ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Fighting Hackers & Responding to Ransomware: A How-To

    Sponsored by: Fidelis

    Cyberthreats aren’t going away any time soon. It’s vital that you take steps to ready your organization for any attack that comes your way. In this expert e-guide, explore 5 actionable deception-tech steps for fighting hackers as well as 9 steps for creating a ransomware incident response plan. Open now to put your best security foot forward.

  • Global CISO Playbook for the New Normal

    Sponsored by: Fidelis

    It’s arguable that CISOs have the toughest job in the world right now. Growing cyber terrains, evolving threat landscapes and skill shortages are all placing more pressure on these professionals than ever before. Download this e-book to hear from the CISO of Fidelis Cybersecurity as he outlines strategies and best practices for cyber defense.

  • How to Manage Risk and Compliance for Financial Services

    Sponsored by: BigID

    While meeting compliance standards is a requirement for financial services institutions, the sad reality is that many companies don’t have as much of a handle on their data as they might think. Download this white paper to learn how BigID can help financial organizations organize, secure, and regulate their data across multi-cloud ecosystems.

  • Dealing with VUCA

    Sponsored by: InteliSecure

    Today’s IT and security leaders are responsible for dealing with VUCA – volatility, uncertainty, complexity, and ambiguity – and address data security risks in an ever-changing landscape. Read this InteliSecure e-guide to address the elements of VUCA and build agile data protection.

  • Evaluating Data-Centric Protection Solutions

    Sponsored by: Comforte AG

    Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.

  • The Maturity Model for Governance, Risk, and Compliance

    Sponsored by: Aptible

    For more than a decade, the GRC framework has helped companies maintain their data integrity and manage risk in an increasingly digital world. But with compliance growing more and more complex, your GRC operations need to mature as your business does. Scrutinize this guide to understand how to evolve your GRC model in 4 levels.

  • How to Level Up Your Access Control

    Sponsored by: Aptible

    As an organization grows, more users and more systems mean exponentially more reviews. As compliance professionals know, this can become an unmanageable task – especially without the right tools. How can you help your organization to develop better access control? This guide from Aptible may provide the answer.

  • NTT Ltd. and Palo Alto Networks

    Sponsored by: NTT

    Today’s businesses have to address a rapid increase in mobile workers, the sudden need for additional branch offices, cloud adoption, data security needs and the growing enforcement of governance, risk and compliance laws. How can they handle all these challenges? View this data sheet to see how NTT and Palo Alto Networks may be able to help.

  • NWN SecureX Online Workshop

    Sponsored by: NWN Corporation

    Today’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.

  • The Right IT Asset Disposition Partner For A Growing Health System

    Sponsored by: Dynamic Lifecycle Innovations

    A nonprofit, academic healthcare system's fast growth presented the challenge of information technology asset disposal, or, ITAD. In this case study, hear how this healthcare system was able to find an ITAD partner and how your organization can find the best partner for ITAD that matches your needs.

  • Technology Refreshed & Replaced – Now What?

    Sponsored by: Dynamic Lifecycle Innovations

    Once an organization has completed an information technology refresh, what happens to all of the obsolete IT hardware? And has the organization considered the risks associated with the various options for ITAD? In this guide, get a clearer understanding of ITAD and the need for a compliant ITAD program.

  • Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS

    Sponsored by: ComputerWeekly.com

    In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.

  • How to Level Up Your Vendor Management

    Sponsored by: Aptible

    Every company needs vendors, yet vendors increase your vulnerability to security threats. Many of the largest data breaches in the past decade or so have happened because of vulnerabilities from 3rd party vendors. Therefore, you must establish robust processes on both sides of vendor management. View this guide to learn more.

  • Business Continuity Management: Planning, Disaster Recovery & Crisis Response

    Sponsored by: ServiceNow

    Business continuity management (BCM) tools are an effective way for organizations to ensure crisis preparation and disaster recover plans are in place prior to an unforeseen disruption. This solution brief highlights the key features and capabilities of ServiceNow’s BCM tool – read on for more information.

  • Attacking and Defending a Distributed Workforce

    Sponsored by: ServiceNow

    The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.

  • Beyond Digital Risk— Addressing Operational Risk

    Sponsored by: ServiceNow

    Operational risk management keeps companies ahead in their markets and fortifies their foundations, even on shifting ground. But due to its complexity, operational risk management often gets lost in the mix of other risk management strategies. Read this white paper to learn how you can connect risk across the enterprise.

  • Covid-19 Lessons Learned—Business Continuity Management

    Sponsored by: ServiceNow

    Regardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.

  • Case Study: Medical Devices & Securing the Healthcare Industry

    Sponsored by: Rezilion

    The healthcare industry has been a prime target of cyberattacks for several years, however COVID-19 brought most of these issues into the public eye. This case study highlights where the vulnerabilities lie and provides an overview of how Rezilion is working with healthcare device companies to prioritize and mitigate these risks.

  • Market Guide For Crisis/Emergency Management Solutions

    Sponsored by: ServiceNow

    The 2020 pandemic has led security and IT leaders to reevaluate their current crisis/emergency management (C/EM) programs and consider making alterations based on what they’ve learned from COVID-19. This Gartner Market Guide provides an overview of top C/EM tools, required capabilities and strategic recommendations – read on to get started.

  • Methodology of an IAM Introduction

    Sponsored by: Beta Systems

    IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.

  • Security analytics: Introduction, use cases, and quick-start guide

    Sponsored by: TechTarget

    As cyberattacks become increasingly complex and devious, winning the cybersecurity war is becoming harder and harder. To keep from becoming tomorrow's headline (and to prevent damage to your bottom line), you need a way to gain the upper hand – but how?

  • Global Threat Report

    Sponsored by: VMware International Unlimited Company

    94% of organizations worldwide have suffered a data breach as a result of a cyberattack in the past 12 months, and the average organization has experienced 2.17 breaches. If this statistic surprises you, then you may want to read the full global threat report by VMware and Carbon Black to get a sense of where threat actors are developing most.

  • The Future-Ready Soc Using Xdr To Achieve Unified Visibility And Control

    Sponsored by: VMware International Unlimited Company

    The technological and procedural silos that exist between IT and security operations center (SOC) team members have impeded an enterprise’s ability to effectively mitigate risk. Turn the tide – read this white paper to examine how extended detection & response (XDR) can help.

  • The Cost of Making the Front Page: What You Need to Know About the Growing Threat of Public Breaches

    Sponsored by: Dell SecureWorks

    A September 2018 attack on British Airways costing them close to $1B USD did not involve data encryption or ransom demands. Instead it saw cybercriminals using third-party code on the BA website to fraud 380,000 people out of their credit card numbers. These ‘public breaches’ are on the rise – read this white paper to learn more.

  • Remote Work Best Practices Emphasize UC Collaboration Tools

    Sponsored by: TATA Communications

    Most organizations take their business continuity plans for granted under normal conditions, but these plans aren’t truly tested until adversity strikes. Now, continuity must be ensured through maximization of remote resources, especially UC technology, to keep employees happy and mitigate risk. Read our expert guide to learn how to do this.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences