Risk Management Research
-
The Total Economic Impact™ Of ServiceNow Security Operations
Sponsored by: ServiceNowWith the growing complexity and volume of cyberattacks, organizations will become more vulnerable to security threats. You need security orchestration tools that can connect security and IT teams for faster and more efficient response to security incidents. Access this Forrester report to get the facts on ServiceNow’s Security Operations.
-
8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
Sponsored by: ServiceNowAutomating Governance, Risk, and Compliance (GRC) greatly reduces costs and improves efficiency. This paper provided 8 simple steps for automating GRC.
-
Essential Operational Resilience
Sponsored by: ServiceNowOperational resilience is defined as ‘the ability of an organization to continue to serve its customers, deliver products and services, and protect its workforce in the face of adverse operational events by anticipating, preventing, recovering from and adapting to such events.’ View this white paper to learn 4 steps to operational resilience.
-
Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
Sponsored by: ComputerWeekly.comIn this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
-
Business Continuity Management Continuity Planning, Disaster Recovery, Crisis Response
Sponsored by: ServiceNowBusiness continuity management (BCM) tools are an effective way for organizations to ensure crisis preparation and disaster recover plans are in place prior to an unforeseen disruption. This solution brief highlights the key features and capabilities of ServiceNow’s BCM tool – read on for more information.
-
Covid-19 Lessons Learned—Business Continuity Management
Sponsored by: ServiceNowRegardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.
-
Attacking And Defending A Distributed Workforce
Sponsored by: ServiceNowThe shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
-
Beyond Digital Risk— Addressing Operational Risk
Sponsored by: ServiceNowOperational risk management keeps companies ahead in their markets and fortifies their foundations, even on shifting ground. But due to its complexity, operational risk management often gets lost in the mix of other risk management strategies. Read this white paper to learn how you can connect risk across the enterprise.
-
A focused approach to managing risk in uncertain times
Sponsored by: ServiceNowAs businesses emerge from the initial COVID-19 crisis, they are coming under immense pressure to adapt their risk and resilience programs to the evolving effects of COVID-19 and other potential disruption. In this white paper, uncover 4 steps businesses can take to help them become more resilient, control risks and maximize productivity.
-
Gartner Magic Quadrant for IT Vendor Risk Management Tools (ITVRM)
Sponsored by: ServiceNowIT vendor risk management (IT VRM) software provides solutions to manage and automate the vendor risk management life cycle, address third-party risk and meet regulatory compliance. This Gartner Magic Quadrant Report provides an overview of the IT VRM market and a comprehensive evaluation of the top offerings – read on to get started.
-
KuppingerCole Market Compass IT-GRC Tools
Sponsored by: ServiceNowIT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.
-
Gartner Magic Quadrant for IT Risk Management
Sponsored by: ServiceNowIT risk management (ITRM) has emerged as a key pillar in assessing risk, bolstering security and addressing compliance needs. Read this Gartner Magic Quadrant Report for an in-depth comparison of the capabilities of top ITRM vendors and offerings in today’s market.
-
Developing a more effective risk report for your board
Sponsored by: ServiceNowToday’s risk climate necessitates that everyone within the organization, regardless of job function, is invested in security and protection of their organization. However, organization-wide buy-in starts with getting the board involved. Download this white paper to learn how to convey the seriousness of cyber risk to your board.
-
Enterprise Risk Management (ERM) and Governance, Risk and Compliance (GRC) Digital tools for oversight in the enterprise
Sponsored by: ServiceNowIn this report, discover the results of Constellation Research’s initiative into determining the most effective digital tools for oversight in the enterprise and observe a shortlist of 12 unique enterprise risk management (ERM) and governance, risk and compliance (GRC) offerings you should be aware of.
-
Securing Your Cloud Solutions for Government Adoption
Sponsored by: CoalfireFedRAMP establishes cybersecurity requirements for CSPs that deliver solutions to the federal market and utilizes independent experts to advise organizations and assess their compliance. In this report, assess the market and industry dynamics that affect both FedRAMP and cloud adoption in the federal government.
-
Digital Transformation and Risk for Dummies, ServiceNow Special Edition
Sponsored by: ServiceNowIn this e-book, you’ll learn everything you need to know about digital risk management 101. Inside, find out how you can understand the different types of risks, establish policies, controls, and monitoring best practices, and apply 5 tips for secure digital transformation success.
-
11 Metrics to Watch
Sponsored by: Arctic Wolf Networks, Inc.According to Gartner, it takes hackers on average fewer than 8 days to exploit a vulnerability. In this report, dive into the key metrics every security team needs to better secure their operations and help prevent cyberattacks.
-
Computer Weekly - 5 November 2019: The benefits of API-first software development
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.
-
Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.
-
Computer Weekly - 10-16 September 2019: A tech boost for social care
Sponsored by: ComputerWeekly.comIn this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.
-
Evaluating Data-centric Protection Solutions
Sponsored by: Comforte AGData is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
-
Methodology of an IAM Introduction
Sponsored by: Beta SystemsIAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
-
CYBERSECURITY BUILT FOR YOUR BUSINESS, BUDGET AND STAFF
Sponsored by: Panda SecurityIn the US, 42% of employees are working from home full-time. As a result, managing distributed workforces has become a priority for organizational leaders. Remote deployment and lack of centralization have both created security and compliance risks. To regain control, view this e-book about the top organizational challenges and their solutions.
-
A Computer Weekly buyer’s guide to compliance, risk and governance
Sponsored by: ComputerWeekly.comManaging data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
-
Remote Work Best Practices Emphasize UC Collaboration Tools
Sponsored by: TATA CommunicationsMost organizations take their business continuity plans for granted under normal conditions, but these plans aren’t truly tested until adversity strikes. Now, continuity must be ensured through maximization of remote resources, especially UC technology, to keep employees happy and mitigate risk. Read our expert guide to learn how to do this.