ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Risktech 100 2021

    Sponsored by: MetricStream

    Changes in the risk and compliance landscape were accelerated last year, likely due to the spread of COVID-19 – So what will the technology trends, security threat types and emerging offerings in this landscape look like in 2021? Read this exclusive RiskTech 100 research report to find out.

  • Global CISO Playbook for the New Normal

    Sponsored by: Fidelis

    It’s arguable that CISOs have the toughest job in the world right now. Growing cyber terrains, evolving threat landscapes and skill shortages are all placing more pressure on these professionals than ever before. Download this e-book to hear from the CISO of Fidelis Cybersecurity as he outlines strategies and best practices for cyber defense.

  • How to Manage Risk and Compliance for Financial Services

    Sponsored by: BigID

    While meeting compliance standards is a requirement for financial services institutions, the sad reality is that many companies don’t have as much of a handle on their data as they might think. Download this white paper to learn how BigID can help financial organizations organize, secure, and regulate their data across multi-cloud ecosystems.

  • Dealing with VUCA

    Sponsored by: InteliSecure

    Today’s IT and security leaders are responsible for dealing with VUCA – volatility, uncertainty, complexity, and ambiguity – and address data security risks in an ever-changing landscape. Read this InteliSecure e-guide to address the elements of VUCA and build agile data protection.

  • Improve Security And Compliance

    Sponsored by: Red Hat and Intel

    Speed and response time are essential in reducing the impact of data breaches – in fact, containing a breach within 200 days or less reduced the overall cost of a breach by more than 50% in 2020. Read this e-book to learn more about how to improve security, reduce risk and ensure compliance.

  • Evaluating Data-Centric Protection Solutions

    Sponsored by: Comforte AG

    Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.

  • Creating a Culture of Security

    Sponsored by: HelpSystems

    You can invest in all the security tools you want, you can provision every security tool correctly and you can eliminate as much risk as possible – but if your organization is not creating a culture of security, you’re nowhere. Enter this white paper and extract 4 steps to cultivating security awareness among your network’s users.

  • NWN SecureX Online Workshop

    Sponsored by: NWN Corporation

    Today’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.

  • Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS

    Sponsored by: ComputerWeekly.com

    In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.

  • Business Continuity Management: Planning, Disaster Recovery & Crisis Response

    Sponsored by: ServiceNow

    Business continuity management (BCM) tools are an effective way for organizations to ensure crisis preparation and disaster recover plans are in place prior to an unforeseen disruption. This solution brief highlights the key features and capabilities of ServiceNow’s BCM tool – read on for more information.

  • Attacking and Defending a Distributed Workforce

    Sponsored by: ServiceNow

    The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.

  • Beyond Digital Risk— Addressing Operational Risk

    Sponsored by: ServiceNow

    Operational risk management keeps companies ahead in their markets and fortifies their foundations, even on shifting ground. But due to its complexity, operational risk management often gets lost in the mix of other risk management strategies. Read this white paper to learn how you can connect risk across the enterprise.

  • Covid-19 Lessons Learned—Business Continuity Management

    Sponsored by: ServiceNow

    Regardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.

  • Market Guide For Crisis/Emergency Management Solutions

    Sponsored by: ServiceNow

    The 2020 pandemic has led security and IT leaders to reevaluate their current crisis/emergency management (C/EM) programs and consider making alterations based on what they’ve learned from COVID-19. This Gartner Market Guide provides an overview of top C/EM tools, required capabilities and strategic recommendations – read on to get started.

  • Methodology of an IAM Introduction

    Sponsored by: Beta Systems

    IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.

  • Security analytics: Introduction, use cases, and quick-start guide

    Sponsored by: TechTarget

    As cyberattacks become increasingly complex and devious, winning the cybersecurity war is becoming harder and harder. To keep from becoming tomorrow's headline (and to prevent damage to your bottom line), you need a way to gain the upper hand – but how?

  • The Cost of Making the Front Page: What You Need to Know About the Growing Threat of Public Breaches

    Sponsored by: Dell SecureWorks

    A September 2018 attack on British Airways costing them close to $1B USD did not involve data encryption or ransom demands. Instead it saw cybercriminals using third-party code on the BA website to fraud 380,000 people out of their credit card numbers. These ‘public breaches’ are on the rise – read this white paper to learn more.

  • Cybersecurity Built for Your Business, Budget and Staff

    Sponsored by: Panda Security

    In the US, 42% of employees are working from home full-time. As a result, managing distributed workforces has become a priority for organizational leaders. Remote deployment and lack of centralization have both created security and compliance risks. To regain control, view this e-book about the top organizational challenges and their solutions.

  • KuppingerCole Market Compass IT-GRC Tools

    Sponsored by: ServiceNow

    IT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.

  • ERM & GRC: Digital Tools for Oversight In The Enterprise

    Sponsored by: ServiceNow

    In this report, discover the results of Constellation Research’s initiative into determining the most effective digital tools for oversight in the enterprise and observe a shortlist of 12 unique enterprise risk management (ERM) and governance, risk and compliance (GRC) offerings you should be aware of.

  • Gartner Magic Quadrant for IT Risk Management

    Sponsored by: ServiceNow

    IT risk management (ITRM) has emerged as a key pillar in assessing risk, bolstering security and addressing compliance needs. Read this Gartner Magic Quadrant Report for an in-depth comparison of the capabilities of top ITRM vendors and offerings in today’s market.

  • A Focused Approach to Managing Risk in Uncertain Times

    Sponsored by: ServiceNow

    As businesses emerge from the initial COVID-19 crisis, they are coming under immense pressure to adapt their risk and resilience programs to the evolving effects of COVID-19 and other potential disruption. In this white paper, uncover 4 steps businesses can take to help them become more resilient, control risks and maximize productivity.

  • Gartner Magic Quadrant for IT Vendor Risk Management Tools (ITVRM)

    Sponsored by: ServiceNow

    IT vendor risk management (IT VRM) software provides solutions to manage and automate the vendor risk management life cycle, address third-party risk and meet regulatory compliance. This Gartner Magic Quadrant Report provides an overview of the IT VRM market and a comprehensive evaluation of the top offerings – read on to get started.

  • Best Practices for Special-Purpose System Security

    Sponsored by: ColorTokens

    A special-purpose system is an endpoint with a specific function, such as an airport kiosk or an ATM. And while these endpoints facilitate convenience, they also present significant security challenges. Read this article to learn more about where the vulnerabilities lie and how to address them.

  • Remote Work Best Practices Emphasize UC Collaboration Tools

    Sponsored by: TATA Communications

    Most organizations take their business continuity plans for granted under normal conditions, but these plans aren’t truly tested until adversity strikes. Now, continuity must be ensured through maximization of remote resources, especially UC technology, to keep employees happy and mitigate risk. Read our expert guide to learn how to do this.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences