ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • Transforming risk Why digital transformation depends on integrated risk management

    Sponsored by: ServiceNow

    Embarking on a digital transformation without considering risk management is like doing a massive home remodel on top of a crumbling foundation – which is why IT and non-IT leaders are embracing integrated risk management (IRM) as part of their transformation. Read this e-book to learn more about IRM and it’s role in digital transformation.

  • Risk management is the beating heart of your cyber strategy

    Sponsored by: ComputerWeekly.com

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

  • Step-by-step disaster recovery planning guide

    Sponsored by: ComputerWeekly.com

    IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.

  • The 10 Biggest and Boldest Insider Threat Incidents

    Sponsored by: Proofpoint

    With more than 90% of successful cyberattacks requiring some level of human interaction, it’s never been more important to consider the potential of the insider threat. Explore this e-book to learn the 10 biggest and boldest insider threat incidents that have occurred in the last few years and discover how you can counter the next big one.

  • CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa

    Sponsored by: ComputerWeekly.com

    Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?

  • Toughening up web and mobile application security

    Sponsored by: ComputerWeekly.com

    In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.

  • MITRE ATT&CK, a guide for businesses in 2022

    Sponsored by: ComputerWeekly.com

    Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.

  • Infographic: Top 12 risk management skills

    Sponsored by: ComputerWeekly.com

    Risk management is a must for anyone who aspires to be a leader or manager. There is risk to be addressed at all business levels, and if a leader is unable to manage risk, their upward mobility will disappear. Here are some skills needed to be a successful risk manager.

  • Infographic: 5 questions to ask when creating a ransomware recovery plan

    Sponsored by: ComputerWeekly.com

    Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.

  • ESG The Pressing Need for Comprehensive Cyber Risk Management

    Sponsored by: ServiceNow

    There is a growing requirement to be able to assess and mitigate cybersecurity risks associated with IT environments. To get more insight into this trend, ESG surveyed IT and cybersecurity professionals involved in planning, implementing, and enforcing IT risk management. Download this research report to explore key findings.

  • How to Shrink Supply Chain Risk

    Sponsored by: TechTarget

    The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.

  • Risk-Based Authentication A Critical Element To Any Zero-Trust Deployment

    Sponsored by: WatchGuard Technologies, Inc.

    MSPs looking to enhance multi-cloud security would do well to consider risk-based authentication, which can help you fuse flexibility and higher protection into one coherent, customized setup. Download this e-book to discover how risk policies and multi-factor authentication can be applied in a manner that promotes secure, flexible architectures.

  • A Computer Weekly buyer's guide to managing paper processes

    Sponsored by: ComputerWeekly.com

    Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.

  • The CISO's guide to supply chain security

    Sponsored by: ComputerWeekly.com

    Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

  • RISK-BASED AUTHENTICATION: A Critical Element to Any Zero-Trust Deployment

    Sponsored by: Panda Security

    Access this e-book to read about the powerful connection between zero-trust adoption and risk policies, and how multi-factor authentication sits at the core of these approaches by bringing the technology to protect user identities and Cloud applications.

  • Analyst1 for the Healthcare Industry

    Sponsored by: Analyst1

    The healthcare industry is uniquely vulnerable to cyberattacks and investing in the right tools is important. Analyst1 is a powerful solution for training threat teams on the critical skills needed to identify malicious activity. Access this white paper to learn more about the benefits and capabilities of Analysist1.

  • CW Innovation Awards: SIA taps blockchain for loyalty app

    Sponsored by: ComputerWeekly.com

    In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.

  • How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction

    Sponsored by: AT&T Cybersecurity

    Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.

  • How To Continuously Improve Risk Management Within Leading Cybersecurity Programs

    Sponsored by: AT&T Cybersecurity

    In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.

  • Integrated Cybersecurity Delivers Efficiency and Effectiveness in a Challenging Environment

    Sponsored by: Kaspersky

    According to IDC research, the majority (75%) of organizations worldwide recognize that security team's time is wasted due to a lack of integration in their security environments. These teams would be wise to consider a multi-level, integrated approach with endpoint protection in mind. See this IDC white paper to examine such an approach.

  • Best Practice ITAM Governance

    Sponsored by: Livingstone Group

    IT asset management (ITAM) governance helps protect organizations against a variety of corporate risks and allows them to switch from being reactive to proactive in their risk mitigation. Open up this white paper to read up on everything ITAM governance, including the risks of poor ITAM governance, IT governance best practices and more.

  • Software & Cloud Lifecycle Management Transformation

    Sponsored by: Livingstone Group

    What does a software and cloud lifecycle management transition look like? Dive inside this quick blueprint to step through a software and cloud lifecycle management workshop of your own, revealing the lifecycle challenges your own organization might be grappling with — sometimes without even knowing — and pointing towards the answers of best fit.

  • The Total Economic Impact™ Of ServiceNow Risk And Compliance

    Sponsored by: ServiceNow

    Download this Forrester Total Economic Impact Report for exclusive insight into the efficiencies and advancements in governance, risk and compliance (GRC), vendor risk management (VRM) and business continuity management (BCM) with ServiceNow Risk and Compliance – as well as an analysis of costs.

  • CISSP Exam Guide: Chapter 1: Security and Risk Management

    Sponsored by: McGraw Hill

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

  • The Total Economic Impact™ Of ServiceNow Security Operations

    Sponsored by: ServiceNow

    With the growing complexity and volume of cyberattacks, organizations will become more vulnerable to security threats. You need security orchestration tools that can connect security and IT teams for faster and more efficient response to security incidents. Access this Forrester report to get the facts on ServiceNow’s Security Operations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.