ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • McAfee MVISION Insights

    Sponsored by: McAfee

    Enterprises have reacted to the evolution of cyberthreats by increasing security budgets and adopting threat intelligence platforms, but neither of these strategies offer the desired results. They both require rigorous human intervention and produce only limited actionability. Read this white paper for an alternative way to take proactive action.

  • The Cost of Making the Front Page: What You Need to Know About the Growing Threat of Public Breaches

    Sponsored by: Dell SecureWorks

    A September 2018 attack on British Airways costing them close to $1B USD did not involve data encryption or ransom demands. Instead it saw cybercriminals using third-party code on the BA website to fraud 380,000 people out of their credit card numbers. These ‘public breaches’ are on the rise – read this white paper to learn more.

  • 2020 Gartner Magic Quadrant For IT Risk Management

    Sponsored by: Reciprocity Labs

    2020 Gartner Magic Quadrant For IT Risk Management

  • Managing Digital Risk: The Security Challenge Beyond Your Perimeter

    Sponsored by: Mimecast

    Today’s security leaders are feeling the pressure of the threat that cyber risks present to their organization’s reputation. But managing digital risk can sometimes be resource exhaustive. Read this Mimecast guide for an overview of modern challenges and how to overcome them.

  • The Clock is Always Ticking: 24/7 Cybersecurity Monitoring Takes its Toll

    Sponsored by: Dell SecureWorks

    65% of Security Operations Center (SOC) professionals say stress has caused them to think about quitting. Needless to say, security is stressful, but relief is possible. Read this white paper to explore the issue of increasing demands on security practitioners and to explore several avenues for automating and reducing workloads for team members.

  • Cloud Adoption and Risk Report

    Sponsored by: McAfee

    The spread of COVID-19 has caused dramatic changes in how organizations approach protecting their remote employees while facilitating productive work environments – affecting cloud service usage across on a global scale. For key findings and statistics, read the McAfee Cloud Adoption and Risk Report.

  • Analyzing the Economic Benefits of Proofpoint Insider Threat Management

    Sponsored by: Proofpoint

    With cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this ESG report to learn about Insider Threat Management from Proofpoint.

  • Cybersecurity Built for Your Business, Budget and Staff

    Sponsored by: Panda Security

    In the US, 42% of employees are working from home full-time. As a result, managing distributed workforces has become a priority for organizational leaders. Remote deployment and lack of centralization have both created security and compliance risks. To regain control, view this e-book about the top organizational challenges and their solutions.

  • IT-GRC Tools

    Sponsored by: ServiceNow

    IT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.

  • ERM & GRC: Digital Tools for Oversight In The Enterprise

    Sponsored by: ServiceNow

    In this report, discover the results of Constellation Research’s initiative into determining the most effective digital tools for oversight in the enterprise and observe a shortlist of 12 unique enterprise risk management (ERM) and governance, risk and compliance (GRC) offerings you should be aware of.

  • IT Risk Management (ITRM): Vendor Comparison Matrix

    Sponsored by: ServiceNow

    IT risk management (ITRM) has emerged as a key pillar in assessing risk, bolstering security and addressing compliance needs. Read this Gartner Magic Quadrant Report for an in-depth comparison of the capabilities of top ITRM vendors and offerings in today’s market.

  • Best Practices in Crisis Management

    Sponsored by: BlackBerry

    The ability to reach out to your staff and essential stakeholders during an impending incident or crisis can help to minimize further business impacts and disruptions. Download this white paper to learn more about the importance of communications in crisis management.

  • A Focused Approach to Managing Risk in Uncertain Times

    Sponsored by: ServiceNow

    As businesses emerge from the initial COVID-19 crisis, they are coming under immense pressure to adapt their risk and resilience programs to the evolving effects of COVID-19 and other potential disruption. In this white paper, uncover 4 steps businesses can take to help them become more resilient, control risks and maximize productivity.

  • Developing A More Effective Risk Report for Your Board

    Sponsored by: ServiceNow

    Today’s risk climate necessitates that everyone within the organization, regardless of job function, is invested in security and protection of their organization. However, organization-wide buy-in starts with getting the board involved. Download this white paper to learn how to convey the seriousness of cyber risk to your board.

  • Comparing Top IT Vendor Risk Management Tools

    Sponsored by: ServiceNow

    IT vendor risk management (IT VRM) software provides solutions to manage and automate the vendor risk management life cycle, address third-party risk and meet regulatory compliance. This Gartner Magic Quadrant Report provides an overview of the IT VRM market and a comprehensive evaluation of the top offerings – read on to get started.

  • Risk Management as Revenue Driver: An Adaptive Approach

    Sponsored by: LogicGate

    Recently, PwC interviewed 1,535 executives in risk functions from 76 countries and across 30 different industries. They used this information to serve as models in their successful approaches to risk. These “Adapters,” as they’re called, were effective in tackling innovation-related risks. Read this article to see why they stood out.

  • GCC High Environment with Microsoft Teams Audio Conferencing

    Sponsored by: CallTower, Inc.

    Microsoft has created Office 365 GCC High to meet the security requirements of government agencies and contractors with strict cybersecurity and compliance needs. Now, businesses are eligible for GCC High audio conferencing with Microsoft Teams. Read this data sheet to learn more.

  • Best Practices for Special-Purpose System Security

    Sponsored by: ColorTokens

    A special-purpose system is an endpoint with a specific function, such as an airport kiosk or an ATM. And while these endpoints facilitate convenience, they also present significant security challenges. Read this article to learn more about where the vulnerabilities lie and how to address them.

  • Simple Steps for Setting Up A Project Risk Register

    Sponsored by: LogicGate

    For sophisticated projects, organizations typically turn to a project manager to assess and plan for risks. One emerging practice being used by project managers is the curation of a risk register. But what is a risk register? What does it entail? How can your organization get started making one? Read on to find out.

  • Manage Security Risk with Red Hat Insights

    Sponsored by: Red Hat

    Access this white paper to learn about Red Hat Enterprise Linux, a tool that offers 5 key benefits for organizations looking to analyze, prioritize, and remediate issues as well as report their status.

  • What is Operational Resilience?

    Sponsored by: LogicGate

    According to Gartner, operational resilience is a set of techniques that allows people, processes and information systems to adapt to changing patterns. How do businesses not just prepare but succeed when faced with the unexpected? Read this quick article to get an understanding of how organizations comprehend their respective risk.

  • The Top 5 InfoSec Professional Challenges

    Sponsored by: LogicGate

    What keeps you up at night? If you’re anything like most risk and information security professionals, the list is long. Juggling security concerns, reporting on risk data, and managing the latest regulatory requirements all add up. To stay in the know, read the top 5 challenges infosec professionals face, and the common thread linking them all.

  • Cybersecurity Risk Management Simplified

    Sponsored by: CyberSaint

    There could be no greater luxury in today’s unpredictable world than having cybersecurity and risk management simplified. In this white paper, you can learn about a standardized risk management platform that allows you to integrate your strategy for a unified approach, manage expectations for risk reduction, and intelligently present cost.

  • The Risk Cloud

    Sponsored by: LogicGate

    Approaches to risk management are shifting from reactive to proactive. Integrating risk management programs is a key to growth in today’s digital landscape. Many of the challenges involving risk, including lack of visibility and poor UX, can be solved through a more agile approach. Read this white paper to learn about the Risk Cloud and agile GRC.

  • Top Security and Risk Management Trends

    Sponsored by: Palo Alto Cortex

    View Gartner’s Top Security and Risk Management Trends of 2020 to help improve your company’s overall resilience, better support your business’s objectives and elevate your organizational standing.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.