ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Revitalizing Privacy and Trust in a Data-Driven World

    Sponsored by: Micro Focus & PwC

    Many organizations worldwide are not doing all they can to protect privacy. Privacy risk management needs reinvigoration and stronger integration with cybersecurity.This report draws on key findings from the 2018 Global State of Information Security Survey to offer 9 tips on revitalizing privacy and trust in a data-driven world.

  • The Beginners' Guide to Hacker-Powered Security

    Sponsored by: HackerOne

    Leveraging the wisdom and power of the vast white-hat hacker community is a new security expectation. In this white paper, learn the best practices for starting and running effective disclosure and bug bounty programs, and how to integrate hacker-powered security into your organization.

  • Simplifying GDPR Compliance

    Sponsored by: Micro Focus & PwC

    GDPR sets the foundation for how multinational organizations protect, and derive value from, sensitive customer information. In this white paper, learn about how Micro Focus delivers a set of solutions to help take action on customer data in accordance with GDPR, including the "right to be forgotten".

  • Privacy and Data Protection Webinar

    Sponsored by: Micro Focus & PwC

    There is a lot more data at risk today than there has been in the past. This explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it. In this webcast, learn about challenges in privacy and data protection and how to meet these challenges head on.

  • The Pen Test Dilemma

    Sponsored by: HackerOne

    Today typical pen test methodologies are falling behind the increasingly innovative methods used by criminals. Why? In this white paper, learn about 3 common issues with traditional pen tests and how your organization could benefit from conducting hacker-powered pen tests instead.

  • Bug Bounty Field Manual

    Sponsored by: HackerOne

    Bug bounty programs can be very helpful in finding bugs within your system. They allow your engineering team to secure your systems faster and cheaper than ever before. In this e-book, learn everything you need to know to plan, launch and operate a successful bug bounty program.

  • How To Choose A Reliable Modern Incident Management Solution

    Sponsored by: PagerDuty

    The ideal incident management solution decreases downtime; gives teams critical insight into their operational health, efficiency, and response patterns; helps deliver a reliable product; and improves the bottom line for your stakeholders. Download this eBook and uncover the key questions to ask when evaluating an incident management vendor.

  • Basics (and Beyond) of Patch Management

    Sponsored by: ConnectWise

    With new vulnerabilities being discovered almost daily, keeping systems up-to-date with patches is often a full-time job, especially in larger environments. In this eBook, learn about the 6 step patch management process for reconciling the deployment state of an operating system and third party software updates.

  • Reduce Third-Party Risk Management Costs with CyberGRX

    Sponsored by: CyberGRX

    Learn how your organization can utilize a program that streamlines and catalyzes the third-party risk process by sharing one dynamic assessment with many enterprises that can reduce both risk and cost.

  • Back to the Basics: What is Cyber Risk and How Can We Measure It?

    Sponsored by: CyberGRX

    Cyber-risk is a hot topic these days, but, it is often misunderstood or conflated with other cybersecurity and privacy concerns. This resource offers a definition of cyber-risk and outlines a model of measuring cyber-risk.

  • 6 Elements of Effective Compliance Training: What Moves the Needle

    Sponsored by: Skillsoft

    The task of understanding what makes a compliance training program effective may seem daunting. However, the foundation of any effective compliance training program begins with 6 essential elements. This white paper outlines these 6 components and explores how each one contributes to organizational strategy and efficacy.

  • 2019 Report: State of the Phish

    Sponsored by: Proofpoint

    Proofpoint complied and analyzed data from tens of millions of simulated phishing emails sent to end users. They also ran surveys with end-users and infosec professionals. Download the report to discover key findings form their research and recommendations to better protect your organizations from phishing attacks.

  • Ridding Toxins from Corporate Culture

    Sponsored by: Skillsoft

    Compliance training is a necessity to reduce the liability and legal risks businesses face. In this eBook, learn about Skillsoft's Compliance Maturity Model which helps organizations identify the right learning content and approaches that will focus on behavior and culture to reap the full business benefits of investments in compliance programs.

  • User Risk Report 2018

    Sponsored by: Proofpoint

    Users' personal cybersecurity habits are carrying over into work hours. And, often, infosecurity teams are overestimating end users' understanding of fundamental cybersecurity best practices. In this research report, explore key survey findings that address working adult's cybersecurity knowledge.

  • Security 101: Defending Against Fileless Malware

    Sponsored by: Trend Micro, Inc.

    Fileless malware aren't new, but they're an increasingly prevalent threat. They aren't as visible as traditional malware, employ a variety of techniques to stay persistent, and can adversely affect the integrity of the organization's business process. In this resource, take a closer look at how fileless threats work and how to prevent them.

  • Data Protection by the Numbers

    Sponsored by: Veeam Software

    It is critical for companies to gain an understanding of and a formulaic approach to quantifying technical recovery capabilities, business impacts, and financial concerns related to data protection. In this eBook, learn about the 3 different "languages" of data protection.

  • 2019 Report: State of the Phish

    Sponsored by: Proofpoint

    Proofpoint complied and analyzed data from tens of millions of simulated phishing emails sent to end users. They also ran surveys with end-users and infosec professionals. Download the report to discover key findings form their research and recommendations to better protect your organizations from phishing attacks.

  • Security Investigation, Detection & Rapid Response with Splunk Enterprise

    Sponsored by: Splunk Services UK Ltd

    Investigation and rapid response is critical for day-to-day alert handling. The faster a threat and its impact can be detected and investigated, the faster an organization can take action. In this white paper, learn about how the Splunk platform enables organizations to understand their potential security threats and take the necessary actions.

  • Operationalizing Threat Intelligence Using Splunk® Enterprise Security

    Sponsored by: Splunk Services UK Ltd

    Threat intelligence can provide critical security perspectives needed to inform an organization about current threats and to help develop a strategy against future threats. In this white paper, learn about the challenges and requirements of implementing high-coverage threat intelligence.

  • The Seven Essential Capabilities of an Analytics-Driven SIEM

    Sponsored by: Splunk Services UK Ltd

    There is no shortage of options for storing data. Collecting all security relevant data and turning all that data into actionable intelligence, however, is a whole other matter. An analytics-driven SIEM allows IT to monitor threats and respond quickly to incidents. In this white paper, discover 7 essential capabilities of an analytics-driven SIEM.

  • LogRhythm SOMM White Paper 2019

    Sponsored by: LogRhythm, Inc.

    The traditional approach to the cybersecurity challenge has been prevention-centric. While this approach is necessary, organizations are increasingly shifting their focus to strategies centered on rapid threat detection and response. In this white paper, learn how LogRhythm can help organizations assess and improve their security operations.

  • How to Detect the 7 Types of Document and Identity Fraud

    Sponsored by: Onfido

    Forgeries. Imposters. Counterfeit documents. You can't afford to let fake identities slip through the cracks and put your company—and your customers—at risk. Learn how to detect the 7 most common types of ID fraud, and how advanced identity verification technology can turn things around.

  • A Guide to Digital Identity Verification: The Technology and Trends

    Sponsored by: Onfido

    An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.

  • A Guide to Digital Identity Verification

    Sponsored by: Onfido

    An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.

  • How to Combat Fraud in 3 Easy Steps

    Sponsored by: Onfido

    Identity theft is the fastest growing crime in the US and accounts for half of all reported fraud in the UK, with 1 in 60 online transactions attempted globally being fraudulent. This white paper looks at 7 ways fraudsters are slipping through the net, what to watch out for and how to combat fraud in 3 simple steps.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.