ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Infographic: 5 questions to ask when creating a ransomware recovery plan

    Sponsored by: ComputerWeekly.com

    Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.

  • Top Challenges in a Software Audit Guide

    Sponsored by: ClearEdge

    It's bound to happen and it's probably coming sooner than you think: The dreaded software audit. Licensing compliance audits are standard practice for software publishers, and it's wise to take steps to prepare. This whitepaper teaches you how to get ready and respond.

  • Software Audit Response Guide

    Sponsored by: ClearEdge

    When you get audited, it's important to take appropriate steps and set the proper tone at the outset. Seemingly innocuous actions and omissions on your company's part can create significant downside in the findings from a software licensing audit. Get a Software Audit Checklist that lays out "7 Dos & 7 Don'ts" to survive your next audit.

  • Concentric AI Demo: Using Semantic Intelligence™ for Remote Work Risk Mitigation

    Sponsored by: Concentric

    Tune in to this short demo to learn how Concentric AI’s Semantic Intelligence™ helps you find risk in unstructured files in complex work from home environments, quickly and efficiently.

  • How to Shrink Supply Chain Risk

    Sponsored by: TechTarget

    The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.

  • Risk-Based Authentication A Critical Element To Any Zero-Trust Deployment

    Sponsored by: WatchGuard Technologies, Inc.

    MSPs looking to enhance multi-cloud security would do well to consider risk-based authentication, which can help you fuse flexibility and higher protection into one coherent, customized setup. Download this e-book to discover how risk policies and multi-factor authentication can be applied in a manner that promotes secure, flexible architectures.

  • A Computer Weekly buyer's guide to managing paper processes

    Sponsored by: ComputerWeekly.com

    Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.

  • The CISO's guide to supply chain security

    Sponsored by: ComputerWeekly.com

    Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

  • Analyst1 for the Healthcare Industry

    Sponsored by: Analyst1

    The healthcare industry is uniquely vulnerable to cyberattacks and investing in the right tools is important. Analyst1 is a powerful solution for training threat teams on the critical skills needed to identify malicious activity. Access this white paper to learn more about the benefits and capabilities of Analysist1.

  • CW Innovation Awards: SIA taps blockchain for loyalty app

    Sponsored by: ComputerWeekly.com

    In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.

  • The Forrester Wave™: Third-Party Risk Management Platforms, Q4 2020

    Sponsored by: MetricStream

    As organizations continue to collaborate with third party vendors, they must realize their partial responsibility for any incidents or regulatory missteps that may occur. This is why third-party risk management (TPRM) vendors are innovating more than ever before. Download this Forrester Wave report to compare 11 of the top players in TPRM.

  • Risk Tech 100 2021

    Sponsored by: MetricStream

    As organizational risk increases, risk management professionals must get an objective assessment of technology vendors in their market in order to make the best decisions. Download the RiskTech100 for 2021, a globally acknowledged, comprehensive independent study of the world’s major players in risk and compliance technology.

  • Magic Quadrant For It Vendor Risk Management Tools

    Sponsored by: MetricStream

    IT vendor risk management software provides solutions to manage and automate the vendor risk management life cycle, address third-party risk and meet regulatory compliance. Tap into Gartner’s Magic Quadrant to get a better understanding of this growing and dynamic market.

  • How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction

    Sponsored by: AT&T Cybersecurity

    Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.

  • How To Continuously Improve Risk Management Within Leading Cybersecurity Programs

    Sponsored by: AT&T Cybersecurity

    In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.

  • The IAM Trends That Matter Most – 2021 edition

    Sponsored by: TechTarget

    In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.

  • Mainframe Security & Compliance

    Sponsored by: BROADCOM, Inc

    80% of the world’s mission-critical data is stored on mainframes. Threat actors are always hunting this data, so enterprises must work to compliantly keep this data secure. But where do they start? Listen to this podcast to learn more about mainframe security and compliance and the challenges enterprises face in "securing the world".

  • The Birds and the Bees: Having the Security Talk With Your Clients

    Sponsored by: ConnectWise

    If you think talking to your clients about security is painful now, imagine having the talk AFTER an incident. Join David Powell, SVP Expansion Sales, and Wes Spencer, CISO, Perch, of ConnectWise, as they discuss how to make this talk as painless as possible.

  • Using Tprm Best Practices To Improve M&A Outcomes

    Sponsored by: The Santa Fe Group

    In mergers and acquisitions (M&A), managing risk has become a focal point. M&A firms are realizing that due diligence is needed to avoid value losses post-acquisition, and moreover, regulators are cracking down on M&A risk like never before. Dive into this white paper to learn how third party risk management best practices can help.

  • A New Roadmap For Third Party IoT Risk Management

    Sponsored by: The Santa Fe Group

    The soaring number of IoT devices that can provide access to sensitive organizational data will make IoT risk management a convoluted undertaking. Professionals familiar with IoT are optimistic of its benefits but skeptical on security. Leverage this Ponemon report to get a grasp of organizational readiness for thir party IoT and its risks.

  • C-Suite Call To Action Risk Management Through A Different Lens

    Sponsored by: The Santa Fe Group

    When it comes to third parties, risk professionals, the C-suite and the board need to collectively determine how to shift their stance from reactive to proactive to handle uncharted circumstances. View this briefing paper to understand the malleable third-party risk landscape and how enterprises can become dynamically prepared.

  • Shared Assessments Building Best Practices

    Sponsored by: The Santa Fe Group

    Enterprise risk management (ERM) structures have grown in number and maturity, but many of them do not account for emerging technologies such as AI, 5G and IoT. At this juncture, it’s important that board and C-suite members assume responsibility for these shifts. View this SFG resource to learn ERM best practices for new technologies.

  • Adaptive Risk Management For Complex Supply Chains

    Sponsored by: The Santa Fe Group

    This paper discusses supply chain risk and the increased demands that complex supply chains place on outsourcers and providers. It also provides strategies and tactics for building and applying complex adaptive solutions to your own Third-Party Risk Management (TPRM) program. Download your copy today.

  • Role Of Erm In Managing Risks Related To New Technologies

    Sponsored by: The Santa Fe Group

    As technology grows stronger, risk becomes greater. Because to a degree, IT departments are jumping into the unknown with each new investment they make, so it’s important that the risks associated with these new technologies are adequately mitigated. Dive into this white paper to view 7 steps to effective risk management for emerging tech.

  • CISSP Exam Guide: Chapter 1: Security and Risk Management

    Sponsored by: McGraw Hill

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences