ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Global CISO Playbook for the New Normal

    Sponsored by: Fidelis

    It’s arguable that CISOs have the toughest job in the world right now. Growing cyber terrains, evolving threat landscapes and skill shortages are all placing more pressure on these professionals than ever before. Download this e-book to hear from the CISO of Fidelis Cybersecurity as he outlines strategies and best practices for cyber defense.

  • Vendor Portfolios for Secure Web Gateways

    Sponsored by: Netskope

    Vendors are expanding their core secure web gateways (SWG) to add more security features such as CASB, zero-trust network access, FWaaS and remote browser isolation. Download this Gartner Magic Quadrant to examine broader portfolios that may help you consolidate security vendors.

  • SASE and the Forces Shaping Digital Transformation Part 3: Government and Industry Regulations, and Global Social and Economic Forces

    Sponsored by: Netskope

    SASE adoption must be done with an awareness of not just governmental and industry regulations, but also shifts in security budgets, the economy at large and even global conflicts and trade wars. View this blog post exploring SASE and these forces shaping digital transformation.

  • Navy Federal Credit Union on Security During Crisis

    Sponsored by: Synack

    Leading an organization or a team during the COVID-19 pandemic is a challenge regardless of title. However, the CISO is uniquely armed with the skills to respond, manage and lead a team during crisis. In this podcast, hear from the CISO of Navy Federal Credit Union as he shares his methods for building trust and maintaining business as usual.

  • How to Manage Risk and Compliance for Financial Services

    Sponsored by: BigID

    While meeting compliance standards is a requirement for financial services institutions, the sad reality is that many companies don’t have as much of a handle on their data as they might think. Download this white paper to learn how BigID can help financial organizations organize, secure, and regulate their data across multi-cloud ecosystems.

  • Innovation Insight For Extended Detection And Response

    Sponsored by: Palo Alto Cortex

    Disparate risk management teams and security tools make it difficult to efficiently mitigate threats. This Gartner report highlights the risks and advantages of today’s leading extended detect and response (XDR) tools – designed to unify incident detection and response efforts into a single platform.

  • Dealing with VUCA

    Sponsored by: InteliSecure

    Today’s IT and security leaders are responsible for dealing with VUCA – volatility, uncertainty, complexity, and ambiguity – and address data security risks in an ever-changing landscape. Read this InteliSecure e-guide to address the elements of VUCA and build agile data protection.

  • The New Workplace: Modernizing Security, Compliance and Remote Work

    Sponsored by: Microsoft

    Today, nothing is more important than empowering your remote workforce with modern, integrated, resilient, cloud-enabled security and compliance protections. Check out this information hub to help you address your most pressing workplace challenges today.

  • Improve Security & Compliance

    Sponsored by: Red Hat

    Speed and response time are essential in reducing the impact of data breaches – in fact, containing a breach within 200 days or less reduced the overall cost of a breach by more than 50% in 2020. Read this e-book to learn more about how to improve security, reduce risk and ensure compliance.

  • Arrow & RSA Video 2: Protect and Optimize Your Workforce with RSA SecurID Access

    Sponsored by: Arrow & RSA

    Digital transformation initiatives and approaches to remote workers have accelerated, and these changes bring new challenges and risks. In this webinar, learn how to address these new risks from an identity and access management perspective and how new capabilities in RSA SecurID Access strive to help you succeed in today’s environment.

  • Reducing Security Risk in the Financial Services Industry

    Sponsored by: AWS Rapid7

    A report from the Department of Digital, Culture, Media and Sport revealed almost half of UK businesses (46%) have had cybersecurity breaches or attacks in the last 12 months. The financial services industry is a prime target for such attacks, but by absorbing this white paper, you can learn measures to take to reduce organizational risk.

  • Continuous Compliance on AWS

    Sponsored by: AWS Mphasis/Stelligent

    Most of the typical activities involved in compliance are nothing more than ‘risk management theater’: a mere spectacle that has very little to do with assessing or reducing actual risk. What if there was a way AWS users could assess, audit and evaluate the configurations of their AWS resources on a continuous basis? This webcast explains how.

  • Evaluating Data-Centric Protection Solutions

    Sponsored by: Comforte AG

    Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.

  • The Maturity Model for Governance, Risk, and Compliance

    Sponsored by: Aptible

    For more than a decade, the GRC framework has helped companies maintain their data integrity and manage risk in an increasingly digital world. But with compliance growing more and more complex, your GRC operations need to mature as your business does. Scrutinize this guide to understand how to evolve your GRC model in 4 levels.

  • How to Level Up Your Access Control

    Sponsored by: Aptible

    As an organization grows, more users and more systems mean exponentially more reviews. As compliance professionals know, this can become an unmanageable task – especially without the right tools. How can you help your organization to develop better access control? This guide from Aptible may provide the answer.

  • Gett Gains Competitive Edge

    Sponsored by: Panorays

    Gett, a European on-demand car service, was looking for a better way to manage their third-party security. Currently, their vendors underwent a lengthy vetting process to check that their security posture was strong. However, Gett wanted to streamline this process. In this case study, learn how they was able to do this with the help of Panorays.

  • Taking Your Third Party Security Program to the Next Level

    Sponsored by: Panorays

    Today, every organization’s attack surface is growing. It is growing for several reasons, including because organizations are outsourcing large portions of their IT systems to cloud providers, thereby adding their “bubble” to your own. In this webcast, learn how you can upgrade your third-party security program.

  • The CISO's Guide to Rapid Vendor Due Diligence

    Sponsored by: Panorays

    In 2019, nearly half of companies experienced a significant data breach that came through a third party. In response, security pros have begun demanding that vendors demonstrate and maintain healthy security habits. Read this e-guide to discover 7 critical capabilities of a rapid vendor due diligence program.

  • Creating a Culture of Security

    Sponsored by: HelpSystems

    You can invest in all the security tools you want, you can provision every security tool correctly and you can eliminate as much risk as possible – but if your organization is not creating a culture of security, you’re nowhere. Enter this white paper and extract 4 steps to cultivating security awareness among your network’s users.

  • NetApp AI Solutions for Financial Services

    Sponsored by: NetApp

    The financial services industry is increasingly relying on AI and ML technologies like NetApp ONTAP AI with cloud-connected all-flash storage to improve their defenses and better serve their customers. Check out this data sheet to learn 3 key benefits of NetApp ONTAP AI.

  • How to Elevate Your Threat Intelligence Program

    Sponsored by: DomainTools

    According to the SANS 2020 Cyber Threat Intelligence Survey, 82% of organizations find value in threat intelligence, however, only 4% of respondents had processes in place to measure effectiveness. So, how do you demonstrate and quantify the value of your threat intelligence program? View this Forrester-sponsored webcast to learn the answer.

  • Evaluating and Measuring DDoS Risk During the COVID-19 Era

    Sponsored by: Akamai Technologies

    Distributed denial-of-service (DDoS) attacks range from small and sophisticated to large and bandwidth-busting. Unplanned outages are costly, requiring fast and effective DDoS mitigation. Join Dennis Birchard, Akamai’s Lead Principal Cloud Security Architect, to learn about DDoS trends, mitigation strategies and more.

  • How to Identify Threats Faster and Increase Productivity

    Sponsored by: DomainTools

    With the rapid-fire speed of alerts and multitasking required in infosecurity, security operation center (SOC) professionals often must determine the potential outcomes of events with limited context. How can your teams reduce operational risk and be more productive? Watch this webinar to learn how to address this challenge and others.

  • Success Patterns for Supply Chain Security

    Sponsored by: Panorays

    Threats targeting supply chains are on the rise, impacting businesses across all 3 elements of the confidentiality, integrity and availability (CIA) triad. The following SANS whitepaper further explores these challenges and highlights the key components of an effective supply chain security program – read on to get started.

  • NWN SecureX Online Workshop

    Sponsored by: NWN Corporation

    Today’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.