ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Unified Data Protection for Hybrid IT: Part 1

    Sponsored by: Forcepoint

    Enterprises are facing new challenges when it comes to protecting regulated data and critical IP. In this webinar, explore how companies should rethink data security by focusing on the 3 main principles including analytics-driven visibility, risk-adaptive controls and intelligence & dynamic automation.

  • Modernizing Data Protection

    Sponsored by: Forcepoint

    Navigating your data protection journey can be complex. It requires you to keep up with the latest regulations and protect intellectual property – all while adapting to evolving IT environments. In this webcast, Angelica Torres-Corral discusses how to gain visibility and control of your data, optimize a DLP solution, and more.

  • A Risk-Adaptive Approach to Dynamic Data Protection

    Sponsored by: Forcepoint

    By using Dynamic Data Protection, organizations can automate policy enforcement to dynamically respond to changes in risk within an organization. Read on to learn more about the end-to-end, human-centric security architecture.

  • Evaluation Criteria for Choosing an ICS Cybersecurity Monitoring System

    Sponsored by: Claroty

    A rapidly changing threat landscape, combined with convergence between traditional IT and industrial control networks is having a dramatic impact on the risk to industrial control systems. In this white paper, explore key criteria leading organizations are using to evaluate and select an appropriate monitoring system for industrial networks.

  • Enabling Effective Data Protection

    Sponsored by: InteliSecure

    Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.

  • Threat Intelligence: Far-Fetched Idea or Must-Have Security Tactic? How Every Ciso Can Make It a Priority

    Sponsored by: Mimecast

    If threat intelligence isn't part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. In this white paper, learn how CISOs can make threat intelligence a priority in their cyber resilience planning.

  • The Global Risks Report 2019 14th Edition

    Sponsored by: Nozomi Networks

    Technology continues to play a profound role in shaping the global risks landscape. A top technological concern is cyberattacks which pose risks to critical infrastructure. In The Global Risk Report 2019, learn why the vulnerability of critical technological infrastructure is a growing national security concern.

  • Case Study: Electronic Manufacturing

    Sponsored by: enSilo

    A manufacturing enterprise's pre-existing AV was getting bypassed by malicious activity. As a result, the enterprise was seeking an endpoint security solution to protect their data from external cyberattacks. In this case study, learn how the manufacturing enterprise was able to provide the necessary protection when deploying enSilo.

  • On the Radar: IBM Resilient Applies Incident Response Orchestration to GDPR Data Breaches

    Sponsored by: IBM

    Download Ovum's On the Radar Report to learn how the IBM Resilient SOAR Platform simplifies breach notification by using built-in guidance and templates to track breach management and reporting tasks, privacy-focused assessment to help determine who to notify, and regularly updated breach notification requirements.

  • 2019 State of OT/ICS Cybersecurity Survey

    Sponsored by: Nozomi Networks

    In this 2019 SANS OT/ICS cybersecurity survey, explore the challenges with design, operation and risk management of an industrial control system (ICS), its cyber assets and communication protocols, and supporting operations.

  • IT Security is Broken

    Sponsored by: VMware

    Only 25% of EMEA business leaders are confident in their cybersecurity. In this infographic, learn how you can fix IT security by building intrinsic security into everything, encouraging a collaborative culture of cybersecurity awareness, and more.

  • Securing Transportation Infrastructure

    Sponsored by: Cyber-Ark Software

    Privileged accounts, and the access they provide, represent the largest security vulnerabilities for transportation organizations today. In this white paper, learn how transit or infrastructure organizations can secure their privileged accounts, credentials and secrets.

  • The Human Factor 2019 Report

    Sponsored by: Proofpoint

    Malware-free attacks like business email compromise (BEC) and credential phishing continue to rapidly gain momentum as threat actors consistently attack individuals and business processes rather than specific systems and software. In The Human Factor 2019 Report, examine 4 key components of the attacks businesses and individuals face every day.

  • TPCRM 101: A Guide for Beginners

    Sponsored by: CyberGRX

    As organizations increasingly rely on third parties, their ecosystems become more vulnerable to third-party cyber risk. Implementing an effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem. In this white paper, learn everything you need to know about a TPCRM program.

  • Rethinking Third-party Cyber Risk Management

    Sponsored by: CyberGRX

    In this white paper, ensure that your current third-party cyber risk management practices will translate into lower third-party cyber risk.

  • 15 Ways to Weed the Regulatory Violations Out of Your Spend

    Sponsored by: AppZen

    How can your organization secure a seamless spend audit? View this checklist to uncover 15 ways to weed regulatory violations out of all spend prior to disbursement, and get the tools you need to secure a seamless spend audit.

  • Hype Cycle for Privacy, 2019

    Sponsored by: TITUS

    Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.

  • The Titus Times: The CEO & CTO

    Sponsored by: TITUS

    In this e-magazine, learn about the roles of the CEO and the CTO and delve into how their concerns around data protection overlap – as well as where they diverge. Also, learn how to overcome discrepancies to build a strong data protection strategy.

  • State of the Web Report 2019

    Sponsored by: Tala Security

    The website is a primary connection point between companies and their customers. Unfortunately, their architecture introduces critical vulnerabilities that enable client-side website attacks. In this research report, discover the risks associated with web and web app security and learn how to better protect your organization against attacks.

  • Considerations for CuttingEdge Threat Intelligence & Incident Response

    Sponsored by: Farsight Security

    The use of a cyberthreat intelligence team can greatly help organizations. Learn the best practices for team location and selection from expert Robert M. Lee.

  • CyberArk Privilege Cloud Reduces Risk with PAM SaaS

    Sponsored by: CyberArk Software, Inc

    Creating and executing a successful privileged access security program can seem like a daunting task. Privileged access is pervasive throughout the enterprise and can be difficult to manage without the right tools. In this blog, learn how CyberArk Privilege Cloud can help organizations start their privileged access management journey.

  • Security Readout: 2019 Trends for Remote and Roaming User Security

    Sponsored by: Cisco Umbrella

    It's no secret that the way people work has changed dramatically over the past few years. In this white paper, explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today's increasingly distributed enterprise.

  • Computer Weekly - 10-16 September 2019: A tech boost for social care

    Sponsored by: ComputerWeekly.com

    In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.

  • Reduce Phishing Risk in Minutes with Umbrella and Duo

    Sponsored by: Cisco Umbrella

    Cloud applications provide scale and cost benefits over legacy on-premises solutions. But with more users going direct-to-internet, the risk increases when users bypass security controls. In this webcast, learn how Umbrella and Duo can help you reduce this risk across all of your cloud and on-premises apps with a zero-trust strategy.

  • Trend Report: Employees Like to Use Unsanctioned Apps — and Don't Plan to Stop

    Sponsored by: Cisco Umbrella

    Employees are downloading apps to do their work faster, but this is causing risk to the business. IT can't secure what it can't see, which means threats can creep in. In this white paper, learn how Cisco Umbrella can help you discover which SaaS apps are being used, who's using them, and what risks they pose to your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.