ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Airbus Cybersecurity Strengthens its Threat Intelligence with ThreatQuotient

    Sponsored by: ThreatQuotient

    How do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.

  • Beyond COVID-19 Webinar

    Sponsored by: Hyperproof

    COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.

  • The State of Ransomware 2020

    Sponsored by: Sophos

    Ransomware regularly dominates headlines as one of the most notorious threats facing organizations – but do the successful attacks tell the full story? In this research report, discover what happens when ransomware hits, the impacts of paying the ransom, the emergence of cybersecurity insurance, and more.

  • How is the Role and World of the CISO Changing?

    Sponsored by: Kaspersky Lab

    As cybersecurity risks increase, the role of the CISO becomes more dynamic. 70% of current CISOs report that risk management is now a key part of their role. For more CISO trends, take a look at this survey conducted by 451 Research. Use it to understand what the role of today’s CISOs looks like as well as the top 5 skills to succeed in the role.

  • The Legal Cybersecurity Checklist

    Sponsored by: Arctic Wolf Networks, Inc.

    Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.

  • The CIO’s Cybersecurity Checklist

    Sponsored by: Arctic Wolf Networks, Inc.

    CIOs have never been under more duress than they are under now. An enlarged attack surface coupled with a growing threat landscape means that senior leaders have to dot their i’s and cross their t’s when it comes to network security. Want to stay ahead? View this CIO cybersecurity checklist to know where you are and where you need to be.

  • Charting a Course For Enterprise Risk Management

    Sponsored by: riskconnect

    This e-book will explain what ERM is, why it's worthwhile, and how to begin managing risks and opportunities holistically.

  • Measuring the ROI of an Incident Response Platform

    Sponsored by: Palo Alto Networks

    A Forrester survey found that 80% of businesses had been attacked last year, and only 50% felt they had the right resources to proactively hunt for threats. Organizations tend to place incident response on the backburner, but it’s clear they wish they’d been better prepared for ‘what ifs’. In this guide, learn how to stay ahead of threats.

  • 5 Steps to Determine Residual Risk During the Assessment Process

    Sponsored by: Coalfire

    Governance, risk and compliance-related residual risks are risk factors left over after an organization applies security controls to ensure compliance with laws and regulations. Data management gaps create this risk, but spotting it isn’t impossible. Open this article for 5 steps to identifying and offsetting residual risk during an assessment.

  • Public Cloud Adoption in Financial Services- 7 key considerations for CIOs (Celent paper)

    Sponsored by: IBM

    Access this white paper for 7 critical considerations as financial institutions plan and execute their technology transformation and public cloud migration strategies.

  • Public Cloud Adoption in Financial Services- 7 key considerations for CIOs (Celent paper)

    Sponsored by: IBM

    Access this white paper for 7 critical considerations as financial institutions plan and execute their technology transformation and public cloud migration strategies.

  • Transforming Compliance

    Sponsored by: riskconnect

    This e-book will help you transform compliance from a check-the-box function to a well-oiled machine that seamlessly integrates people, processes, and technology with data-driven visibility to champion the organization's future.

  • Life After Lockdown: A Playbook for Crisis Recovery, Resiliency and Restarting Right

    Sponsored by: riskconnect

    This e-book presents a simple, organized way to recover stronger, build resilience, and restart right to withstand whatever comes next.

  • Risk Management Information Systems: The Buyer's Guide

    Sponsored by: riskconnect

    This e-book will help you decide if a RMIS is right for you – whether you are considering purchasing a RMIS for the first time, replacing a homegrown system, or upgrading an outdated one.

  • Hacker vs CISO: Exploiting and Protecting Your WFH Workforce

    Sponsored by: Tanium

    The hacker is the bane of the CISO, and vice versa. It’s not often that both of these enigmatic personas are in the same room to speak on organizational security and the threat landscape, and during an era of global remote work, their words are quite valuable. Watch this unique webcast to learn perspectives from two opposing security combatants.

  • 92% Of The World’s Top Websites Expose Customer Data To Attackers

    Sponsored by: Tala Security

    It’s no secret that security risk has never been higher, but what’s important is to know the specifics of these risks. Issues such as unintentional data exposure and data leakage via trusted applications are becoming more relevant, and it’s crucial that you know what they mean and how to prevent them. View this report to get the details.

  • Securing Branch Offices and Retail Stores in the Digital Age

    Sponsored by: Palo Alto Networks

    The advancement of the branch office is matched only by the evolution of network threats. With networking solutions such as SD-WAN now on the market, organizations must rethink their branch office security. Read this white paper outline the challenges of branch security and view typical use cases.

  • Penetration Testing Vendor Selection Checklist

    Sponsored by: Synack

    In today’s IT environment, one of the biggest risks to a corporation’s valuation is a security breach. But how does a security team apply their budget in a way that ensures the applications, websites, and other assets are secure? What requirements are the most important? Use this comprehensive checklist to help you evaluate vendors.

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Sponsored by: ComputerWeekly.com

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

  • 7 SIEM Trends to Watch in 2020

    Sponsored by: Splunk

    In the last year alone, demand for SIEM technology has remained strong, with threat management as the primary driver, and general monitoring and compliance secondary. In this white paper, learn about 7 SIEM trends to watch for in 2020.

  • Cyber Resilient Organization Report 2020

    Sponsored by: IBM

    The volume of cybersecurity incidents has risen, causing disruption to IT and business processes. In fact, 51% of organizations reported a significant business disruption during the past two years due to a cybersecurity incident. What did they report regarding cyber resiliency? How are they planning for the future? Read this report to find out.

  • SCCM Upgrade Checklist | Automate Patch Management in the Cloud

    Sponsored by: Automox

    The digital landscape is constantly evolving, and traditional legacy tools are being replaced by cloud-based SaaS alternatives – and patch management is no exception. However, there are some key factors to consider prior to making the switch. Read this article to make sure you’re ready for cloud-based patch management.

  • Paradise Lost: Exploiting the New Distributed Workforce Economy

    Sponsored by: Tanium

    Organizations have noted the widened gaps in IT visibility since remote work became the norm - now it’s time to react. View this white paper to learn how unified endpoint security (UES)/unified endpoint management (UEM) can help detect and prevent these pandemic-related threats.

  • Data Protection Compliance in the UK

    Sponsored by: Zivver

    GDPR has ushered in a new era of data protection for European organizations – but what does data protection and compliance look like for the UK amid their decision to leave the EU? The following e-book highlights the evolution of data protection in the UK and offers a comprehensive checklist for ensuring GDPR-readiness.

  • TCO Study of WSUs and SCCM

    Sponsored by: Automox

    Patch management plays a critical role in ensuring systems are operating properly and protected against attacks. However, like most technology functions, modern enhancements allow organizations to transition from on-premise systems to cloud-based SaaS offerings – but does the SaaS switch make fiscal sense? Read on to find out.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.