ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • COVID-19 in APAC:Tech industry lessons & innovations

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the impact of the COVID-19 outbreak on the APAC tech sector, what tech vendors in the region are doing to support organisations during this difficult period and how the pandemic could spur businesses to dial up their digitisation efforts.

  • Improving Compliance & Controls: Strategies to increase efficiency and reduce risk

    Sponsored by: BlackLine

    Download this guidebook to explore some of the challenges accounting professionals are facing amidst a changing regulatory, compliance, and audit landscape, and how they can effectively adapt to change with the right technology.

  • Guide to business continuity planning: COVID-19 and beyond

    Sponsored by: ComputerWeekly.com

    As COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.

  • InfoSec Risk Management in Healthcare Environments a Primer to Assessing Technical Risk

    Sponsored by: CI Security

    In some healthcare organizations, risk assessment and risk management as it relates to cybersecurity are a bit of a mystery. In this white paper, learn how to assess your IT security risks.

  • IT Priorities 2020: APAC

    Sponsored by: ComputerWeekly.com

    The Asia-Pacific (APAC) region remains a hotbed for digital transformation initiatives amid the economic uncertainty and ongoing coronavirus outbreak. In this guide to IT Priorities in 2020, find out what 593 APAC IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.

  • CW APAC - March 2020: Expert Advice: Security Operations Centre

    Sponsored by: ComputerWeekly.com

    In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.

  • 4 Ways SailPoint Predictive Identity Puts You in Control

    Sponsored by: SailPoint Technologies

    As digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.

  • For Dummies: Digital Transformation and Risk, ServiceNow Special Edition

    Sponsored by: ServiceNow

    In this For Dummies e-book, you’ll learn everything you need to know about digital risk management 101. Inside, find out how you can understand the different types of risks, establish policies, controls, and monitoring best practices, and apply 5 tips for secure digital transformation success.

  • The Pressing Need for Comprehensive Cyber Risk Management

    Sponsored by: ServiceNow

    There is a growing requirement to be able to assess and mitigate cybersecurity risks associated with IT environments. To get more insight into this trend, ESG surveyed IT and cybersecurity professionals involved in planning, implementing, and enforcing IT risk management. Download this research report to explore key findings.

  • 10 Cybersecurity Steps You Can Start on Today

    Sponsored by: Crosskey Cyber Security

    As a business leader in a small or medium sized high-risk business, you are overwhelmed by many things. And threats and regulatory requirements keep multiplying. In this blog post, explore a list of 10 cybersecurity steps you can start on today.

  • Dramatically Reduce Credit Risk & Prevent Delinquency, Even as Debt Levels Rise

    Sponsored by: Brighterion

    Consumer debt and delinquency rates are trending up—posing an increasing risk for lenders. Thankfully, AI is here to help. Learn how AI can help you dramatically reduce credit risk and prevent delinquency—even as debt levels rise—in this infographic.

  • Evaluating Vendor Risk Management

    Sponsored by: Atlassian

    As organizations continue to adopt cloud services, assessing the security risk of each service through a standardized evaluation process becomes critical to preventing data breaches. This guide is designed to help your organization develop a security risk scoring system to evaluate potential risks. Download the guide to learn more.

  • Pulsant Delivers Complete Peace of Mind to Scottish Building Society

    Sponsored by: Pulsant

    The Scotland Building Society needed risk and revenue loss mitigation capabilities and a secure location for its production servers. Access this case study to view the disaster recovery solution that SBS implemented and the results that it led to, which included a resilient, highly secure data center.

  • SAP Compliance Risk Dashboard Appsian Real-Time Analytics

    Sponsored by: Appsian

    Compliance mandates such as SOX, GDPR, CCPA and others require organizations to maintain details of data access. View this data sheet to see how Appsian’s Compliance Risk Analytics dashboard equips SAP customers with direct, real-time visibility into the activity around high-risk business transactions.

  • Google Cloud for Financial Services: Get the scale you need to simulate risk on demand and in real time

    Sponsored by: Google

    Global trading institutions require increasingly complex risk calculations. VaR valuations using historical methods require resources that can take a virtual server farm. Google Cloud’s high-performance computing grid offers the resources needed to perform timely risk calculations and simulations efficiently. Download the tip sheet to learn more.

  • Data Analytics in Healthcare: Opportunities & Challenges

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the promises of healthcare data analytics, the challenges faced by healthcare providers in digital transformation and what some cloud providers are doing to assuage the security concerns of cloud among healthcare service providers.

  • Google Cloud for Financial Services. Get scale and speed to convert ideas into profitable strategies

    Sponsored by: Google

    Quantitative researchers need powerful resources to deliver time-to-value trading insights. You also need to update existing algorithms and deploy new algorithms based on same-day research—which is a challenge when other computing takes precedence and feature backlogs create delays. Explore how Google Cloud makes this easier in this tip sheet.

  • Iranian Threat Groups and Campaigns

    Sponsored by: IronNet

    In a recent study, cybersecurity experts studied leading cyberthreat groups across Iran in order to provide a comprehensive report summarizing documented campaigns, common target & actor types, and geographic trends in attack patterns – all in order to help organizations be better prepared in the event of an attack.

  • How the Now Platform Enables Effective Cybersecurity and Risk Presentations to the Board of Directors

    Sponsored by: ServiceNow

    Read about the common challenges that IT, security, risk, and audit leaders often face when meeting with their board of directors and how to overcome them.

  • Denver Simplifies and Accelerates Vendor Risk Management with ServiceNow

    Sponsored by: ServiceNow

    For the city and county of Denver, information security is critical. The organization deals with many different types of sensitive information, including the personal data of its citizens. This case study reveals how ServiceNow was able to simplify its vendor experience with a risk survey portal, automated backend processes, and much more.

  • Managed Vulnerability Assessment

    Sponsored by: Arctic Wolf Networks, Inc.

    In this buyer’s guide, discover how vulnerability assessment and management can give you the visibility you need to prioritize security tasks.

  • CCPA legislation overview: Everything you need to know to prepare

    Sponsored by: TechTarget

    The deadline for CCPA is rapidly approaching. With just a few months left to finalize your consumer data protection strategy, it's critical to take a step back and ensure your approach doesn't have any gaps. Our CCPA guidebook equips you with knowledge to better understand the legislation. Complete our survey to reserve your free copy.

  • Cyber Risk Spotlight Report: 11 Metrics to Watch

    Sponsored by: Arctic Wolf Networks, Inc.

    According to Gartner, it takes hackers on average fewer than 8 days to exploit a vulnerability. In this report, dive into the key metrics every security team needs to better secure their operations and help prevent cyberattacks.

  • How to Build Out Your Cybersecurity Technology Stack

    Sponsored by: Arctic Wolf Networks, Inc.

    For organizations beginning their journey towards establishing a cybersecurity program, there can be an overwhelming number of vendors to choose from. This white paper is designed to guide organizations as they begin their selection process by providing advice for what to look for when evaluating vendors and service providers.

  • Supporting GRC with Business Continuity and Disaster Recovery

    Sponsored by: Cirrus Data Solutions

    Read this exclusive guide to discover how BC can support GRC initiatives and how to use the data acquired during BIA and RA activities to support GRC.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.