ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Less Hackable

    Sponsored by: ThreatLocker

    The problem that many businesses face when trying to secure their cyber environments is that they do not understand the risks involved. In this white paper, gain a better understanding of common cyber risks and learn how those risks can be reduced to an acceptable level.

  • Quantum Computing and Quantum-Safe Security

    Sponsored by: Thales

    Although quantum computer will have many benefits, it will also have the ability to do harm. The very same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. In this white paper, learn more about quantum computing and the implications it will have on the cybersecurity landscape.

  • Is Your Front Door Open and Unlocked for Cyber Criminals?

    Sponsored by: Verizon

    When it comes to cyber security, small businesses represent 43% of all data breaches because their false sense of security leads them to not put proper defenses in place. In this blog, learn why cyber criminals often target SMBs before going after larger organizations.

  • Mobile Security Index 2020

    Sponsored by: Verizon

    Mobile technology and the cloud are enabling and medium-sized businesses to grow and compete with larger enterprises more effectively. But unless they take further steps to secure their mobile devices, SMBs could face significant damage to their reputations and bottom lines before the competition even begins.This infographic explains in detail.

  • 8 Simple Steps for Automating Governance, Risk, and Compliance in Financial Services Organizations

    Sponsored by: ServiceNow

    Managing layers of local, regional, and global regulation is an exceedingly complex endeavor for financial services organizations. However, automating Governance, Risk, and Compliance (GRC) processes can significantly mitigate the risks of running afoul of regulators. In this resource, explore a checklist with 8 simple steps for automating GRC.

  • Analyst Report: Governance, Risk, And Compliance Platforms, Q1 2020

    Sponsored by: ServiceNow

    In this most recent edition of The Forrester Wave: Governance, Risk and Compliance Platforms, industry experts at Forrester identify and evaluate 12 key GRC platform providers, how they compare to each other, and offers key insights into emerging market trends. Download this report to leverage Forrester’s GRC expertise.

  • Securing Your Cloud Solutions for Government Adoption

    Sponsored by: Coalfire

    FedRAMP establishes cybersecurity requirements for CSPs that deliver solutions to the federal market and utilizes independent experts to advise organizations and assess their compliance. In this report, assess the market and industry dynamics that affect both FedRAMP and cloud adoption in the federal government.

  • 5 Reasons your SMB workspace needs simple SSO

    Sponsored by: Citrix

    SSO should make life easier for both IT and employees. But when new apps require different SSO tools from different vendors, it can complicate your IT. Adopting simple, unified SSO for your workspace can ensure secure, anywhere access to all essential applications.This e-book gives five reasons why your organization needs simple, unified SSO.

  • 5 Things Better Connectivity Can Help You Achieve

    Sponsored by: Verizon

    By 2025, the average connected person will interact with a connected device nearly 4,800 times per day—about once every 18 seconds. If your organization’s network is not amply prepared, you will be at risk of falling behind. Access this infographic for 5 business advantages of increasing connectivity and how they impact your bottom line.

  • CW ANZ, July 2020: Expert Advice on Security

    Sponsored by: ComputerWeekly.com

    In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.

  • Royal Holloway: Driverless vehicle security for military applications

    Sponsored by: ComputerWeekly.com

    Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.

  • You've Got BEC!

    Sponsored by: Proofpoint

    BEC attacks have become bigger and costlier than ever. Toyota Boshoku, a subsidiary of the car manufacturer, lost $37 million to a BEC scam. Toyota is one of many companies that has suffered a loss from this type of email fraud. The good news? There is a layered approach to keep your email accounts and data safe. Open this e-book to learn more.

  • Securing the New Normal: A Virtual Happy Hour on Moving Forward

    Sponsored by: RSA Conference

    In this webcast, a panel of industry leaders discuss the future of cybersecurity, highlighting what’s next for the industry, and the ways in which cybersecurity will evolve as we come to understand the “new normal” – focusing on business processes, procedures and policies, network security architecture and much more.

  • Driving Resiliency and Security in the Financial Services Industry

    Sponsored by: BMC

    Resiliency is critical to the long-term success of the financial services industry. This is due to the amount of sensitive personal and financial data they manage that have attracted increasingly sophisticated cyberattack methods. Read on to discover best practices for ensuring security and resiliency of t financial services organizations.

  • Five Key Elements of Continuous IT Compliance

    Sponsored by: BMC

    As compliance regulations become more stringent, security and compliance teams are under additional pressure to ensure security, reduce risk and avoid conflicts. Download this white paper to learn more about a modern, intelligent approach to security – including 5 critical elements necessary for continuous IT compliance.

  • 10-Step Executive Action Plan for Collective Defense

    Sponsored by: IronNet

    A collective approach may be beneficial to organizations searching for security advantages.Indeed, a heightened security posture often begins and ends with collaboration. In this e-book, read more about how a combination of organizational preparedness and advanced technology can aid in defending against threats.

  • How to Get the Most Value out of Your Penetration Test

    Sponsored by: RSA Conference

    At RSA Conference, Ed Skoudis from the SANS Institute facilitated a problem-solving discussion in the RSAC Engagement Zone. Jump into this webcast to see how he follows up on that discussion. He shares insights into what he learned from the community on getting the most value from penetration testing.

  • The 5 Most Dangerous New Attack Techniques and How to Counter Them

    Sponsored by: RSA Conference

    What are the most dangerous new techniques attackers are employing? This fast-paced briefing features three experts from the SANS Institute best-positioned to provide answers: the nation’s top expert on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert in the US.

  • How Threat Modeling & Attack Simulation Works

    Sponsored by: Coalfire

    In this webinar, join Mike Weber, VP of Innovation at Coalfire, as he overviews how threat modeling and cyberattack simulations work within security program architectures – including how to interpret simulation data. Watch now to learn more about identifying and understanding the risks within your environment.

  • RSAC Resource Guide: U.S. Election Security 2020

    Sponsored by: RSA Conference

    Many cybersecurity experts have expressed concerns about the security of the upcoming U.S. elections. This RSAC Resource Guide: U.S. Election Security 2020 compiles expertise from industry leaders to provide readers with the insight and information they need to understand this topic.

  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Sponsored by: ComputerWeekly.com

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.

  • 5 Must-Haves for Your Next Enterprise Backup Solution

    Sponsored by: Cohesity

    Access this white paper to learn 5 must-haves when evaluating your next enterprise backup and recovery investment to overcome the operational challenges of disparate data and to simplify data management.

  • 5 Questions Every CIO Must Answer in the Coronavirus Age

    Sponsored by: Hitachi Vantara

    The Coronavirus has completely changed the notion of a business environment, and there’s no telling when employees will be back in the office, if ever. In order to help IT and security leaders address these challenges, this white paper offers 5 questions for CIOs to ask themselves right now regarding identity and access management (IAM).

  • 10 Benefits of Concur Expense

    Sponsored by: Concur Technologies

    SAP Concur is a leading provider of integrated travel, expense, and invoice management solutions driven by the pursuit of automating and simplifying these everyday processes. Access this data sheet to discover 10 benefits of Concur’s Expense solution.

  • Cybersecurity Evolved: The Sophos Business Impact

    Sponsored by: Sophos

    Improvements to cybersecurity often rely on an increase in IT resources, which most organizations are unable to fulfill. This collection of 5 Sophos customer success stories illustrates how organizations may be able to strengthen threat protection and efficiency without adding headcount. Read on to discover how.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.