Risk Management Research
-
PPM & IT Governance Summit 2014
Sponsored by: GartnerThis brochure details the agenda for the Gartner Program and Portfolio Management (PPM) & IT Governance Summit, where leaders join to address top challenges and best practices for the upcoming year.
-
Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
Sponsored by: NetIQThis resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
-
The Safe On-Ramp to Big Data
Sponsored by: InformaticaThis white paper examines the risk and reward of big data and highlights how leading organizations are utilizing Informatica technology as a safe on-ramp to big data that reduces risk and cost while speeding insights and innovation.
-
Best practices in managing requirements in Energy and Utilities industries
Sponsored by: IBMThis webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.
-
Giving Customers Better Protection While Reducing Costs
Sponsored by: ThreatMetrixThis case study outlines a top e-commerce business and their strategy for preventing fraud, lowering costs and ensuring consumer trust.
-
Is security a concern of your mobile users?
Sponsored by: CiscoThis brief resource highlights the top 3 mobile user expectations of network connectivity.
-
Five Trends to Track in E-Commerce Fraud
Sponsored by: ThreatMetrixThis paper outlines five troubling trends in e-commerce fraud, and offers some guidance on how you can mitigate the risk they present to your business.
-
ThreatMetrix Gives eMerchantPay a Substantial Competitive Advantage
Sponsored by: ThreatMetrixThis case study explores eMerchantPay, an online payment service provider, and how it was able to utilize advanced analytics to block fraudulent devices.
-
How to Protect the Increasingly Vulnerable Energy Industry
Sponsored by: IBMLearn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
-
Secunia Vulnerability Review 2014
Sponsored by: SecuniaThis guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
-
Podcast: Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
Sponsored by: Code42In this on-demand podcast from the experts at SearchStorage.com, learn how choosing the right cloud model can help you address the challenges of data backup and security.
-
Secunia PSI Country Report - Q4 2013 Germany
Sponsored by: SecuniaThis informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.
-
Information Security ASEAN March 2014
Sponsored by: TechTarget SecurityThis ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.
-
Information Security ANZ March 2014
Sponsored by: TechTarget SecurityThis issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
-
Investigating Cloud and Mobile Options for Procurement
Sponsored by: TechTarget ERPThis handbook provides an expert roadmap for approaching cloud and mobile procurement, outlining common threats and challenges, tips for achieving e-procurement software ROI, and more.
-
Are you minding your business's reputation? What can you do to mind it better?
Sponsored by: IBMChanging social, cloud, and mobile technologies makes our lives smarter, more connected and more productive – but it also exposes us to bigger risks. In this video, learn about a simple tool that will help you assess how well you're managing your reputation and your IT investment.
-
Breaking Through the GRC Value Ceiling
Sponsored by: EMC CorporationThis paper uses the RSA Archer GRC Reference Architecture to illustrate the value of operational technologies while acknowledging there is a ―Value Ceiling‖ for some niche operational tools, highlighting the missed opportunity for broader value.
-
Detecting Sophisticated Online Attacks with Streaming Analytics
Sponsored by: EMC CorporationDiscover how RSA Web Threat Detection delivers actionable intelligence by leveraging big data to correlate anomalies and detect online threats in real time.
-
Understanding the Economics of IT Reputational Risk
Sponsored by: IBMAccess this white paper today to view the results of a survey of more than 1000 business continuity specialists and more than 1200 security practitioners, and learn how your peers are approaching modern DR and reputation management practices.
-
Combat the Latest Security Attacks with Global Threat Intelligence
Sponsored by: IBMIn this white paper, learn how to approach today's advanced threat landscape by first understanding the source of attacks, then developing threat intelligence to better detect and analyze new threats to help maximize defense efforts.
-
Managing Security Risks and Vulnerabilities
Sponsored by: IBMRead now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console.
-
EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
Sponsored by: GlobalscapeThis whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
-
Technical Guide on Application Security
Sponsored by: TechTarget SecurityThis expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.
-
EMA Report: The Benefits of a Unified Endpoint Management Approach
Sponsored by: IBMRead this resource to learn how a unified security and IT operations approach can better protect organizations' vast and growing amount of endpoints from sophisticated threats.
-
Manage Data Security and Application Threats with a Multi-Tiered Approach
Sponsored by: IBMThis resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.