ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Assessment Research

  • Bug Bounty Field Manual

    Sponsored by: HackerOne

    Bug bounty programs can be very helpful in finding bugs within your system. They allow your engineering team to secure your systems faster and cheaper than ever before. In this e-book, learn everything you need to know to plan, launch and operate a successful bug bounty program.

  • Reduce Third-Party Risk Management Costs with CyberGRX

    Sponsored by: CyberGRX

    Learn how your organization can utilize a program that streamlines and catalyzes the third-party risk process by sharing one dynamic assessment with many enterprises that can reduce both risk and cost.

  • Back to the Basics: What is Cyber Risk and How Can We Measure It?

    Sponsored by: CyberGRX

    Cyber-risk is a hot topic these days, but, it is often misunderstood or conflated with other cybersecurity and privacy concerns. This resource offers a definition of cyber-risk and outlines a model of measuring cyber-risk.

  • 2019 Report: State of the Phish

    Sponsored by: Proofpoint

    Proofpoint complied and analyzed data from tens of millions of simulated phishing emails sent to end users. They also ran surveys with end-users and infosec professionals. Download the report to discover key findings from their research and recommendations to better protect your organization from phishing attacks.

  • User Risk Report 2018

    Sponsored by: Proofpoint

    Users' personal cybersecurity habits are carrying over into work hours. And, often, infosecurity teams are overestimating end users' understanding of fundamental cybersecurity best practices. In this research report, explore key survey findings that address working adult's cybersecurity knowledge.

  • 2018 Incident Response Insights Report

    Sponsored by: Dell SecureWorks

    In Secureworks 2018 Security Leaders Survey, 43% of respondents said that regular threat hunting activities were part of their incident response program. Access this 29-page research report to uncover best practices and valuable lessons learned over the past year from real-world incidents.

  • Security Maturity: Mapping the Road to Resilience

    Sponsored by: Dell SecureWorks

    Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.

  • How to Reach Cybersecurity Maturity in 5 Critical Steps

    Sponsored by: Dell SecureWorks

    Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.

  • Today's State of Vulnerability Response: Patch Work Demands Attention

    Sponsored by: ServiceNow

    As hackers ramp up their attacks and turn to advanced technologies such as artificial intelligence, it is essential that cybersecurity teams keep pace, fending off attacks and keeping sensitive data secure. In this research report, find a pragmatic roadmap for reducing data breaches.

  • 2019: No Oscars for Bad Threat Actors

    Sponsored by: DomainTools

    There has been a massive increase in the number and types of cybersecurity threats over the years. In this webcast, experts from DomainTools discuss some cyber forecasts and predictions for the coming years including IoT devices, automation, breaches and more.

  • The Beginner's Guide to Mitigating Phishing Attacks

    Sponsored by: DomainTools

    Phishings attacks are a common form of fraud that is most commonly done by disguising malicious links to distribute malware. In this webcast, Corin Imani, Senior Security Advisor at DomianTools discusses real world examples, the steps to executing a phishing attack and ways to remediate a phishing attack.

  • Using Dynamic Data and Advanced Analytics to Secure Your Ecosystem

    Sponsored by: CyberGRX

    Download this webinar to learn about the insights and capabilities that can help you identify which third parties pose the greatest risk to your business.

  • Analytics: The Key to Identifying and Mitigating Third-Party Risk

    Sponsored by: CyberGRX

    Discover how ecosystem analytics allows companies to understand sources and levels of potential risk along from third parties with contextual information and comparative screening.

  • Your Guide to Integrated Risk Management Vendors

    Sponsored by: ServiceNow

    In this Gartner Magic Quadrant report for security and risk management leaders, get a breakdown of the current field of integrated risk management tools and find out which platforms offer the capabilities you need to secure your enterprise and improve compliance.

  • A Force Multiplier for Third-Party Cyber Risk Management

    Sponsored by: CyberGRX

    Take an in-depth look at how Blackstone, one of the world's leading investment firms, was able to access 5X more 3rd party vendors than before and reduce resources by 50%.

  • The Chief Risk Officer and the Dreadful, Horrid, Inefficient, Very Bad Day

    Sponsored by: Smarsh

    Learn how you can handle operational, market, compliance and reputation concerns, and why it is important to get a good handle on your company's electronic communications data.

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

  • Effectively Monitor, Prioritize, and Automate Response to Third-Party Risk

    Sponsored by: ServiceNow

    While assessing vendor risk on a regular basis is critical, it can often be an extremely time-consuming and error-prone exercise involving spreadsheets, email, and rudimentary risk management tools. Learn how to build a more advanced vendor risk management program.

  • Beyond your company boundaries

    Sponsored by: ComputerWeekly.com

    Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly.

  • Focus: how to avoid being hit by ransomware

    Sponsored by: ComputerWeekly.com

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

  • Object Storage 101

    Sponsored by: ComputerWeekly.com

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.

  • Are we trusting social networks too much?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

  • Cyber-Risk Strategies and Models for a Post-Perimeter Age

    Sponsored by: SearchSecurity.com

    In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.

  • Risk Assessment: The Roles Vendors and Frameworks Play

    Sponsored by: BitSight

    Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.

  • Methods for Preventing Hospital Ransomware Infections and Cyberattacks

    Sponsored by: Cisco Umbrella

    The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.