ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Threat management: Essential guide

    Sponsored by: TechTarget ComputerWeekly.com

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

  • Disaster recovery and business continuity: Essential guide

    Sponsored by: TechTarget ComputerWeekly.com

    Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.

  • Cyber Security 2016 and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems

    Sponsored by: Safestone Technologies

    This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.

  • Protecting Server Data in Small and Medium-sized Businesses

    Sponsored by: Iron Mountain

    Read this white paper to learn how to successfully protect server data outside a centralized data center and focus on specific needs and requirements for SMBs.

  • Presentation Transcript: Be Prepared! Leverage SAP PLM to Navigate Through Uncertain Times

    Sponsored by: SAP America, Inc.

    Read this presentation transcript to learn the business value of PLM in an uncertain economy as well as significant trends in the PLM market. Explore SAP's approach to a new generation of product lifecycle management solutions that will help you remain or become a product and services leader.

  • Practical Steps to Achieve and Maintain NERC Compliance

    Sponsored by: Tripwire, Inc.

    This paper describes seven practical steps information security professionals can take to integrate controls into IT production operations, to simultaneously achieve NERC compliance goals, and also IT operational and security goals.

  • Managing the Transition to International Financial Reporting Standards (IFRS)

    Sponsored by: Oracle Corporation

    The white paper discusses what US organizations can do to prepare for International Financial Reporting Standards (IFRS), and focuses on what Oracle's Enterprise Performance Management solutions can do to help with top-end reporting.

  • Buckle Up (On the Road to IFRS) Straight Talk Book Series

    Sponsored by: Deloitte

    The 11th book in our Straight Talk series helps executives understand the implications of IFRS and their role in addressing the associated changes. The publication also offers practical suggestions to help companies navigate through pressing issues and developing your own conversion road map.

  • Technology Implications of IFRS adoption for U.S. Companies: More than a technical accounting change

    Sponsored by: Deloitte

    In this publication, we explore the technology implications associated with IFRS conversion and discuss: Evaluating the potential technology impact; how companies can prepare technology and systems changes related to IFRS adoption; Major differences between U.S. Generally Accepted Accounting Principles (GAAP) and IFRS and much more.

  • The Business of Sustainability: Information Technology as a Catalyst for Short and Long-Term Profitability

    Sponsored by: SAP America, Inc.

    Read how SAP software can help your company manage risks and exploit operational and business opportunities regarding social, environmental, and economic sustainability.

  • Information Security Magazine, July 09: Controlling Privileged Accounts

    Sponsored by: Information Security Magazine

    This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.

  • HP ProCurve Lifecycle Solutions

    Sponsored by: Hewlett Packard Enterprise

    Check out this brief video to see how HP Network Solutions based on an industry standard ProCurve infrastructure can help assure return on IT investments by developing best-in-class solutions for your business.

  • The Financial Close: Optimizing Performance and Driving Financial Excellence

    Sponsored by: SAP America, Inc.

    The term "financial close" describes a corporation's ability to complete its accounting cycles and produce financial statements for internal management and external legal reporting. This paper identifies solutions to help organizations improve and sustain their close times and address the challenges associated with automating internal controls

  • eBook: Understanding GRC

    Sponsored by: TechTarget

    This in depth eBook explores all facets of GRC from the complexities of evaluating the right solution for your organization to implementing governance frameworks. Download this exclusive resource today and stay ahead of the GRC curve.

  • Governance, Risk, Compliance: Policy Management - Methods and tools

    Sponsored by: TechTarget Security

    This E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business.

  • Information Security Magazine: March 2009 - Sky-High Risk?

    Sponsored by: Information Security Magazine

    This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more.

  • BMC Database Administration Solution for DB2 z/OS

    Sponsored by: BMC Software, Inc.

    BMC provides a set of tools and utilities that are designed to automate the complex processes involved in updating and managing DB2 environments with the aim of being easy to use, and fast and effective in their execution.

  • eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems

    Sponsored by: TechTarget Security

    This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.

  • eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems

    Sponsored by: TechTarget Security

    This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.

  • eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems

    Sponsored by: TechTarget Security

    This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.

  • Symantec IT Compliance Solution

    Sponsored by: Symantec Corporation

    Symantec helps organizations reduce compliance costs by automating key IT compliance processes, including policy management, controls assessment, monitoring, remediation, and reporting. Check out this brochure to learn more.

  • Hard Hat Area: Myths and Pitfalls of Data Mining

    Sponsored by: SPSS Inc. Worldwide Headquarters

    The intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte." Myths and misconceptions create their own risks and need to be debunked. This article outlines some risks, debunks some myths, and provides some protective "hard hats" for data miners.

  • Critical Technologies for Compliance and Risk Management

    Sponsored by: Siperian, Inc.

    Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.

  • Protection on demand: information security that works for you - instead of putting you to work.

    Sponsored by: IBM

    Check out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.