Risk Assessment Research
-
SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation
Sponsored by: BWiseThis E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization.
-
Risk Management: Protect and Maximize Stakeholder Value
Sponsored by: Oracle Corporation UK LtdThis white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.
-
Risk Management: Protect and Maximize Stakeholder Value
Sponsored by: Oracle CorporationThis white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.
-
Enterprise Risk Management: Enabling Risk-Adjusted Management of Strategy and Performance
Sponsored by: SAP AGFind out how SAP software allows you to identify, mitigate, and manage risk so that you can increase visibility into the impact of risks, reduce cost and risk across strategic initiatives, and increase your strategic effectiveness.
-
The Anatomy of a Cross-Site Scripting Campaign
Sponsored by: ImpervaXSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
-
The Unified Physical Infrastructure (UPI) Approach
Sponsored by: PanduitLearn how Panduit, along with an eco-system of Partners can offer a comprehensive and holistic approach called the Unified Physical Infrastructure (UPI) that enables organization to connect, manage and automate critical systems and drive operational, financial and sustainability advantages, and so much more.
-
Risk Never Sleeps: Managing Risk in an Uncertain World
Sponsored by: SunGard Availability ServicesIT professionals are increasingly responsible for doing more than just provisioning servers and maintaining applications – they are core players in the risk management process. Read this whitepaper to learn more.
-
The Impact of Business Analytics on Performance and Profitability
Sponsored by: SASLet it be stated plainly: Business analytics are the key to achieving these challenging objectives. Our world generated more data in 2009 than in the previous recorded history of mankind. A good deal of this data can be converted into useful information and competitive advantage – by applying the right analytics.
-
Rebuilding the Banking Landscape: Restoring Customer Confidence and Returning to Growth
Sponsored by: Micro Focus, LtdThis paper looks at the ways that banks are having to adapt to rise to these challenges, the constraints they face and how innovative changes in IT infrastructure can release time, money and capacity to meet the demands of the new banking landscape.
-
Case Study: WebEx - Securing Web Collaboration
Sponsored by: QualysRead this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers.
-
ZeuS: A Persistent Criminal Enterprise
Sponsored by: Trend MicroThis research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more.
-
Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment
Sponsored by: LumensionRead this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.
-
WagerWorks Takes Fraudsters Out of the Game Using iovation Device Reputation
Sponsored by: iovation, Inc.In this paper WagerWorks covers how to deal with fraud challenges and resolution requirements of the casino industry.
-
Risk Management: Protect and Maximize Stakeholder Value
Sponsored by: Oracle CorporationAll companies must take risks to survive, and the most successful companies are those that actively integrate risk management into their decision-making processes. This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.
-
E-Book: Data loss prevention strategies, practices and tools
Sponsored by: TechTarget SecurityData loss prevention strategies, practices and tools are more important than ever. Read this e-book for expert advice on DLP, encryption, risk management and more.
-
Presentation Transcript: Insider Threats -- an Interview with Bill Crowell -- Former Deputy Director of the NSA
Sponsored by: ImpervaBill Crowell, former Deputy Director of the NSA, is interviewed in this presentation transcript. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection – especially around mission-critical applications and databases.
-
Automating IT Configuration Controls with Oracle Enterprise Manager Configuration Change Console
Sponsored by: Oracle CorporationThis whitepaper discusses how to define, track and enforce IT policies; automate IT compliance processes; and reduce the effort and cost of managing business applications.
-
Leveraging a Maturity Model to Achieve “Proactive Compliance”
Sponsored by: Symantec CorporationRead this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model.
-
A Premium on Efficiency: Midsize Manufacturers Confront the Obstacles to Growth
Sponsored by: SAP America, Inc.How do best-in-class midsize manufacturers continue to grow in a tough economy? This research report, conducted by EIU, outlines measures manufacturers implement to continue expanding even while coping with the strains of softening demand in key markets, rising input costs, and downward pressure on prices.
-
Presentation Transcript: Be Prepared! Leverage SAP PLM to Navigate Through Uncertain Times
Sponsored by: SAP America, Inc.Read this presentation transcript to learn the business value of PLM in an uncertain economy as well as significant trends in the PLM market. Explore SAP's approach to a new generation of product lifecycle management solutions that will help you remain or become a product and services leader.
-
The Business of Sustainability: Information Technology as a Catalyst for Short and Long-Term Profitability
Sponsored by: SAP America, Inc.Read how SAP software can help your company manage risks and exploit operational and business opportunities regarding social, environmental, and economic sustainability.
-
Information Security Magazine, July 09: Controlling Privileged Accounts
Sponsored by: Information Security MagazineThis month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
-
eBook: Compliance for the Midmarket: Governance, Risk and Technology
Sponsored by: TechTarget CIORead this E-book to learn about how you can take a proactive approach to regulatory compliance. Rather than waste time and resources tackling one regulation at a time, find out how companies are looking at the big picture and forming security strategies based on their needs. Sponsored By: Imperva and StoredIQ
-
The Financial Close: Optimizing Performance and Driving Financial Excellence
Sponsored by: SAP America, Inc.The term "financial close" describes a corporation's ability to complete its accounting cycles and produce financial statements for internal management and external legal reporting. This paper identifies solutions to help organizations improve and sustain their close times and address the challenges associated with automating internal controls
-
eBook: Understanding GRC
Sponsored by: TechTargetThis in depth eBook explores all facets of GRC from the complexities of evaluating the right solution for your organization to implementing governance frameworks. Download this exclusive resource today and stay ahead of the GRC curve.