ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Adaptive Risk Management For Complex Supply Chains

    Sponsored by: The Santa Fe Group

    This paper discusses supply chain risk and the increased demands that complex supply chains place on outsourcers and providers. It also provides strategies and tactics for building and applying complex adaptive solutions to your own Third-Party Risk Management (TPRM) program. Download your copy today.

  • Role Of Erm In Managing Risks Related To New Technologies

    Sponsored by: The Santa Fe Group

    As technology grows stronger, risk becomes greater. Because to a degree, IT departments are jumping into the unknown with each new investment they make, so it’s important that the risks associated with these new technologies are adequately mitigated. Dive into this white paper to view 7 steps to effective risk management for emerging tech.

  • CISSP Exam Guide: Chapter 1: Security and Risk Management

    Sponsored by: McGraw Hill

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

  • S7 E48 Cisco Business Critical Services For A Holistic Cisco SecureX Environment

    Sponsored by: Cisco Systems, Inc.

    Hear a discussion about Cisco SecureX – a unified security operations platform that automates workflows to save skilled security teams from hours of tedious manual work. You’ll also learn how supplementing SecureX with Cisco Business Critical Services can help organizations secure their workplaces and workforces in this era of increased attacks.

  • Forrester CMD Webinar

    Sponsored by: Cisco Umbrella

    Access this Forrester webinar to learn some of the biggest challenges faced by security pros at organizations of all sizes and what they’re doing to overcome security risk. And discover Cisco Cloud Mailbox Defense, a new email security product engineered with the aim to help security pros address email threats and overcome these challenges.

  • How to Inspect Communications for Outside Business Activities

    Sponsored by: Smarsh

    Download this checklist to help identify potential areas of OBA risk and close the visibility gap for unauthorized business activities and other areas of employee impropriety.

  • Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis

    Sponsored by: Interos

    The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.

  • SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long

    Sponsored by: Interos

    The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.

  • Emerging Third Party Risks Threaten Operational Resilience In Financial Services

    Sponsored by: Interos

    After years of outsourcing non-core functions, and using services provided by affiliates, financial institutions often find themselves dealing with complex—and risky—supply chains. In this white paper, learn about third-party risk management (TPRM) and how it can help FSIs address these challenges, and ultimately improve operational resilience.

  • Integrated Cybersecurity Delivers Efficiency and Effectiveness in a Challenging Environment

    Sponsored by: Kaspersky

    According to IDC research, the majority (75%) of organizations worldwide recognize that security team's time is wasted due to a lack of integration in their security environments. These teams would be wise to consider a multi-level, integrated approach with endpoint protection in mind. See this IDC white paper to examine such an approach.

  • Cybersecurity is Improving, But is it Enough?

    Sponsored by: eSentire

    Threat intelligence and security orchestration are leading the charge in increasingly flexible and dynamic IT environments. But what do IT leaders think? Leverage this 451 Research white paper to uncover critical survey data about modern cybersecurity trends and where attitudes are shifting as more and more companies adopt cloud.

  • Best Practice ITAM Governance

    Sponsored by: Livingstone Tech

    IT asset management (ITAM) governance helps protect organizations against a variety of corporate risks and allows them to switch from being reactive to proactive in their risk mitigation. Open up this white paper to read up on everything ITAM governance, including the risks of poor ITAM governance, IT governance best practices and more.

  • Randori Recon How To Prioritize Like An Attacker

    Sponsored by: Randori

    With the rise of cloud computing, containerization, and serverless computing, maintaining a perfect inventory of your external assets and ensuring they are patched has become an overwhelming challenge. Read this e-book to discover Randori’s best practices for analyzing your attack surface in the most effective way.

  • The Complete Guide to Evaluating Attack Surface Management

    Sponsored by: Randori

    Attack surface management (ASM) is an emerging category of solutions which aims to help organizations understand and address risks related to the stark rise in remote devices connected to the internet – read this SANS report to learn more about the ASM market.

  • How Continuous, Automated Red-Teaming Can Elevate Your Security Posture

    Sponsored by: Randori

    Security teams are recognizing that a continuously evolving IT ecosystem demands a shift in tactics. Continuous, automated red team testing can help enterprises adopt a risk-based and adversary-focused security approach to ensure that they are prepared to defend against evolving threats. Dive into this S&P Global brief to get the specifics.

  • The Total Economic Impact of ServiceNow Security Operations

    Sponsored by: ServiceNow

    With the growing complexity and volume of cyberattacks, organizations will become more vulnerable to security threats. You need security orchestration tools that can connect security and IT teams for faster and more efficient response to security incidents. Access this Forrester report to get the facts on ServiceNow’s Security Operations.

  • Software & Cloud Lifecycle Management Transformation

    Sponsored by: Livingstone Tech

    What does a software and cloud lifecycle management transition look like? Dive inside this quick blueprint to step through a software and cloud lifecycle management workshop of your own, revealing the lifecycle challenges your own organization might be grappling with — sometimes without even knowing — and pointing towards the answers of best fit.

  • Email Risk Assessment Report

    Sponsored by: 365iTMS

    Email security is much talked about right now, and it’s important that you’re up to date on the scale at which it’s under attack, the most popular types of malware bad actors are using and the vulnerability of email in general. Access the Email Risk Assessment Report to understand these trends and to pick up 7 recommendations on email safety.

  • Secure by Design Cloud Business Communications Apps & Infrastructure from NWN

    Sponsored by: NWN Corporation

    Integrated security is helping companies mitigate larger attack surfaces created by remote and hybrid work teams. Security postures are shifting from reactive to proactive, and one-size-fits-all approaches are falling by the wayside. View this solution brief to explore how to get a unified view of your entire cloud communications infrastructure.

  • The Changing Vendor Audit Landscape

    Sponsored by: Livingstone Tech

    As organizations adopt more cloud platforms with subscription-based licensing, the traditional landscape of software publisher audits and related risk is also rising. This webinar covers these changes and how to prepare through best practices. Tune in to learn about how to approach risk assessment, how to deal with audits and more.

  • ServiceNow Risk & Compliance: Advancing GRC, Risk & BCM

    Sponsored by: ServiceNow

    Download this Forrester Total Economic Impact Report for exclusive insight into the efficiencies and advancements in governance, risk and compliance (GRC), vendor risk management (VRM) and business continuity management (BCM) with ServiceNow Risk and Compliance – as well as an analysis of costs.

  • Why Digital Transformation Depends on Integrated Risk Management

    Sponsored by: ServiceNow

    Embarking on a digital transformation without considering risk management is like doing a massive home remodel on top of a crumbling foundation – which is why IT and non-IT leaders are embracing integrated risk management (IRM) as part of their transformation. Read this e-book to learn more about IRM and it’s role in digital transformation.

  • 4 Steps to Operational Resilience

    Sponsored by: ServiceNow

    Operational resilience is defined as ‘the ability of an organization to continue to serve its customers, deliver products and services, and protect its workforce in the face of adverse operational events by anticipating, preventing, recovering from and adapting to such events.’ View this white paper to learn 4 steps to operational resilience.

  • Magic Quadrant For IT Risk Management

    Sponsored by: MetricStream

    By 2025, 50% of businesses will depend on risk management solutions. As such, security and risk management leaders are hunting for such solutions based on cybersecurity initiatives, board risk oversight and digital compliance obligations. Use this Gartner Magic Quadrant to evaluate the strengths and cautions of various players in the space.

  • Fighting Hackers & Responding to Ransomware: A How-To

    Sponsored by: Fidelis

    Cyberthreats aren’t going away any time soon. It’s vital that you take steps to ready your organization for any attack that comes your way. In this expert e-guide, explore 5 actionable deception-tech steps for fighting hackers as well as 9 steps for creating a ransomware incident response plan. Open now to put your best security foot forward.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences