ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Cybersecurity Risk Management Simplified

    Sponsored by: CyberSaint

    There could be no greater luxury in today’s unpredictable world than having cybersecurity and risk management simplified. In this white paper, you can learn about a standardized risk management platform that allows you to integrate your strategy for a unified approach, manage expectations for risk reduction, and intelligently present cost.

  • The Risk Cloud

    Sponsored by: LogicGate

    Approaches to risk management are shifting from reactive to proactive. Integrating risk management programs is a key to growth in today’s digital landscape. Many of the challenges involving risk, including lack of visibility and poor UX, can be solved through a more agile approach. Read this white paper to learn about the Risk Cloud and agile GRC.

  • Top Security and Risk Management Trends

    Sponsored by: Palo Alto Cortex

    View Gartner’s Top Security and Risk Management Trends of 2020 to help improve your company’s overall resilience, better support your business’s objectives and elevate your organizational standing.

  • Airbus Cybersecurity Strengthens its Threat Intelligence with ThreatQuotient

    Sponsored by: ThreatQuotient

    How do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.

  • Do You Think Your Endpoint Security Strategy Is Up to Scratch?

    Sponsored by: HP Inc

    IDC surveyed 500 security decision makers and influencers at organizations in key European and North American markets, across vertical sectors from across the spectrum including banking and finance, telco, and energy. Respondents were questioned on key factors pertaining to endpoint security strategy. Read the full survey to learn the results.

  • Beyond COVID-19 Webinar

    Sponsored by: Hyperproof

    COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.

  • The State of Ransomware 2020

    Sponsored by: Sophos

    Ransomware regularly dominates headlines as one of the most notorious threats facing organizations – but do the successful attacks tell the full story? In this research report, discover what happens when ransomware hits, the impacts of paying the ransom, the emergence of cybersecurity insurance, and more.

  • The Legal Cybersecurity Checklist

    Sponsored by: Arctic Wolf Networks, Inc.

    Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.

  • The CIO’s Cybersecurity Checklist

    Sponsored by: Arctic Wolf Networks, Inc.

    CIOs have never been under more duress than they are under now. An enlarged attack surface coupled with a growing threat landscape means that senior leaders have to dot their i’s and cross their t’s when it comes to network security. Want to stay ahead? View this CIO cybersecurity checklist to know where you are and where you need to be.

  • Charting a Course For Enterprise Risk Management

    Sponsored by: riskconnect

    This e-book will explain what ERM is, why it's worthwhile, and how to begin managing risks and opportunities holistically.

  • Public Cloud Adoption in Financial Services- 7 key considerations for CIOs (Celent paper)

    Sponsored by: IBM

    Access this white paper for 7 critical considerations as financial institutions plan and execute their technology transformation and public cloud migration strategies.

  • Public Cloud Adoption in Financial Services- 7 key considerations for CIOs (Celent paper)

    Sponsored by: IBM

    Access this white paper for 7 critical considerations as financial institutions plan and execute their technology transformation and public cloud migration strategies.

  • Transforming Compliance

    Sponsored by: riskconnect

    This e-book will help you transform compliance from a check-the-box function to a well-oiled machine that seamlessly integrates people, processes, and technology with data-driven visibility to champion the organization's future.

  • Life After Lockdown: A Playbook for Crisis Recovery, Resiliency and Restarting Right

    Sponsored by: riskconnect

    This e-book presents a simple, organized way to recover stronger, build resilience, and restart right to withstand whatever comes next.

  • Risk Management Information Systems: The Buyer's Guide

    Sponsored by: riskconnect

    This e-book will help you decide if a RMIS is right for you – whether you are considering purchasing a RMIS for the first time, replacing a homegrown system, or upgrading an outdated one.

  • Hacker vs CISO: Exploiting and Protecting Your WFH Workforce

    Sponsored by: Tanium

    The hacker is the bane of the CISO, and vice versa. It’s not often that both of these enigmatic personas are in the same room to speak on organizational security and the threat landscape, and during an era of global remote work, their words are quite valuable. Watch this unique webcast to learn perspectives from two opposing security combatants.

  • 92% Of The World’s Top Websites Expose Customer Data To Attackers

    Sponsored by: Tala Security

    It’s no secret that security risk has never been higher, but what’s important is to know the specifics of these risks. Issues such as unintentional data exposure and data leakage via trusted applications are becoming more relevant, and it’s crucial that you know what they mean and how to prevent them. View this report to get the details.

  • Securing Branch Offices and Retail Stores in the Digital Age

    Sponsored by: Palo Alto Networks

    The advancement of the branch office is matched only by the evolution of network threats. With networking solutions such as SD-WAN now on the market, organizations must rethink their branch office security. Read this white paper outline the challenges of branch security and view typical use cases.

  • Penetration Testing Vendor Selection Checklist

    Sponsored by: Synack

    In today’s IT environment, one of the biggest risks to a corporation’s valuation is a security breach. But how does a security team apply their budget in a way that ensures the applications, websites, and other assets are secure? What requirements are the most important? Use this comprehensive checklist to help you evaluate vendors.

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Sponsored by: ComputerWeekly.com

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

  • 7 SIEM Trends to Watch in 2020

    Sponsored by: Splunk

    In the last year alone, demand for SIEM technology has remained strong, with threat management as the primary driver, and general monitoring and compliance secondary. In this white paper, learn about 7 SIEM trends to watch for in 2020.

  • SCCM Upgrade Checklist | Automate Patch Management in the Cloud

    Sponsored by: Automox

    The digital landscape is constantly evolving, and traditional legacy tools are being replaced by cloud-based SaaS alternatives – and patch management is no exception. However, there are some key factors to consider prior to making the switch. Read this article to make sure you’re ready for cloud-based patch management.

  • Paradise Lost: Exploiting the New Distributed Workforce Economy

    Sponsored by: Tanium

    Organizations have noted the widened gaps in IT visibility since remote work became the norm - now it’s time to react. View this white paper to learn how unified endpoint security (UES)/unified endpoint management (UEM) can help detect and prevent these pandemic-related threats.

  • Data Protection Compliance in the UK

    Sponsored by: Zivver

    GDPR has ushered in a new era of data protection for European organizations – but what does data protection and compliance look like for the UK amid their decision to leave the EU? The following e-book highlights the evolution of data protection in the UK and offers a comprehensive checklist for ensuring GDPR-readiness.

  • TCO Study of WSUs and SCCM

    Sponsored by: Automox

    Patch management plays a critical role in ensuring systems are operating properly and protected against attacks. However, like most technology functions, modern enhancements allow organizations to transition from on-premise systems to cloud-based SaaS offerings – but does the SaaS switch make fiscal sense? Read on to find out.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.