ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Security and Compliance Fears Keep Companies from Cloud Migration

    Sponsored by: Ziften

    Migrating parts of your IT operations to the cloud can seem like a huge chore, and a dangerous one at that. There are a lot of security issues to deal with when migrating to the cloud. In this article, learn about how to keep your environment secure before, during and after a cloud migration.

  • Facing up to emerging technology: Risks and benefits

    Sponsored by: SearchCIO

    Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.

  • Privacy and Data Protection Webinar Transcript

    Sponsored by: PricewaterhouseCoopers

    There is a lot more data at risk today than there has been in the past. This explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it. In this webcast transcript, learn about challenges in privacy and data protection and how PwC meets these challenges head on.

  • A Guide to Simplifying Compliance with NIST SP 800-53 and 800-82

    Sponsored by: Forescout

    NIST Special Publication (SP) 800-53r4 provides a catalog of security controls for federal information systems and organizations and a process for selecting controls to protect operations and organizations. In this resource, explore the provided table which presents NIST SP's security controls applicable to ICS networks.

  • Securing the Critical Industrial Infrastructure

    Sponsored by: Splunk Services UK Ltd

    Awareness of the impact of a breach in the ICS (Industrial Control Systems) and OT (operational technology) environment has risen considerably. Threats to ICS could have severe impacts on the business and reputation of an organization. In this white paper, learn how cyberattacks are affecting both IT and OT networks, including the risks involved.

  • Evolving Security Drivers in the UK Public Sector

    Sponsored by: Kyocera Document Solutions UK

    There is an increased appetite for more secure print and document management processes. Even public sector organizations with a good grasp of the security challenges facing their print estates have a hard time knowing how secure each device is. In this article, learn how KYOCERA's Secure MFP can help mitigate the risks of threats and attacks.

  • How to Align with the NIST Cybersecurity Framework

    Sponsored by: Forescout

    Adopting the NIST framework provides organizations with a structure to outline their current state of cybersecurity and strengthen their overall security. In this e-book, explore how Forescout's SilentDefense can facilitate adoption of the 3-part NIST Cybersecurity Framework.

  • SAS Model Risk Management

    Sponsored by: SAS

    The regulatory scrutiny being applied to model risk management is intensifying. As a result, banks need to maintain an inventory of models. In this white paper, learn how SAS Model Risk Management can help reduce the manual effort required to appropriately inventory, manage, document, communicate, monitor changes and audit firm-wide models.

  • Forcepoint's CIO on GDPR Readiness: Get Stakeholders Aligned. Then Execute.

    Sponsored by: Forcepoint

    In this case study, learn how Forcepoint's leadership team needed to align on legal and security terminology in order to achieve GDPR compliance. Also, discover the steps that Forcepoint's CIO, Meerah Rajavel took to reach compliance.

  • The Future of Model Risk Management for Financial Services Firms

    Sponsored by: SAS

    In this white paper, discover how model risk management (MRM) groups are helping banks keep up with evolving regulations, and uncover the 5 essential features of successful MRM. To plan for the future of MRM, download this white paper today, and learn more about the technology fueling your MRM journey.

  • Complying with CECL

    Sponsored by: SAS

    The Financial Accounting Standards Board's Current Expected Credit Loss (CECL) standard introduces a new model for the recognition and measurement of credit losses for loans and debt securities. In this white paper, discover findings from the SAS/GARP survey which gauged lenders' progress and concerns in gearing up for the new model.

  • 7 SIEM Trends to Watch in 2019

    Sponsored by: Splunk

    In recent years, SIEM solutions have become more of an information platform, with enterprise demands for better security driving much of the SIEM market. In this white paper, explore 7 SIEM trends to watch in 2019.

  • Best Practices in Transaction Monitoring Scenario Threshold Tuning and Model Verification

    Sponsored by: SAS

    How can your bank lower the cost of compliance? In this white paper, discover the analytic techniques responsible for reducing the costs of compliance within AML banking programs, and explore how implementing a process of periodic model verification, threshold tuning, and validation, can optimize your banks AML compliance standards.

  • Why Every Business Needs a Smart Printing Services Strategy

    Sponsored by: HP

    Network-connected printers are more insecure than most organizations realize. With security threats on the rise businesses of all sizes need printing services strategies to protect their organizations and minimize risk. In this article, learn how to craft a printer services strategy.

  • Customer Experience: The Flip Side of the Fraud Detection Coin

    Sponsored by: SAS

    In this white paper, explore how a new approach to deposit risk monitoring and risk assessment can help banks turn diverse customer data into real-time fraud and risk insights, and explore how a SAS fraud solution for deposit monitoring can help your financial organization achieve a better balance between customer service and security.

  • 6 Keys to Credit Risk Modeling for the Digital Age

    Sponsored by: SAS

    With this white paper, explore the 6 pillars of an effective and proactive credit risk modeling and decision system, and learn how to get bottom-line benefits with an end-to-end, fully integrated approach to risk management.

  • Secure Print Services Are Key to Digital Transformation

    Sponsored by: HP

    Today's digital technologies mean every device connected to the network is potentially an endpoint security risk—including printers and print infrastructure. In this article, learn how to protect your print environment from threats.

  • Managing Non-Microsoft Security Updates

    Sponsored by: Flexera Software

    Overlooking patches for vulnerabilities on non-Microsoft software is a great security risk for businesses. Despite the awareness of risk, organizations still struggle to identify, prioritize and deploy such patches. In this white paper, learn how to get the right patch management capabilities in place.

  • DreamWorks Animation Applies HP Inc.'s Expertise and Experience to Reinforce Print and Document Security

    Sponsored by: HP

    In this case study, learn how a large film production studio, DreamWorks Animation, partnered with HP Inc. to address its print security needs. The case study also provides recommendations for addressing your organization's printer security needs.

  • Security and Efficiency Benefits Realized With HP MPS and HP Access Control

    Sponsored by: HP

    Security experts are advising and clients are demanding that law firms protect their confidential data with the highest level of IT security solutions. In this case study, learn how one legal firm chose to enhance print management and security through a HP Managed Print Services solution.

  • Privacy and Data Protection Podcast

    Sponsored by: Micro Focus & PwC

    There is a lot more data at risk today than there has been in the past. This explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it. In this podcast, learn about challenges in privacy and data protection and how PwC meets these challenges head on.

  • Two Ways To Reduce Third-Party Tag Security Risks

    Sponsored by: Instart

    Today's websites rely on third-party tags. These tags are scripts developed by third-parties that you include on your website. There's one major problem: browsers provide limited abilities to control a third-party tag, which in turn exposes you to major security risks. In this article, learn what you can do to mitigate third-party tag exposure.

  • Data Privacy, Retail and Consumer Goods: Meeting the needs of CCPA, consumers, and the bottom line

    Sponsored by: Micro Focus & PwC

    A new set of regulations is almost here: the California Consumer Privacy Act (CCPA), which was passed in June, is scheduled to go live on January 1, 2020. In this white paper, learn everything you need to know about the CCPA.

  • Laying the Foundation for GDPR Compliance

    Sponsored by: SentryOne LLC

    The GDPR is in effect but, many businesses are still struggling with how to properly implement protections across systems and processes. This white paper discusses the 4 key rights that European citizens have under GDPR, and what businesses need to do to ensure they are GDPR compliant.

  • Technology's Role in Data Protection - The Missing Link in GDPR Transformation

    Sponsored by: Micro Focus & PwC

    The EU GDPR delivers a fundamental change in how data controllers and data processors handle personal data. In this white paper, evaluate your organization's GDPR efforts using PwC's framework for evaluating GDPR technology.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.