ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Eliminating the Insider Threat: Mitigating Internal Risks Within Your Organization

    Sponsored by: FairWarning

    1 in 3 data breaches involve internal actors, according to the Verizon Data Breach Investigation Report 2019. There are many different insider threat profiles that have varying intentions. In this white paper, explore 5 of these profiles and learn how to protect your organization from each.

  • 3 Ethical and Legal Considerations for Patient Privacy and Data Security

    Sponsored by: FairWarning

    Download this white paper to find out how AI can transform healthcare's privacy and security space and empower better decision-making and patient trust.

  • The Challenges & Urgency of Managing Third-Party Risk

    Sponsored by: Unitrends

    Managing cyberthreats is becoming more challenging and urgent as businesses expand their ecosystems through their reliance on third parties. As a result, cyberthreats are top concerns for modern organizations worldwide. In this white paper, learn how organizations can better manage their third-party risk.

  • Acalvio Deception and the NIST Cybersecurity Framework 1.1

    Sponsored by: Acalvio

    The NIST Cybersecurity Framework 1.1 (CSF) is being widely adopted by organizations of all types as they seek to minimize risk. In this white paper, explore an overview of the CSF core controls and learn how Acalvio supports the NIST Cybersecurity Framework.

  • H2 2018 Cybercrime Report Webinar

    Sponsored by: LexisNexis Risk Solutions

    In this Cybercrime Report webinar, explore key findings and trends from the H2 2018 Cybercrime Report, including how a stunning number of transactions capture global bot attacks from new geographies and how there has been a significant increase in transactions originating from mobile devices.

  • Utility Regulations Demand Robust Third-Party Risk Management

    Sponsored by: BitSight

    In this white paper, learn how utilities organizations can comply with regulations and prevent cyberattacks, data breaches, and potential physical harm by using a robust third-party risk management program.

  • The Challenges & Urgency of Managing Third-Party Risk

    Sponsored by: BitSight

    Managing cyberthreats is becoming more challenging and urgent as businesses expand their ecosystems through their reliance on third parties. As a result, cyberthreats are top concerns for modern organizations worldwide. In this white paper, learn how organizations can better manage their third-party risk.

  • Doing Identity Access Right

    Sponsored by: HelpSystems

    In a world of corporate hacks and ransomware, keeping your data under digital lock and key is essential. But so is allowing your employees to use it to do their best work. In this white paper, explore common access risks and how Identity Governance and Administration (IGA) can help your organization combat these risks.

  • An Expanding Attack Surface: 5 Tips to Manage Third-Party Risk

    Sponsored by: BitSight

    In this e-book, learn 5 actionable steps to help you establish an effective third-party risk management program.

  • Intelligent Identity And Access Management

    Sponsored by: HelpSystems

    Providing Identity and Access Management (IAM) is a huge task; therefore, organizations are likely to face many challenges. Unfortunately, the environments that IAM systems support are often subject to attacks. In this white paper, learn how to leverage Intelligent IAM to help keep your organization's identity and accounts safe and secure.

  • 4 Steps to Help You Practice for the CISSP exam

    Sponsored by: TechTarget

    Are you ready for the CISSP exam? Your free CISSP prep guide awaits. Add your unique insights to our market research program to access your free PDF download and become one step closer to earning your certification!

  • Securing Transportation Infrastructure

    Sponsored by: Cyber-Ark Software

    Privileged accounts, and the access they provide, represent the largest security vulnerabilities for transportation organizations today. In this white paper, learn how transit or infrastructure organizations can secure their privileged accounts, credentials and secrets.

  • The Risk Initiative: Building a Business Case with Mitigation ROI

    Sponsored by: Cyber-Ark Software

    CyberArk launched a multi-part research project "The Risk Initiative: Building a Business Case with Mitigation ROI" which is designed to investigate how cybersecurity professionals can mature their programs to move towards ROI-centric decision-making. Download this research report to explore key findings.

  • How to Design and Implement a GRC Framework for Enterprise Data Analytics

    Sponsored by: Immuta, Inc

    In this e-book, discover the organizational factors which must be considered in designing and implementing data policies and access control for analytic initiatives within an enterprise.

  • Data Protection by Design

    Sponsored by: Immuta, Inc

    Data Protection by Design (DPbD) is the core data protection requirement introduced by the GDPR. And yet despite DPbD's centrality to the GDPR, it receives scant attention. Why? It's quite difficult to implement because it consists of many different requirements. In this white paper, explore what the DPbD is and why it's central to the GDPR.

  • H2 2018 Cybercrime Report

    Sponsored by: LexisNexis Risk Solutions

    Predicting the future patterns of cybercrime is challenging. However, as 2019 progresses, it is likely that trends seen in the latter half of 2018 will continue to evolve. In this H2 2018 Cybercrime Report, explore key findings from actual cybercrime attacks detected by the ThreatMetrix Digital Identity Network.

  • Why Biometric Verification is Key to Proving Digital Identity

    Sponsored by: Onfido

    Businesses in every industry are moving to digital models. But as this opens up exciting possibilities, it creates a not-so-hidden risk: Identity fraud. In this white paper, learn how biometrics can help solve a complex part of identity verification.

  • Risk Assessment with Secure Content Management

    Sponsored by: Micro Focus

    Tune into this webinar to learn how Micro Focus's Secure Content Management suite and its components help mitigate risk through the data assessment process.

  • 4 Cybersecurity Essentials that Your Board of Directors Wants to Know

    Sponsored by: Cymulate

    In this white paper, discover the 4 insights Cymulate provides based on quantifiable metrics to help you explain your current cybersecurity posture, defensibility, priorities, and ROI in ways that are most meaningful to your executive audience.

  • Ensure Privacy Protection Through Your Digital Transformation

    Sponsored by: Micro Focus

    Today, the race to digital transformation is a vital one. However, as enterprises begin their digital transformation journey, they have to make privacy protection a top priority. In this webcast, Becky Arenson and Carole Murphy discuss how to minimize the risk of digital transformations with a unified technology framework.

  • 3 Steps to Securing Enterprise Data on Cloud Platforms

    Sponsored by: ReliaQuest

    Enterprises have leveraged cloud platforms to facilitate web applications for years. However, many organizations that move to cloud platforms mistakenly assume that the cloud provider delivers sufficient visibility and monitoring. In this white paper, explore 3 steps that can help you properly secure your enterprise data on cloud platforms.

  • How Targeted Cyberattack Simulations Differ from Penetration Tests & Vulnerability Scanning

    Sponsored by: Cymulate

    Organizations of all shapes and sizes are fighting a war against threat actors. Currently, organizations use vulnerability scans and penetration tests to verify that their data is protected. However, a targeted attack simulation may be a better test for your organization. Download this white paper to learn more about targeted attack simulations.

  • Securing the Grid Why Privileged Access Security is Key to Protecting Critical Energy & Utilities Infrastructure

    Sponsored by: Cyber-Ark Software

    One of the largest security vulnerabilities faced by companies in the energy and utilities sector is privileged accounts, and the access they provide. In this white paper, learn how energy and utilities organizations can proactively reduce the risk posed by privileged access.

  • 3 Tenets of Security Protection for State and Local Government and Education (SLED)

    Sponsored by: Dell EMC

    Security is the utmost priority for IT decision-makers in government and education. Government agencies, schools and citizens are frequent, highly visible targets for cybercriminals, and their systems contain personal data. In this resource, explore important factors to consider when incorporating security into IT modernization initiatives.

  • Market Guide for Security Orchestration, Automation and Response Solutions

    Sponsored by: Swimlane

    In this Gartner research report, learn about security orchestration, automation and response solutions to help improve security operations centers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.