Risk Management Research
-
Cloud Adoption and Risk Report
Sponsored by: McAfeeThe spread of COVID-19 has caused dramatic changes in how organizations approach protecting their remote employees while facilitating productive work environments – affecting cloud service usage across on a global scale. For key findings and statistics, read the McAfee Cloud Adoption and Risk Report.
-
Analyzing the Economic Benefits of Proofpoint Insider Threat Management
Sponsored by: ProofpointWith cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this ESG report to learn about Insider Threat Management from Proofpoint.
-
Cybersecurity Built for Your Business, Budget and Staff
Sponsored by: Panda SecurityIn the US, 42% of employees are working from home full-time. As a result, managing distributed workforces has become a priority for organizational leaders. Remote deployment and lack of centralization have both created security and compliance risks. To regain control, view this e-book about the top organizational challenges and their solutions.
-
IT-GRC Tools
Sponsored by: ServiceNowIT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.
-
ERM & GRC: Digital Tools for Oversight In The Enterprise
Sponsored by: ServiceNowIn this report, discover the results of Constellation Research’s initiative into determining the most effective digital tools for oversight in the enterprise and observe a shortlist of 12 unique enterprise risk management (ERM) and governance, risk and compliance (GRC) offerings you should be aware of.
-
IT Risk Management (ITRM): Vendor Comparison Matrix
Sponsored by: ServiceNowIT risk management (ITRM) has emerged as a key pillar in assessing risk, bolstering security and addressing compliance needs. Read this Gartner Magic Quadrant Report for an in-depth comparison of the capabilities of top ITRM vendors and offerings in today’s market.
-
Build Resilience for Your Business in the New/Next Normal into 2021 and Beyond
Sponsored by: ServiceNowIn this new normal, most companies don't have a complete picture of what's happening in various parts of their business. To stay ahead of risks and plan for recovery means having visibility and control, and the right software can help you achieve both. Watch this video to learn about Business Continuity Management from ServiceNow.
-
A Focused Approach to Managing Risk in Uncertain Times
Sponsored by: ServiceNowAs businesses emerge from the initial COVID-19 crisis, they are coming under immense pressure to adapt their risk and resilience programs to the evolving effects of COVID-19 and other potential disruption. In this white paper, uncover 4 steps businesses can take to help them become more resilient, control risks and maximize productivity.
-
Comparing Top IT Vendor Risk Management Tools
Sponsored by: ServiceNowIT vendor risk management (IT VRM) software provides solutions to manage and automate the vendor risk management life cycle, address third-party risk and meet regulatory compliance. This Gartner Magic Quadrant Report provides an overview of the IT VRM market and a comprehensive evaluation of the top offerings – read on to get started.
-
Best Practices for Special-Purpose System Security
Sponsored by: ColorTokensA special-purpose system is an endpoint with a specific function, such as an airport kiosk or an ATM. And while these endpoints facilitate convenience, they also present significant security challenges. Read this article to learn more about where the vulnerabilities lie and how to address them.
-
Airbus Cybersecurity Strengthens its Threat Intelligence with ThreatQuotient
Sponsored by: ThreatQuotientHow do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.
-
The Legal Cybersecurity Checklist
Sponsored by: Arctic Wolf Networks, Inc.Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.
-
The CIO’s Cybersecurity Checklist
Sponsored by: Arctic Wolf Networks, Inc.CIOs have never been under more duress than they are under now. An enlarged attack surface coupled with a growing threat landscape means that senior leaders have to dot their i’s and cross their t’s when it comes to network security. Want to stay ahead? View this CIO cybersecurity checklist to know where you are and where you need to be.
-
Charting a Course For Enterprise Risk Management
Sponsored by: riskconnectThis e-book will explain what ERM is, why it's worthwhile, and how to begin managing risks and opportunities holistically.
-
Measuring the ROI of an Incident Response Platform
Sponsored by: Palo Alto NetworksA Forrester survey found that 80% of businesses had been attacked last year, and only 50% felt they had the right resources to proactively hunt for threats. Organizations tend to place incident response on the backburner, but it’s clear they wish they’d been better prepared for ‘what ifs’. In this guide, learn how to stay ahead of threats.
-
Transforming Compliance
Sponsored by: riskconnectThis e-book will help you transform compliance from a check-the-box function to a well-oiled machine that seamlessly integrates people, processes, and technology with data-driven visibility to champion the organization's future.
-
Life After Lockdown: A Playbook for Crisis Recovery, Resiliency and Restarting Right
Sponsored by: riskconnectThis e-book presents a simple, organized way to recover stronger, build resilience, and restart right to withstand whatever comes next.
-
Risk Management Information Systems: The Buyer's Guide
Sponsored by: riskconnectThis e-book will help you decide if a RMIS is right for you – whether you are considering purchasing a RMIS for the first time, replacing a homegrown system, or upgrading an outdated one.
-
92% Of The World’s Top Websites Expose Customer Data To Attackers
Sponsored by: Tala SecurityIt’s no secret that security risk has never been higher, but what’s important is to know the specifics of these risks. Issues such as unintentional data exposure and data leakage via trusted applications are becoming more relevant, and it’s crucial that you know what they mean and how to prevent them. View this report to get the details.
-
Securing Branch Offices and Retail Stores in the Digital Age
Sponsored by: Palo Alto NetworksThe advancement of the branch office is matched only by the evolution of network threats. With networking solutions such as SD-WAN now on the market, organizations must rethink their branch office security. Read this white paper outline the challenges of branch security and view typical use cases.
-
SCCM Upgrade Checklist | Automate Patch Management in the Cloud
Sponsored by: AutomoxThe digital landscape is constantly evolving, and traditional legacy tools are being replaced by cloud-based SaaS alternatives – and patch management is no exception. However, there are some key factors to consider prior to making the switch. Read this article to make sure you’re ready for cloud-based patch management.
-
TCO Study of WSUs and SCCM
Sponsored by: AutomoxPatch management plays a critical role in ensuring systems are operating properly and protected against attacks. However, like most technology functions, modern enhancements allow organizations to transition from on-premise systems to cloud-based SaaS offerings – but does the SaaS switch make fiscal sense? Read on to find out.
-
Cybereason Mobile
Sponsored by: CybereasonMobile devices are now more popular for enterprise use and workplace productivity than desktops or laptops. With millions of malware threats for a growing variety of devices and OS’s alongside cloud and mobile-first apps, the risks are complex and expanding. Don’t get left behind, view this data sheet to learn how to keep mobile devices secure.
-
Threat Report: Maze Ransomware
Sponsored by: CysivSince 2019, the Maze threat actor group has been conducting ransomware campaigns where they both block access to data on victims’ machines and threaten to publish sensitive data for ransom – known as Maze ransomware. In this report, discover a comprehensive analysis of Maze ransomware, how it works and how to prevent it.
-
A Computer Weekly buyer's guide to compliance, risk and governance
Sponsored by: ComputerWeekly.comManaging data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach