ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Mitigating OT Cyber Risk with the Fortinet Security Fabric

    Sponsored by: Fortinet, Inc.

    Organizations are leveraging digital technologies such as IoT, cloud, artificial intelligence (AI), and others to optimize operations, improve safety and reliability, and gain a competitive edge.

  • Deconstructing the Risk of Public Cloud: 5 Use Cases

    Sponsored by: Fortinet, Inc.

    Organizations have embraced public cloud platforms of all kinds in a big way, but the result is increased security complexity. In this white paper, discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.

  • 15 Ways to Weed the Regulatory Violations Out of Your Spend

    Sponsored by: AppZen

    You may have a best-in-class system for approving expenses and accounts payable, but if you're not doing a thorough audit of all spend prior to disbursement, you likely have regulatory violations lurking in there. Download this e-book for a checklist on 15 ways to identify spend-related regulatory violations.

  • Fortinet 2019 Operational Technology Security Trends Report

    Sponsored by: Fortinet, Inc.

    Fortinet's 2019 OT Security Trends Report analyzes data from FortiGuard Labs to glean insights about the state of security for supervisory control and data acquisition (SCADA) and other industrial control systems (ICS). Download the report to discover key findings.

  • State of Operational Technology and Cybersecurity Report

    Sponsored by: Fortinet, Inc.

    Recently, IT-based technologies have been integrated with operational technology networks to create new efficiencies and competitive advantages. However, this increases the digital attack surface and the risk of intrusion. In this research report, explore key findings from a survey of plant operations and manufacturing leaders.

  • Enterprise Governance, Risk, and Compliance for PeopleSoft

    Sponsored by: Appsian

    In this white paper, discover the fundamental parameters necessary to develop an effective security strategy to manage modern threat vectors and navigate complex compliance regulations. Also, explore GRC challenges unique to PeopleSoft and how Appsian Security Platform can enhance security to meet today's compliance requirements.

  • GDPR & PeopleSoft: Essentials for Compliance

    Sponsored by: Appsian

    Your PeopleSoft applications are the core of your business. Critical PII are housed on hundreds of pages – making them a significant factor in your GDPR compliance strategy. In this white paper, learn about the challenges organizations face when establishing GDPR compliance in PeopleSoft applications.

  • CISO and Cybersecurity: A Report on Current Priorities and Challenges

    Sponsored by: Fortinet, Inc.

    The CISO and Cybersecurity Report from Fortinet takes a snapshot of how CISOs are approaching cybersecurity, and how their organizations view the CISO. In this report, explore key takeaways from a survey of CISOs at large enterprises.

  • How to Boost Your Breach Defense: A 3-Part Plan

    Sponsored by: Micro Focus

    Even the strongest, most protected networks can be brought to their knees with just 1 minor misstep. Thus, the cyber defender has to protect against all attack vectors. In this blog, learn how you can help secure your organization by adopting a 3-part security model consisting of security in depth, DevSecOps, and security validation.

  • Top Research For CIOs: Security

    Sponsored by: MASERGY

    Security no longer lives exclusively in the IT department. In this Forrest report, CIOs can gain insight into the trends and key issues in the security landscape. Also, explore opportunities for improving how security is managed regardless of whether you own the security function.

  • Independent Study Pinpoints Significant SCADA/ICS Security Risks

    Sponsored by: Fortinet, Inc.

    Many organizations beyond electric and water utilities have deployed SCADA/ICS as they look to automate their data collection and their equipment. However, the technologies have become high-value targets for hackers. In this research report, explore common SCADA and ICS threats and find recommendations for mitigating the risks they pose.

  • Artificial Intelligence In Banking and Risk Management

    Sponsored by: SAS

    How real are the benefits of AI? Inside, review the costs, benefits, and risks of AI with insight from over 2,000 GARP/SAS survey respondents. Review the top use areas of AI in the modern day enterprise, and explore how AI can help your organization flourish.

  • Security, Risk and Governance Breach Defense: Anatomy of a Breach

    Sponsored by: Micro Focus

    The odds of experiencing a data breach are 1 in 4. And as seen from breaches including Equifax, Yahoo and Uber, the effects are costly. But how can organizations keep secure? There needs to be a plan. In this webcast, Rob MacDonald discusses how organizations can use the NIST Framework to strengthen their defenses against a breach.

  • 7 Steps to Secure Your Supply Chain

    Sponsored by: RackTop Systems

    Supply chain security requires a multifaceted approach to protecting the checkpoints, assets and infrastructures involved with the production of a product. In this resource, explore 7 steps to securing your supply chain.

  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy

    Sponsored by: Forcepoint

    Some approaches to information security simply won't deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy. In this webcast, Doug Landoll discusses how to take a risk-first approach to addressing information security.

  • Industrial Controls System Vulnerabilities

    Sponsored by: Dragos

    In this report, explore key findings from the Dragos Intelligence team's analysis of ICS-specific vulnerabilities. Also discover the impacts, risk and mitigation options for defenders.

  • Keeping Fraud Detection Software Aligned With the Latest Threats

    Sponsored by: SAS

    Fraud and financial crimes weren't considered serious issues until the 1980s. Since then, they have become commonplace. As fraud changes and evolves, organizations must keep anti-fraud software current to detect new and emerging threats. In this white paper, learn how SAS Visual Investigator can help organizations do this.

  • Balancing Fraud Detection and the Customer Experience

    Sponsored by: SAS

    Digital channels are a must-have in the financial industry as customers flock to the businesses that can offer speed and convenience. But there's a dark side. The relative anonymity of digital channels opens up new doors for fraud. In this white paper, learn how organizations can verify a true identity and identify high-risk behavior in real time.

  • How to Succeed With Fraud Analytics

    Sponsored by: SAS

    Leading-edge analytics and hybrid modeling techniques are finding threats faster and more accurately than ever—and embedded machine learning enhances every step of the process. Read this white paper to learn the 4 flavors of fraud analytics and how you can succeed with them.

  • Rethinking Data Security with a Risk-adaptive Approach

    Sponsored by: Forcepoint

    In this white paper, learn how by using dynamic data protection, organizations can solve the fundamental challenges of traditional data loss prevention deployments and more effectively protect sensitive information, including regulated data sources and PII.

  • Rethinking Cyber Operations: Creating Clarity Out of Complexity

    Sponsored by: Optiv

    Rethinking and evolving cyber operations is key to reducing complexity and achieving a cybersecurity model aligned to organizational risk. Download this white paper for insights into the innovation landscape, key symptoms of lagging cyber operations and a roadmap that organizations can follow to achieve a new cyber operations paradigm.

  • Conversational Geek Office 365 Risk Mitigation

    Sponsored by: Mimecast

    If you are moving to or already using Office 365 then it's essential for you to formulate a plan toward a risk-free cyber resilience experience. Download this e-book to learn about the security, data assurance and continuity gaps that exist in Office 365 and how Mimecast can help reduce risk and add resilience.

  • Employing a Risk Adaptive Model to Detect and Prevent Threats From Within

    Sponsored by: Forcepoint

    Striking a balance between maximizing productivity and minimizing risk requires a security program that can identify and respond to the insider threat. In this webcast Forcepoint Senior Security Strategist Homayun Yaqub, discusses the foundations that underpin an effective program. Watch now to learn more.

  • Optiv's Managed Security Services Mitigate Risk for Multi-Brand National Retailer

    Sponsored by: Optiv

    A leading multi-brand national retailer needed to maintain evolving security demands. Learn how Optiv's Managed Security Services (MSS) was able to provide them critical 24x7x365 remote access and infrastructure needed to maximize costs and resources.

  • Are You Taking a Risk-Adaptive Approach to Dynamic Data Protection?

    Sponsored by: Forcepoint

    In this webcast, Bharath Vasudevan from Forcepoint discusses how taking a risk-adaptive approach combined with behavioral analytics can enable your security to fluctuate based on the threat environment. The webcast will also explore how Forcepoint's solution, Dynamic Data Protection, delivers risk-adaptive protection.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.