Risk Management Research
-
Protecting Credit Card Data: How to Achieve PCI Compliance
Sponsored by: Motorola SolutionsThis white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
-
Commerzbank: Managing Credit Risk and Increasing Operational Efficiency
Sponsored by: EMC CorporationFor Commerzbank streamlining the corporate credit lines to corporations and institutions, streamlining the corporate credit lending process to reduce paper and drive down costs had become a top priority.
-
The Evolution of Asset Management
Sponsored by: IBM Line of BusinessThis paper will discuss key perspectives and strategies for new asset management programs within the most capital intensive and revenue producing area of today's businesses.
-
Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk
Sponsored by: IBM Line of BusinessRisks can impact the top and bottom line and eventually every risk is expressed in the company's share price.
-
e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process
Sponsored by: Symantec CorporationThe creation of an effective litigation hold process and procedures provides the foundation for a prepared approach to e-discovery and litigation readiness.
-
3 Key Components of a Risk-Based Security Plan
Sponsored by: Foundstone, Inc.This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
-
A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation
Sponsored by: IBMThis white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.
-
Remote Data Protection
Sponsored by: IBMThanks to IBM's Remote Data Protection Service you can efficiently back up your data so that it can be more easily recovered in the event of a disaster. This pay-as-you-use subscription service includes hardware, software and operational support.
-
CIGNA Finds Good Therapy: Builds a More Efficient Risk Management, Streamlined Compliance, and System Security Program
Sponsored by: Qualys, Inc.CIGNA turned to QualysGuard's on demand Web service appliance to automatically identify and more effectively mitigate system vulnerabilities and misconfigurations.
-
Oracle Global IT (GIT) Streamlined Security
Sponsored by: Qualys, Inc.With QualysGuard Enterprise, Oracle GIT Security can monitor the company’s global vulnerability management process, track remediation, and validate policy compliance.
-
SAP GRC Access Control Solution
Sponsored by: HCL SoftwareThis white paper discusses how SAP Governance, Risk, and Compliance (GRC) Access Control allow organizations to collaboratively define and oversee SoD enforcement, role management and compliant provisioning.
-
The New Information Agenda - Do You Have One?
Sponsored by: IBMThe cost and complexity of managing increasing volumes of data and content, combined with the need to provide trusted information to every user for every transaction, is driving CIOs to rethink their approach to information delivery.
-
The Impact of Messaging and Web Threats
Sponsored by: Trend Micro, Inc.This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.
-
EMC Backup and Recovery
Sponsored by: EMC CorporationEMC Backup and Recovery solutions enable you to strengthen your data protection, streamline backup and recovery, and meet a wide range of service levels, even for the largest data volumes.
-
Averting Catastrophe: How Real-Time Location Intelligence Can Mitigate Exposure and Better Manage Risk
Sponsored by: Pitney Bowes Group 1 SoftwareWhat is location intelligence? From an actuary perspective, it's the accessment of risk based on the physical location of real estate. This paper examines how location intelligence links data to precise physical coordinates.
-
Surviving the Perfect Storm in the Food Industry
Sponsored by: CDC Software - Ross EnterpriseThis paper presents an executive perspective on the underlying challenges in the food industry.
-
Manufacturing Company Increases Productivity While Managing Risk
Sponsored by: Sunrise TechnologiesCompanies rely on its enterprise resource planning (ERP) system to help manage finances, manufacturing, and the supply chain. Learn how one companied increased productivity while managing risk with a reliable, efficient and adaptable solution.
-
Best Practices in Data Management
Sponsored by: SASThe key enterprise risk management (ERM) issue for many financial institutions is to get enriched data in a single place in order to report on it. Learn best practices for data management that are critical for ERM.
-
Managing a Retail Bank's Facilities for Competitive Advantage
Sponsored by: VFA, Inc.This paper focuses on how retail banks can more effectively manage their facilities - branch locations, back offices or data centers - and align facility management and spending with business goals.
-
IBM Dynamic Inventory Optimization Solution: Helping Improve the Bottom Line through Inventory Optimization
Sponsored by: IBM Line of BusinessThe IBM Dynamic Inventory Optimization Solution is designed to help companies manage inventory to optimal levels, providing the potential to reduce carrying and logistical costs, increase service levels and improve asset utilization and invento...
-
Manage Risk and Address Return on Investment with IBM Compliance Solutions
Sponsored by: IBM Software GroupGovernance, risk management and compliance place high expectations on IT to establish, enforce and prove the efficacy of policies, processes and controls.
-
Data Center Transformation
Sponsored by: Hewlett Packard EnterpriseThis paper looks at HP's approach to Data Center Transformation and how it can help enterprise data centers reduce costs, manage risks, and support business growth.
-
NetBackup 6.5: Enabling Next-Generation Disk-Based Data Protection
Sponsored by: Symantec CorporationSymantec's Veritas NetBackup 6.5, the latest release of the company's established market-leading enterprise backup and recovery solution, provides disk-based data protection for remote office and enterprise datacenter environments.
-
Effectively manage access to systems and information to help optimize integrity and facilitate compliance
Sponsored by: IBM Software GroupConsistent access management and identity management protect data integrity and facilitate compliance. IBM identity and access management solutions help you cost-effectively provide authorized users with access while protecting applications and data.
-
2006 Global Information Security Workforce Study
Sponsored by: ISC2Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required.