Research Library

Powered by

Risk Management Research

  • 2019: No Oscars for Bad Threat Actors

    Sponsored by: DomainTools

    There has been a massive increase in the number and types of cybersecurity threats over the years. In this webcast, experts from DomainTools discuss some cyber forecasts and predictions for the coming years including IoT devices, automation, breaches and more.

  • The Beginner's Guide to Mitigating Phishing Attacks

    Sponsored by: DomainTools

    Phishings attacks are a common form of fraud that is most commonly done by disguising malicious links to distribute malware. In this webcast, Corin Imani, Senior Security Advisor at DomianTools discusses real world examples, the steps to executing a phishing attack and ways to remediate a phishing attack.

  • Reduce Risks and Increase Donor Trust with Better Nonprofit Compliance

    Sponsored by: Cornerstone OnDemand

    Meeting business, HR, and data regulations is a fact of life for every organization, yet not every organization has the same resources to invest in or manage compliance efficiently. Download this white paper to learn why ensuring compliance is not only crucial to a nonprofits ability to fulfill its mission, but necessary in sustaining it.

  • Closing the IT Security Gap with Automation & AI in the Era of IoT: EMEA

    Sponsored by: Aruba Networks

    The purpose of this research by Ponemon Institute is to understand the gaps in IT security programs and strategies that diminish companies' ability to identify, detect, contain and resolve data breaches and other security incidents. In this report, Ponemon Institute presents the findings from a survey completed by IT and IT security practitioners.

  • Security Orchestration, Automation and Response (SOAR) Buyer's Guide

    Sponsored by: Swimlane

    In today's complex computing environments, it can be hard to determine what actual security coverage is in place. Finding skilled security analysts is an increasingly difficult task. Each year as threats grow, CISOs must do more with less. A SOAR solution can help simplify, automate and document the incident response process.

  • Bay Federal Credit Union: How SOC-as-a-Service Has Helped Add Business Value

    Sponsored by: Arctic Wolf

    In this case study, Bay Federal Credit Union switched from using a managed security service provider (MSSP) to a SOC-as-a-Service. When looking for someone to monitor their systems, they looked at various MDR alternatives before deciding to use AWN CyberSOC Services. The credit union saw exceptional results in a short amount of time.

  • CEO Insights - Cybersecurity Predictions for 2019

    Sponsored by: Arctic Wolf

    Cybercriminals have hacked into many name brand companies like Adidas, Twitter and Ticketmaster. The pace is not expected to slow down. In this webcast, Brian NeSmith walks through cybersecurity predictions and what organizations can do to best prepare for them.

  • IAM: Key to security and business success in the digital era

    Sponsored by:

    As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.

  • 9 Misconceptions About Third-Party Risk Management

    Sponsored by: BitSight

    Download this resource for 9 dangerous misconceptions about third-party risk management that you need to know.

  • Protecting Against Third-Party Breaches Requires Continuous Monitoring

    Sponsored by: BitSight

    With growing numbers of data breaches being traced to third parties with lax security processes, organizations are implementing "always-on" vendor risk management programs. Read on for insights on continuous monitoring and third-party risks.

  • Security Maturity: Mapping the Road to Resilience

    Sponsored by: Dell SecureWorks

    Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.

  • Using Dynamic Data and Advanced Analytics to Secure Your Ecosystem

    Sponsored by: CyberGRX

    Download this webinar to learn about the insights and capabilities that can help you identify which third parties pose the greatest risk to your business.

  • How to Reach Cybersecurity Maturity in 5 Critical Steps

    Sponsored by: Dell SecureWorks

    Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.

  • Secureworks Security Maturity Model

    Sponsored by: Dell SecureWorks

    Learn how you can evaluate your organization's cybersecurity maturity based on its business operations and risk profile.

  • 2018 User Risk Report

    Sponsored by: Proofpoint

    More than 6,000 working adults across the world were surveyed about their personal security habits. To find out what these employees really know about cybersecurity, download this report for some shocking results. Could some of these folks be working at your organization?

  • 8 Simple Steps for Automating Governance, Risk and Compliance (GRC)

    Sponsored by: ServiceNow

    Discover 8 simple steps to slash audit costs, improve efficiency, and minimize risk within your organization by automating your GRC.

  • Reporting to the Board - A Toolkit for CISOs

    Sponsored by: Dell SecureWorks

    Boards oversee risk, not operations. Rather than tell them how your cybersecurity program works, show them how and how well risks are being managed. Download this CISO toolkit for tips and techniques to approach your board of directors about cybersecurity.

  • A Risk-Adaptive Approach

    Sponsored by: Forcepoint

    Download this report to learn how applying a Continuous Adaptive Risk and Trust Assessment approach to your organization will allow you to meet the latest evolving adaptive security challenges.

  • Keeping Your Application Fleet Flying Risk Free

    Sponsored by: Flexera Software

    Just like sending an airplane out for take-off without any preemptive maintenance checks, deploying applications without vulnerability scans poses a major risk for your organization. Download this whitepaper to learn how your organization can mitigate application risks and stay secure.

  • Analytics: The Key to Identifying and Mitigating Third-Party Risk

    Sponsored by: CyberGRX

    Discover how ecosystem analytics allows companies to understand sources and levels of potential risk along from third parties with contextual information and comparative screening.

  • Solving the Cybersecurity Skills Shortage

    Sponsored by: Arctic Wolf

    22% of respondents suffered a security breach at their law firms, according to a survey conducted by the American Bar Association. Download this webcast to explore the challenges of finding cybersecurity personnel and what you can do to find qualified personnel that will help you protect your data.

  • Computer Weekly – 14 August 2018: Infrastructure under attack

    Sponsored by:

    In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

  • Managing User Risk: A Review of LogRhythm Cloud AI for User and Entity Behavior Analytics

    Sponsored by: LogRhythm, Inc.

    SANS analyst and cybersecurity professional, Dave Shackleford, takes an in-depth look at user and entity behavior (UEBA) solutions that take advantage of machine learning intelligence capabilities.

  • Checklist for Managed Detection and Response

    Sponsored by: Arctic Wolf

    Are your certain your company hasn't been breached recently? Download this checklist to make sure you are properly assessing risk and monitoring and detecting threats.

  • Executing on NIST SP 800-190

    Sponsored by: Twistlock, Inc.

    When apps scale out, the old method of manually creating and maintaining security rules becomes impractical. Together The National Institutue of Standards and Technology (NIST) and Twistlock secure container environments at scale and enforce policies to secure container workloads across the environment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.