ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Insider Risk Management

    Sponsored by: Exabeam

    Most security practitioners view the insider threat problem through a pure threat lens, yet others see it as a compliance exercise. Inside this e-book, learn about the benefits of viewing insider threats as a risk management problem and seeing them in the context of asset impacts, vulnerabilities, and threats.

  • Finding the Disconnect: Security Perceptions and Behaviors of Today’s Enterprise Employees

    Sponsored by: Dtex

    As the modern enterprise acknowledges cyber risks as critical business risks, the nature of enterprise security discussions is quickly moving from the technical and operational to the strategic. This has created a new reality in which security decisions can turn a user into a trusted ally... or a liability. Read this guide to learn more.

  • IT Risk Management: Comparing Top Vendors & Offerings

    Sponsored by: ServiceNow

    Gartner predicts that by 2025, 50% of global midmarket and large enterprises will depend on risk management tools to address risks in their organizations. This Magic Quadrant report highlights and evaluates the most prominent risk management vendors and offerings in today’s market – read on to unlock the full report.

  • Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS

    Sponsored by: ComputerWeekly.com

    In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.

  • Rethinking Insider Risk in the Gig Economy

    Sponsored by: Proofpoint

    By 2027, gig workers may account for half of the total U.S. workforce. It’s a major shift that comes with profound security implications. Some 87% of companies have suffered an incident with a third-party supplier that disrupted their operations, according to Deloitte. View this e-book to learn how to mitigate insider risk in the new work reality.

  • How to Level Up Your Vendor Management

    Sponsored by: Aptible

    Every company needs vendors, yet vendors increase your vulnerability to security threats. Many of the largest data breaches in the past decade or so have happened because of vulnerabilities from 3rd party vendors. Therefore, you must establish robust processes on both sides of vendor management. View this guide to learn more.

  • Business Continuity Management: Planning, Disaster Recovery & Crisis Response

    Sponsored by: ServiceNow

    Business continuity management (BCM) tools are an effective way for organizations to ensure crisis preparation and disaster recover plans are in place prior to an unforeseen disruption. This solution brief highlights the key features and capabilities of ServiceNow’s BCM tool – read on for more information.

  • Attacking and Defending a Distributed Workforce

    Sponsored by: ServiceNow

    The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.

  • Beyond Digital Risk— Addressing Operational Risk

    Sponsored by: ServiceNow

    Operational risk management keeps companies ahead in their markets and fortifies their foundations, even on shifting ground. But due to its complexity, operational risk management often gets lost in the mix of other risk management strategies. Read this white paper to learn how you can connect risk across the enterprise.

  • Covid-19 Lessons Learned—Business Continuity Management

    Sponsored by: ServiceNow

    Regardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.

  • Case Study: Medical Devices & Securing the Healthcare Industry

    Sponsored by: Rezilion

    The healthcare industry has been a prime target of cyberattacks for several years, however COVID-19 brought most of these issues into the public eye. This case study highlights where the vulnerabilities lie and provides an overview of how Rezilion is working with healthcare device companies to prioritize and mitigate these risks.

  • Vendor Risk Management by Deloitte

    Sponsored by: ServiceNow

    ServiceNow Vendor Risk Management supports enterprises with their Vendor Risk Management process and enables them to support the Vendor Risk Lifecycle with ease. It provides a centralized process for managing vendor portfolios, assessing vendor risks including the tiering process and completing a remediation lifecycle. Learn more here.

  • Market Guide For Crisis/Emergency Management Solutions

    Sponsored by: ServiceNow

    The 2020 pandemic has led security and IT leaders to reevaluate their current crisis/emergency management (C/EM) programs and consider making alterations based on what they’ve learned from COVID-19. This Gartner Market Guide provides an overview of top C/EM tools, required capabilities and strategic recommendations – read on to get started.

  • Refining risk resolution for the new normal

    Sponsored by: ServiceNow

    If the COVID crisis has taught us anything it’s that adaptability is necessary for success. In this session, you will learn how enhancements to Advanced Risk Assessment will get you information more quickly, so you can get ahead of risks.

  • Methodology of an IAM Introduction

    Sponsored by: Beta Systems

    IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.

  • Refining risk resolution for the new normal

    Sponsored by: ServiceNow

    If the COVID crisis has taught us anything it’s that adaptability is necessary for success. In this session, you will learn how enhancements to Advanced Risk Assessment will get you information more quickly, so you can get ahead of risks.

  • Risk Management Best Practices for Privileged Access Management (PAM)

    Sponsored by: Quest

    Applying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.

  • Security analytics: Introduction, use cases, and quick-start guide

    Sponsored by: TechTarget

    As cyberattacks become increasingly complex and devious, winning the cybersecurity war is becoming harder and harder. To keep from becoming tomorrow's headline (and to prevent damage to your bottom line), you need a way to gain the upper hand – but how?

  • Global Threat Report

    Sponsored by: VMware International Unlimited Company

    94% of organizations worldwide have suffered a data breach as a result of a cyberattack in the past 12 months, and the average organization has experienced 2.17 breaches. If this statistic surprises you, then you may want to read the full global threat report by VMware and Carbon Black to get a sense of where threat actors are developing most.

  • The Future-Ready SOC: Using XDR to Achieve Unified Visibility and Control

    Sponsored by: VMware International Unlimited Company

    The technological and procedural silos that exist between IT and security operations center (SOC) team members have impeded an enterprise’s ability to effectively mitigate risk. Turn the tide – read this white paper to examine how extended detection & response (XDR) can help.

  • Hitachi ID Bravura Discover

    Sponsored by: Hitachi ID

    In the age of ransomware attack, your organization needs to proactively control identity and privileged access security, and it needs risk insight while maintaining scalability. View this Hitatchi ID Bravura Discover data sheet to learn about an approach to IAM and PAM that strives to identify hidden risks and scale with growing threats.

  • A Comprehensive Approach to File Security and Compliance

    Sponsored by: Fasoo

    Digital transformations are exposing significant gaps in most organization’s file security and compliance capabilities. In this solution brief, explore some of these gaps and discover Fasoo’s comprehensive approach to file security and compliance – designed to eliminate the need for point solutions by unifying efforts under one platform.

  • Hacking Active Directory – From A Pen Tester

    Sponsored by: Quest

    Active Directories (AD) provides authentication and protects credentials, information systems and intellectual property from unauthorized access – protecting your organization from financial and reputational harm. However, cybercriminals have found ways to exploit ADs – read this white paper to see the 8 most common AD-specific threats.

  • McAfee MVISION Insights

    Sponsored by: McAfee

    Enterprises have reacted to the evolution of cyberthreats by increasing security budgets and adopting siloed threat intelligence platforms, but neither of these strategies has offered the desired results. They both require rigorous human intervention and produce only limited actionability. Read this white paper for an alternative approach.

  • Remote Work Best Practices Emphasize UC Collaboration Tools

    Sponsored by: TATA Communications

    Most organizations take their business continuity plans for granted under normal conditions, but these plans aren’t truly tested until adversity strikes. Now, continuity must be ensured through maximization of remote resources, especially UC technology, to keep employees happy and mitigate risk. Read our expert guide to learn how to do this.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.