Risk Management Research
-
Insider Risk Management
Sponsored by: ExabeamMost security practitioners view the insider threat problem through a pure threat lens, yet others see it as a compliance exercise. Inside this e-book, learn about the benefits of viewing insider threats as a risk management problem and seeing them in the context of asset impacts, vulnerabilities, and threats.
-
Finding the Disconnect: Security Perceptions and Behaviors of Today’s Enterprise Employees
Sponsored by: DtexAs the modern enterprise acknowledges cyber risks as critical business risks, the nature of enterprise security discussions is quickly moving from the technical and operational to the strategic. This has created a new reality in which security decisions can turn a user into a trusted ally... or a liability. Read this guide to learn more.
-
IT Risk Management: Comparing Top Vendors & Offerings
Sponsored by: ServiceNowGartner predicts that by 2025, 50% of global midmarket and large enterprises will depend on risk management tools to address risks in their organizations. This Magic Quadrant report highlights and evaluates the most prominent risk management vendors and offerings in today’s market – read on to unlock the full report.
-
Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
Sponsored by: ComputerWeekly.comIn this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
-
Rethinking Insider Risk in the Gig Economy
Sponsored by: ProofpointBy 2027, gig workers may account for half of the total U.S. workforce. It’s a major shift that comes with profound security implications. Some 87% of companies have suffered an incident with a third-party supplier that disrupted their operations, according to Deloitte. View this e-book to learn how to mitigate insider risk in the new work reality.
-
How to Level Up Your Vendor Management
Sponsored by: AptibleEvery company needs vendors, yet vendors increase your vulnerability to security threats. Many of the largest data breaches in the past decade or so have happened because of vulnerabilities from 3rd party vendors. Therefore, you must establish robust processes on both sides of vendor management. View this guide to learn more.
-
Business Continuity Management: Planning, Disaster Recovery & Crisis Response
Sponsored by: ServiceNowBusiness continuity management (BCM) tools are an effective way for organizations to ensure crisis preparation and disaster recover plans are in place prior to an unforeseen disruption. This solution brief highlights the key features and capabilities of ServiceNow’s BCM tool – read on for more information.
-
Attacking and Defending a Distributed Workforce
Sponsored by: ServiceNowThe shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
-
Beyond Digital Risk— Addressing Operational Risk
Sponsored by: ServiceNowOperational risk management keeps companies ahead in their markets and fortifies their foundations, even on shifting ground. But due to its complexity, operational risk management often gets lost in the mix of other risk management strategies. Read this white paper to learn how you can connect risk across the enterprise.
-
Covid-19 Lessons Learned—Business Continuity Management
Sponsored by: ServiceNowRegardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.
-
Case Study: Medical Devices & Securing the Healthcare Industry
Sponsored by: RezilionThe healthcare industry has been a prime target of cyberattacks for several years, however COVID-19 brought most of these issues into the public eye. This case study highlights where the vulnerabilities lie and provides an overview of how Rezilion is working with healthcare device companies to prioritize and mitigate these risks.
-
Vendor Risk Management by Deloitte
Sponsored by: ServiceNowServiceNow Vendor Risk Management supports enterprises with their Vendor Risk Management process and enables them to support the Vendor Risk Lifecycle with ease. It provides a centralized process for managing vendor portfolios, assessing vendor risks including the tiering process and completing a remediation lifecycle. Learn more here.
-
Market Guide For Crisis/Emergency Management Solutions
Sponsored by: ServiceNowThe 2020 pandemic has led security and IT leaders to reevaluate their current crisis/emergency management (C/EM) programs and consider making alterations based on what they’ve learned from COVID-19. This Gartner Market Guide provides an overview of top C/EM tools, required capabilities and strategic recommendations – read on to get started.
-
Refining risk resolution for the new normal
Sponsored by: ServiceNowIf the COVID crisis has taught us anything it’s that adaptability is necessary for success. In this session, you will learn how enhancements to Advanced Risk Assessment will get you information more quickly, so you can get ahead of risks.
-
Methodology of an IAM Introduction
Sponsored by: Beta SystemsIAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
-
Refining risk resolution for the new normal
Sponsored by: ServiceNowIf the COVID crisis has taught us anything it’s that adaptability is necessary for success. In this session, you will learn how enhancements to Advanced Risk Assessment will get you information more quickly, so you can get ahead of risks.
-
Risk Management Best Practices for Privileged Access Management (PAM)
Sponsored by: QuestApplying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.
-
Security analytics: Introduction, use cases, and quick-start guide
Sponsored by: TechTargetAs cyberattacks become increasingly complex and devious, winning the cybersecurity war is becoming harder and harder. To keep from becoming tomorrow's headline (and to prevent damage to your bottom line), you need a way to gain the upper hand – but how?
-
Global Threat Report
Sponsored by: VMware International Unlimited Company94% of organizations worldwide have suffered a data breach as a result of a cyberattack in the past 12 months, and the average organization has experienced 2.17 breaches. If this statistic surprises you, then you may want to read the full global threat report by VMware and Carbon Black to get a sense of where threat actors are developing most.
-
The Future-Ready SOC: Using XDR to Achieve Unified Visibility and Control
Sponsored by: VMware International Unlimited CompanyThe technological and procedural silos that exist between IT and security operations center (SOC) team members have impeded an enterprise’s ability to effectively mitigate risk. Turn the tide – read this white paper to examine how extended detection & response (XDR) can help.
-
Hitachi ID Bravura Discover
Sponsored by: Hitachi IDIn the age of ransomware attack, your organization needs to proactively control identity and privileged access security, and it needs risk insight while maintaining scalability. View this Hitatchi ID Bravura Discover data sheet to learn about an approach to IAM and PAM that strives to identify hidden risks and scale with growing threats.
-
A Comprehensive Approach to File Security and Compliance
Sponsored by: FasooDigital transformations are exposing significant gaps in most organization’s file security and compliance capabilities. In this solution brief, explore some of these gaps and discover Fasoo’s comprehensive approach to file security and compliance – designed to eliminate the need for point solutions by unifying efforts under one platform.
-
Hacking Active Directory – From A Pen Tester
Sponsored by: QuestActive Directories (AD) provides authentication and protects credentials, information systems and intellectual property from unauthorized access – protecting your organization from financial and reputational harm. However, cybercriminals have found ways to exploit ADs – read this white paper to see the 8 most common AD-specific threats.
-
McAfee MVISION Insights
Sponsored by: McAfeeEnterprises have reacted to the evolution of cyberthreats by increasing security budgets and adopting siloed threat intelligence platforms, but neither of these strategies has offered the desired results. They both require rigorous human intervention and produce only limited actionability. Read this white paper for an alternative approach.
-
Remote Work Best Practices Emphasize UC Collaboration Tools
Sponsored by: TATA CommunicationsMost organizations take their business continuity plans for granted under normal conditions, but these plans aren’t truly tested until adversity strikes. Now, continuity must be ensured through maximization of remote resources, especially UC technology, to keep employees happy and mitigate risk. Read our expert guide to learn how to do this.