ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Insider Risk Management

    Sponsored by: Exabeam

    Most security practitioners view the insider threat problem through a pure threat lens, yet others see it as a compliance exercise. Inside this e-book, learn about the benefits of viewing insider threats as a risk management problem and seeing them in the context of asset impacts, vulnerabilities, and threats.

  • Finding the Disconnect: Security Perceptions and Behaviors of Today’s Enterprise Employees

    Sponsored by: Dtex

    As the modern enterprise acknowledges cyber risks as critical business risks, the nature of enterprise security discussions is quickly moving from the technical and operational to the strategic. This has created a new reality in which security decisions can turn a user into a trusted ally... or a liability. Read this guide to learn more.

  • IT Risk Management: Comparing Top Vendors & Offerings

    Sponsored by: ServiceNow

    Gartner predicts that by 2025, 50% of global midmarket and large enterprises will depend on risk management tools to address risks in their organizations. This Magic Quadrant report highlights and evaluates the most prominent risk management vendors and offerings in today’s market – read on to unlock the full report.

  • Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS

    Sponsored by: ComputerWeekly.com

    In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.

  • Rethinking Insider Risk in the Gig Economy

    Sponsored by: Proofpoint

    By 2027, gig workers may account for half of the total U.S. workforce. It’s a major shift that comes with profound security implications. Some 87% of companies have suffered an incident with a third-party supplier that disrupted their operations, according to Deloitte. View this e-book to learn how to mitigate insider risk in the new work reality.

  • How to Level Up Your Vendor Management

    Sponsored by: Aptible

    Every company needs vendors, yet vendors increase your vulnerability to security threats. Many of the largest data breaches in the past decade or so have happened because of vulnerabilities from 3rd party vendors. Therefore, you must establish robust processes on both sides of vendor management. View this guide to learn more.

  • Integrated Risk Management on ServiceNow

    Sponsored by: ServiceNow

    Deloitte, a leader in risk management consulting, has collaborated with ServiceNow, a leader in GRC platform technology, to develop accelerators which streamline and automate risk management. These solutions will provide you with the tools needed to better manage different types of risk, allowing you to focus on running your business.

  • Business Continuity Management: Planning, Disaster Recovery & Crisis Response

    Sponsored by: ServiceNow

    Business continuity management (BCM) tools are an effective way for organizations to ensure crisis preparation and disaster recover plans are in place prior to an unforeseen disruption. This solution brief highlights the key features and capabilities of ServiceNow’s BCM tool – read on for more information.

  • Webinar 6 – MITRE ATT&CK as a Framework for Cloud Threat Investigation

    Sponsored by: McAfee

    In the continuous hunt for elusive cyberthreats, the most vulnerable assets – in this case, the cloud – must be considered. As it stands, most organizations have a low number of experts dedicated to cloud threats, and so technology must pick up the slack. Watch this webcast to learn how the MITRE ATT&CK framework can help to mitigate cloud attacks.

  • Attacking and Defending a Distributed Workforce

    Sponsored by: ServiceNow

    The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.

  • Beyond Digital Risk— Addressing Operational Risk

    Sponsored by: ServiceNow

    Operational risk management keeps companies ahead in their markets and fortifies their foundations, even on shifting ground. But due to its complexity, operational risk management often gets lost in the mix of other risk management strategies. Read this white paper to learn how you can connect risk across the enterprise.

  • Covid-19 Lessons Learned—Business Continuity Management

    Sponsored by: ServiceNow

    Regardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.

  • Case Study: Medical Devices & Securing the Healthcare Industry

    Sponsored by: Rezilion

    The healthcare industry has been a prime target of cyberattacks for several years, however COVID-19 brought most of these issues into the public eye. This case study highlights where the vulnerabilities lie and provides an overview of how Rezilion is working with healthcare device companies to prioritize and mitigate these risks.

  • Vendor Risk Management by Deloitte

    Sponsored by: ServiceNow

    ServiceNow Vendor Risk Management supports enterprises with their Vendor Risk Management process and enables them to support the Vendor Risk Lifecycle with ease. It provides a centralized process for managing vendor portfolios, assessing vendor risks including the tiering process and completing a remediation lifecycle. Learn more here.

  • Market Guide For Crisis/Emergency Management Solutions

    Sponsored by: ServiceNow

    The 2020 pandemic has led security and IT leaders to reevaluate their current crisis/emergency management (C/EM) programs and consider making alterations based on what they’ve learned from COVID-19. This Gartner Market Guide provides an overview of top C/EM tools, required capabilities and strategic recommendations – read on to get started.

  • Remote Work Best Practices Emphasize UC Collaboration Tools

    Sponsored by: TATA Communications

    Most organizations take their business continuity plans for granted under normal conditions, but these plans aren’t truly tested until adversity strikes. Now, continuity must be ensured through maximization of remote resources, especially UC technology, to keep employees happy and mitigate risk. Read our expert guide to learn how to do this.

  • Refining risk resolution for the new normal

    Sponsored by: ServiceNow

    If the COVID crisis has taught us anything it’s that adaptability is necessary for success. In this session, you will learn how enhancements to Advanced Risk Assessment will get you information more quickly, so you can get ahead of risks.

  • Methodology of an IAM Introduction

    Sponsored by: Beta Systems

    IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.

  • Refining risk resolution for the new normal

    Sponsored by: ServiceNow

    If the COVID crisis has taught us anything it’s that adaptability is necessary for success. In this session, you will learn how enhancements to Advanced Risk Assessment will get you information more quickly, so you can get ahead of risks.

  • Secure: Now 2020 - Are Your Cyber Defenses Fully-Geared for the Digital Era?

    Sponsored by: Lumen

    Bad actors and threats are evolving faster than organizations can react, and although security & risk management (SRM) leaders know they need to continually evolve upgrade their cyber defenses, businesses still fall victim to cybercrimes. Watch this webinar by Lumen subject matter experts to learn why you may need to do more for cybersecurity.

  • Risk Management Best Practices for Privileged Access Management (PAM)

    Sponsored by: Quest

    Applying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.

  • Security analytics: Introduction, use cases, and quick-start guide

    Sponsored by: TechTarget

    As cyberattacks become increasingly complex and devious, winning the cybersecurity war is becoming harder and harder. To keep from becoming tomorrow's headline (and to prevent damage to your bottom line), you need a way to gain the upper hand – but how?

  • 2020 SMB Cyberthreat Landscape

    Sponsored by: Acronis

    Contrary to a popular misconception, SMBs are targeted at the same rate (and by the same means) as larger enterprises. However, SMBs typically lack the resources of a larger enterprise – making attacks potentially more damaging. Read this infographic to learn more about the SMB cyberthreat landscape.

  • Global Threat Report

    Sponsored by: VMware International Unlimited Company

    94% of organizations worldwide have suffered a data breach as a result of a cyberattack in the past 12 months, and the average organization has experienced 2.17 breaches. If this statistic surprises you, then you may want to read the full global threat report by VMware and Carbon Black to get a sense of where threat actors are developing most.

  • The Future-Ready SOC: Using XDR to Achieve Unified Visibility and Control

    Sponsored by: VMware International Unlimited Company

    The technological and procedural silos that exist between IT and security operations center (SOC) team members have impeded an enterprise’s ability to effectively mitigate risk. Turn the tide – read this white paper to examine how extended detection & response (XDR) can help.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.