day, more and more business is conducted online creating new challenges for meeting web application security and compliance. This presentation transcript explores an approach that will help your organization address today’s biggest threats.
-
E-Book: Standardizing Business Continuity
Sponsored by: IBMDownload this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
-
E-Guide: How Risk Management Standards Can Work For Enterprise IT
Sponsored by: ArcSight, an HP CompanyEvery organisation should be able to articulate how IT threats can harm a business. In this e-guide, Forrester Research Analyst Chris McClean explains how a five-step risk management strategy can add value to the rest of the organisation.
-
E-Guide: Monitoring Strategies for Insider Threat Detection
Sponsored by: ArcSight, an HP CompanyInsider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.
-
E-Book: Technical Guide on Application Security: Scanning Production Applications
Sponsored by: IBMThis e-book explores how many of the risks associated with scanning can be avoided with careful planning and by focusing your scans on exploring where and how a system is vulnerable to attack and not trying to simulate an actual attack. Continue reading to learn more about scanning production applications.
-
E-Book: Technical Guide on Application Security: Secure Development
Sponsored by: IBMWhen security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
-
Presentation Transcript: Understanding Risk: An Opportunity for IT Managers
Sponsored by: IBMThis presentation transcript of the webcast “Understanding Risk: An Opportunity for IT Managers” outlines the results of an IBM Global Risk Study that was commissioned to understand how IT managers are working to understand and mitigate risk.
-
E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security
Sponsored by: IBMRead this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.