ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Industrial Controls System Vulnerabilities

    Sponsored by: Dragos

    In this report, explore key findings from the Dragos Intelligence team's analysis of ICS-specific vulnerabilities. Also discover the impacts, risk and mitigation options for defenders.

  • Keeping Fraud Detection Software Aligned With the Latest Threats

    Sponsored by: SAS

    Fraud and financial crimes weren't considered serious issues until the 1980s. Since then, they have become commonplace. As fraud changes and evolves, organizations must keep anti-fraud software current to detect new and emerging threats. In this white paper, learn how SAS Visual Investigator can help organizations do this.

  • Balancing Fraud Detection and the Customer Experience

    Sponsored by: SAS

    Digital channels are a must-have in the financial industry as customers flock to the businesses that can offer speed and convenience. But there's a dark side. The relative anonymity of digital channels opens up new doors for fraud. In this white paper, learn how organizations can verify a true identity and identify high-risk behavior in real time.

  • How to Succeed With Fraud Analytics

    Sponsored by: SAS

    Leading-edge analytics and hybrid modeling techniques are finding threats faster and more accurately than ever—and embedded machine learning enhances every step of the process. Read this white paper to learn the 4 flavors of fraud analytics and how you can succeed with them.

  • Rethinking Data Security with a Risk-adaptive Approach

    Sponsored by: Forcepoint

    In this white paper, learn how by using dynamic data protection, organizations can solve the fundamental challenges of traditional data loss prevention deployments and more effectively protect sensitive information, including regulated data sources and PII.

  • Rethinking Cyber Operations: Creating Clarity Out of Complexity

    Sponsored by: Optiv

    Rethinking and evolving cyber operations is key to reducing complexity and achieving a cybersecurity model aligned to organizational risk. Download this white paper for insights into the innovation landscape, key symptoms of lagging cyber operations and a roadmap that organizations can follow to achieve a new cyber operations paradigm.

  • Conversational Geek Office 365 Risk Mitigation

    Sponsored by: Mimecast

    If you are moving to or already using Office 365 then it's essential for you to formulate a plan toward a risk-free cyber resilience experience. Download this e-book to learn about the security, data assurance and continuity gaps that exist in Office 365 and how Mimecast can help reduce risk and add resilience.

  • Employing a Risk Adaptive Model to Detect and Prevent Threats From Within

    Sponsored by: Forcepoint

    Striking a balance between maximizing productivity and minimizing risk requires a security program that can identify and respond to the insider threat. In this webcast Forcepoint Senior Security Strategist Homayun Yaqub, discusses the foundations that underpin an effective program. Watch now to learn more.

  • Optiv's Managed Security Services Mitigate Risk for Multi-Brand National Retailer

    Sponsored by: Optiv

    A leading multi-brand national retailer needed to maintain evolving security demands. Learn how Optiv's Managed Security Services (MSS) was able to provide them critical 24x7x365 remote access and infrastructure needed to maximize costs and resources.

  • Are You Taking a Risk-Adaptive Approach to Dynamic Data Protection?

    Sponsored by: Forcepoint

    In this webcast, Bharath Vasudevan from Forcepoint discusses how taking a risk-adaptive approach combined with behavioral analytics can enable your security to fluctuate based on the threat environment. The webcast will also explore how Forcepoint's solution, Dynamic Data Protection, delivers risk-adaptive protection.

  • Closing the People, Processes and Technology Gap: How Innovation Can Strengthen Your Cybersecurity Program

    Sponsored by: Optiv

    A robust security model is built on 3 pillars—people, processes and technology. Unfortunately, a failure to innovate could negatively affect your ability to excel at all 3. In this blog, explore these 3 pillars and discover 5 steps to solving the people, process and technologies equation.

  • CyberArk for Dummies: Privileged Access Security

    Sponsored by: CyberArk Software, Inc

    The key to most companies' crown jewels is through privileged access, whether a privileged account, credential, or secret. So if protecting privileged access is so critical, why aren't companies doing more to guard against these types of attacks? In this e-book, learn everything you need to know about protecting privileged access.

  • ICS Activity Groups and the Threat Landscape

    Sponsored by: Dragos

    Throughout 2018, the amount of activity targeting industrial control systems (ICS) increased substantially. Also in 2018, ICS security risk grew even absent any destructive attacks. In this white paper, explore threat activity groups targeting ICS and details about their activity, methodologies, victimologies, and future concerns.

  • Top 10 Security Trends for 2019

    Sponsored by: Micro Focus & DXC Technology

    In this white paper, learn about the top 10 security trends in 2019 & the driving factors behind them.

  • Be the Disrupter, Not the Disrupted

    Sponsored by: Micro Focus & DXC Technology

    On the journey to digitally transform your business, don't forget the essentials: enterprise security and risk management. After all, disrupting the status quo with better business outcomes requires not falling prey to disruptions from cyberthreats. In this infographic, learn the top challenges in cyberthreat defense and how you can overcome them.

  • Adapting to the New Reality of Evolving Cloud Threats

    Sponsored by: Symantec

    The heterogeneity of the modern enterprise environment, spanning both on-premises and diverse cloud platforms, has added a broader set of vulnerabilities and strike vectors. In this Cloud Security Threat Report, explore best practices for building an effective cloud security strategy to help address these challenges.

  • The Vital Role of Security in Digital Transformation

    Sponsored by: TITUS

    A survey conducted by Market Strategies Internal showed that 78% of ITDMs believe that the success of their digital transformation relies heavily on strong IT security and data protection. In this research report, explore 2 different security professional personas and explore how they view digital transformation, security and data protection.

  • Your Compliance Action Plan: Strategies To Control Time, Cost And Risk For Financial Services Firms

    Sponsored by: Mimecast

    Financial services firms today face some of the most complex and onerous regulatory and legal challenges in the world. In this webcast, listen as Michael Osterman and Garth Landers guide financial services firms in navigating a clear and strategic path through the complex requirements they face to support governance requirements.

  • Gaining a Strategic Endpoint Security Advantage in the Era of Advanced Threats

    Sponsored by: Symantec

    Today's advanced threat landscape poses serious challenges for enterprises of any size. But the rising trend of attacks directed against midsized enterprises should bring security to the forefront of business planning for these organizations. In this report, learn how machine learning and AI can help in the fight against advanced threats.

  • How to Secure the Human Link

    Sponsored by: Mimecast

    Security and risk management leaders must provide security awareness training to ensure employees protect the enterprises' data and intellectual property. But, finding the best way to do this can be difficult. In this Gartner research report, explore 3 best practices to develop and maintain a cybersecure workforce.

  • Protecting Your IT Assets from Cryptomining Malware

    Sponsored by: Neustar

    Cryptomining malware has exploded on the threat landscape, becoming one of the most common malware attacks and posing a significant risk to your IT assets. In this white paper learn everything you need to know about cryptomining including what it does, how it gets in, and how to recognize and prevent it.

  • 5 Steps for Managing Compliance With Exempt Sales

    Sponsored by: Avalara

    As your business evolves your sales tax obligations may also change. Without a comprehensive plan in place, selling exempt products or services can compound your compliance challenges. In this white paper, explore 5 steps all businesses should take to ensure they're compliant at every stage of the exemption certificate management process.

  • This is the #1 Threat to Your Digital Properties

    Sponsored by: The Media Trust

    In the early days of the Web and e-commerce, CISOs could secure the web application code developed by internal teams. But now, the majority of a website's code relies on third-parties. In this white paper, learn what CISOs need to know in order to protect themselves and their digital properties from malicious third-party code.

  • Winning the Battle Over Passwords

    Sponsored by: OneLogin

    Companies worldwide are in a war against cybercriminals. It's ongoing with no end in sight, and every company is at risk. Access credentials, particularly passwords, are at the heart of the battle because hackers are trying to obtain them. In this white paper, explore the dangers of poor passwords and learn how companies can secure them now.

  • The 5 Most Dangerous New Attack Techniques and How to Counter Them

    Sponsored by: RSA Conference

    Learn about the most dangerous new attack techniques in this follow-up to the popular RSA Conference 2019 SANS Institute keynote panel. See how these new threats work, what's coming next, and the best ways to bolster your defense against them. Watch now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.