ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Climate Risk

    Sponsored by: SAS

    Modeling crisis, climate change, and catastrophe can be challenging to an extreme degree—but preparation for these events is all the more necessary. Read this special report on climate risk analysis to learn how intelligent risk analytics are transforming the future approaches of banks, financial services, oil companies, and much more in this area.

  • The Future of Risk Modeling

    Sponsored by: SAS

    Risk modeling is rapidly evolving, creating opportunities and roadblocks with its complex and detailed analyses. AI is disrupting this industry as it brings the ability to automate processes, detect fraud in real-time, predict trends, and more. Read on to learn how risk modeling is changing and discover how you can stay on the cutting edge.

  • RISK-BASED AUTHENTICATION: A Critical Element to Any Zero-Trust Deployment

    Sponsored by: Panda Security

    Access this e-book to read about the powerful connection between zero-trust adoption and risk policies, and how multi-factor authentication sits at the core of these approaches by bringing the technology to protect user identities and Cloud applications.

  • BitSight Security Ratings

    Sponsored by: BitSight

    BitSight Security Ratings are a measurement of an organization's security performance. Armed with daily ratings, organizations can proactively identify, quantify and manage cyber security risk throughout their ecosystem. Access this white paper to learn more about BitSight security ratings and how companies are benefiting from them.

  • Profitable defense against financial crime

    Sponsored by: ABBYY

    The experiences of COVID-19 in 2020 taught financial institutions that they must reimagine the way they assess and manage risk. With a holistic approach, financial institutions can collaboratively collect and analyze intelligence from across the organization. Access this whitepaper to learn more about this holistic approach to fraud prevention.

  • Analyst1 for the Healthcare Industry

    Sponsored by: Analyst1

    The healthcare industry is uniquely vulnerable to cyberattacks and investing in the right tools is important. Analyst1 is a powerful solution for training threat teams on the critical skills needed to identify malicious activity. Access this white paper to learn more about the benefits and capabilities of Analysist1.

  • Risk In A Real-time World

    Sponsored by: Dataminr

    Dataminr commissioned Forrester Consulting to evaluate current risk management priorities and practices and how real-time information can be utilized for decision-making in risk management and crisis response. Download this research paper to learn more about Forrester’s findings and the power of real-time information.

  • How to Shrink Supply Chain Risk

    Sponsored by: TechTarget

    The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.

  • How to Shrink Supply Chain Risk

    Sponsored by: TechTarget

    The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.

  • The Rise of Insider Risk: Why a New Approach is Needed to Protect Data

    Sponsored by: Code 42

    Now that companies have created a culture of collaboration, allowing employees to use new tools to work in faster and smarter ways, this mean that employees are creating insider risks simply by doing their jobs. Join the discussion with the authors of Inside Jobs: Why Insider Risk is the Biggest Cyber Threat You Can’t Ignore to learn more.

  • COVID-19 Creates Perfect Storm for Insider Risk Growth, Organizations Unprepared to Protect Data

    Sponsored by: Code 42

    Download the Code42 2021 Data Exposure Report on Insider Risk (with Ponemon Institute survey data) to gain a better understanding of the many dimensions that impact organizations’ security posture around insider risk to data.

  • Insider Risk Management Is Critical To Protecting Valuable Company Data

    Sponsored by: Code 42

    Download this Forrester report to explore how companies are currently treating insider risk management and their changes in strategy for the future.

  • CW Innovation Awards: SIA taps blockchain for loyalty app

    Sponsored by: ComputerWeekly.com

    In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.

  • The Forrester Wave™: Third-Party Risk Management Platforms, Q4 2020

    Sponsored by: MetricStream

    As organizations continue to collaborate with third party vendors, they must realize their partial responsibility for any incidents or regulatory missteps that may occur. This is why third-party risk management (TPRM) vendors are innovating more than ever before. Download this Forrester Wave report to compare 11 of the top players in TPRM.

  • Risk Tech 100 2021

    Sponsored by: MetricStream

    As organizational risk increases, risk management professionals must get an objective assessment of technology vendors in their market in order to make the best decisions. Download the RiskTech100 for 2021, a globally acknowledged, comprehensive independent study of the world’s major players in risk and compliance technology.

  • Magic Quadrant For It Vendor Risk Management Tools

    Sponsored by: MetricStream

    IT vendor risk management software provides solutions to manage and automate the vendor risk management life cycle, address third-party risk and meet regulatory compliance. Tap into Gartner’s Magic Quadrant to get a better understanding of this growing and dynamic market.

  • Student Loan Provider Case Study

    Sponsored by: Ostendio

    In this eguide, review this case study from a leading student loan provider, and how they used Ostendio to build their security program.

  • How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction

    Sponsored by: AT&T Cybersecurity

    Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.

  • How To Continuously Improve Risk Management Within Leading Cybersecurity Programs

    Sponsored by: AT&T Cybersecurity

    In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.

  • Supplier Risk & Performance Management with KPMG and Coupa

    Sponsored by: Coupa and KPMG

    Implementing a proactive and predictive supplier risk and performance management (SRPM) program can help procurement organizations mitigate risk across third-party suppliers. Learn how you can institutionalize an SRPM program to be better prepared for the future.

  • The IAM Trends That Matter Most – 2021 edition

    Sponsored by: TechTarget

    In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.

  • The IAM Trends That Matter Most – 2021 edition

    Sponsored by: TechTarget

    In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.

  • Arklign Case Study

    Sponsored by: Ostendio

    In this eguide, read about Arklign and how they utilized technology from Ostendio to solve their business challenges.

  • 2Morrow Case Study

    Sponsored by: Ostendio

    In this eguide, review a case study discovering the data security programs that Ostendio offers.

  • Platform Overview

    Sponsored by: Plextrac

    In this eguide, discover everything you need to know about the purple teaming platform in this platform overview from PlexTrac.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences