ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • Risk-Based Authentication A Critical Element To Any Zero-Trust Deployment

    Sponsored by: WatchGuard Technologies, Inc.

    MSPs looking to enhance multi-cloud security would do well to consider risk-based authentication, which can help you fuse flexibility and higher protection into one coherent, customized setup. Download this e-book to discover how risk policies and multi-factor authentication can be applied in a manner that promotes secure, flexible architectures.

  • A Computer Weekly buyer's guide to managing paper processes

    Sponsored by: ComputerWeekly.com

    Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.

  • The CISO's guide to supply chain security

    Sponsored by: ComputerWeekly.com

    Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

  • RISK-BASED AUTHENTICATION: A Critical Element to Any Zero-Trust Deployment

    Sponsored by: Panda Security

    Access this e-book to read about the powerful connection between zero-trust adoption and risk policies, and how multi-factor authentication sits at the core of these approaches by bringing the technology to protect user identities and Cloud applications.

  • BitSight Security Ratings

    Sponsored by: BitSight

    BitSight Security Ratings are a measurement of an organization's security performance. Armed with daily ratings, organizations can proactively identify, quantify and manage cyber security risk throughout their ecosystem. Access this white paper to learn more about BitSight security ratings and how companies are benefiting from them.

  • Analyst1 for the Healthcare Industry

    Sponsored by: Analyst1

    The healthcare industry is uniquely vulnerable to cyberattacks and investing in the right tools is important. Analyst1 is a powerful solution for training threat teams on the critical skills needed to identify malicious activity. Access this white paper to learn more about the benefits and capabilities of Analysist1.

  • Risk In A Real-time World

    Sponsored by: Dataminr

    Dataminr commissioned Forrester Consulting to evaluate current risk management priorities and practices and how real-time information can be utilized for decision-making in risk management and crisis response. Download this research paper to learn more about Forrester’s findings and the power of real-time information.

  • How to Shrink Supply Chain Risk

    Sponsored by: TechTarget

    The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.

  • How to Shrink Supply Chain Risk

    Sponsored by: TechTarget

    The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.

  • COVID-19 Creates Perfect Storm for Insider Risk Growth, Organizations Unprepared to Protect Data

    Sponsored by: Code 42

    Download the Code42 2021 Data Exposure Report on Insider Risk (with Ponemon Institute survey data) to gain a better understanding of the many dimensions that impact organizations’ security posture around insider risk to data.

  • Insider Risk Management Is Critical To Protecting Valuable Company Data

    Sponsored by: Code 42

    Download this Forrester report to explore how companies are currently treating insider risk management and their changes in strategy for the future.

  • CW Innovation Awards: SIA taps blockchain for loyalty app

    Sponsored by: ComputerWeekly.com

    In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.

  • The Forrester Wave™: Third-Party Risk Management Platforms, Q4 2020

    Sponsored by: MetricStream

    As organizations continue to collaborate with third party vendors, they must realize their partial responsibility for any incidents or regulatory missteps that may occur. This is why third-party risk management (TPRM) vendors are innovating more than ever before. Download this Forrester Wave report to compare 11 of the top players in TPRM.

  • Risk Tech 100 2021

    Sponsored by: MetricStream

    As organizational risk increases, risk management professionals must get an objective assessment of technology vendors in their market in order to make the best decisions. Download the RiskTech100 for 2021, a globally acknowledged, comprehensive independent study of the world’s major players in risk and compliance technology.

  • Magic Quadrant For It Vendor Risk Management Tools

    Sponsored by: MetricStream

    IT vendor risk management software provides solutions to manage and automate the vendor risk management life cycle, address third-party risk and meet regulatory compliance. Tap into Gartner’s Magic Quadrant to get a better understanding of this growing and dynamic market.

  • How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction

    Sponsored by: AT&T Cybersecurity

    Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.

  • How To Continuously Improve Risk Management Within Leading Cybersecurity Programs

    Sponsored by: AT&T Cybersecurity

    In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.

  • Supplier Risk & Performance Management with KPMG and Coupa

    Sponsored by: Coupa and KPMG

    Implementing a proactive and predictive supplier risk and performance management (SRPM) program can help procurement organizations mitigate risk across third-party suppliers. Learn how you can institutionalize an SRPM program to be better prepared for the future.

  • The IAM Trends That Matter Most – 2021 edition

    Sponsored by: TechTarget

    In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.

  • The IAM Trends That Matter Most – 2021 edition

    Sponsored by: TechTarget

    In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.

  • Top Security and Risk Management Trends

    Sponsored by: Palo Alto Networks

    Acting on the relentless pace of digital business and ongoing transition to the cloud, security and risk management leaders can and must improve resilience, better support business objectives and elevate their organizational standing. View this Gartner resource detailing top security and risk management trends to give you the upper hand.

  • Using Tprm Best Practices To Improve M&A Outcomes

    Sponsored by: The Santa Fe Group

    In mergers and acquisitions (M&A), managing risk has become a focal point. M&A firms are realizing that due diligence is needed to avoid value losses post-acquisition, and moreover, regulators are cracking down on M&A risk like never before. Dive into this white paper to learn how third party risk management best practices can help.

  • A New Roadmap For Third Party IoT Risk Management

    Sponsored by: The Santa Fe Group

    The soaring number of IoT devices that can provide access to sensitive organizational data will make IoT risk management a convoluted undertaking. Professionals familiar with IoT are optimistic of its benefits but skeptical on security. Leverage this Ponemon report to get a grasp of organizational readiness for thir party IoT and its risks.

  • C-Suite Call To Action Risk Management Through A Different Lens

    Sponsored by: The Santa Fe Group

    When it comes to third parties, risk professionals, the C-suite and the board need to collectively determine how to shift their stance from reactive to proactive to handle uncharted circumstances. View this briefing paper to understand the malleable third-party risk landscape and how enterprises can become dynamically prepared.

  • Shared Assessments Building Best Practices

    Sponsored by: The Santa Fe Group

    Enterprise risk management (ERM) structures have grown in number and maturity, but many of them do not account for emerging technologies such as AI, 5G and IoT. At this juncture, it’s important that board and C-suite members assume responsibility for these shifts. View this SFG resource to learn ERM best practices for new technologies.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences