Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk
By: IBM Line of Business View more from IBM Line of Business >>
Download this next:
12 top enterprise risk management trends in 2023
By: TechTarget ComputerWeekly.com
Type: eGuide
Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change.
Executives recognize that stronger ERM programs are required to remain competitive in this new era. One aspect of the current risk landscape that companies must contend with is the connectivity of risks.
Businesses are increasingly more interconnected to partners, vendors and suppliers across global markets. As a result, the impact, for example, of a local natural disaster, the ongoing war in the Ukraine or high interest rates can cascade across an entire global supply chain.
Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.
These are also closely related to: "Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk"
-
Insuring the uninsurable: Is cyber insurance worth its salt?
By: TechTarget ComputerWeekly.com
Type: Research Content
Cyber insurance is one of the fastest growing areas of risk cover in the insurance industry as businesses increasingly turn to specialist insurance in an attempt to cover a portion of their enterprise risk.
Cyber risk is notoriously difficult to quantify and businesses face an arduous choice in deciding which risks to manage themselves and which risks to transfer to the insurance market.
This article dips a toe into this emerging risk area and outlines some steps businesses can take to make better informed risk mitigation decisions.
-
Infographic: Top 12 risk management skills
By: TechTarget ComputerWeekly.com
Type: Infographic
Risk management is a must for anyone who aspires to be a leader or manager. There is risk to be addressed at all business levels, and if a leader is unable to manage risk, their upward mobility will disappear.
Being a capable risk manager requires awareness and knowledge to uncover potential risks and present them to people best suited to solve the problem. A risk manager doesn't necessarily have to make the fix -- they just need to bring it to the person who can.
Find more content like what you just read:
-
Information Security Threats: Building Risk Resilience
By: TechTarget Security
Type: eGuide
Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
-
Building the Business Case for Quantifying Cyber Risk
By: LogicGate
Type: eBook
It's the cybersecurity question every executive and board member wants — and needs — to have answered: How much will it cost if a cybersecurity risk materializes and causes a breach? Provide the answer with confidence by tying cyber threats to business impact using cyber risk quantification. Read on to learn more.
-
Managing Cloud Computing Risk
By: TechTarget Security
Type: eGuide
Have you done your best to reduce the risk of harm to your company in the event of a service interruption? In this e-guide by SearchCloudSecurity.com, gain expert insight on how to manage the risk of cloud outages as well as uncover a framework you can implement for evaluating cloud computing risk.
-
Traditional vs. enterprise risk management: How do they differ?
By: TechTarget ComputerWeekly.com
Type: eGuide
Businesses understand they cannot exist in a risk-free environment. How to manage the risks they face depends on many variables, including the industry the business is in and its size. In this e-guide, we compare traditional risk management and enterprise risk management and outline the important differences between the two.
-
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
By: TechTarget ComputerWeekly.com
Type: Resource
Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
-
Top IT security priorities: Addressing risk management and compliance
By: Dell Software
Type: eGuide
In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.
-
Reducing the Risks of Social Media
By: TechTarget Security
Type: eGuide
Social Media can enhance brand reputation, build connections with external customers, improve collaboration and more. However using social media also carries risks. Fortunately, this expert e-guide explores the potential identity, security and privacy threats associated with social media.
-
Top Monitoring Tools to Help Meet Regulatory Compliance Standards
By: TechTarget Security
Type: eGuide
In this e-guide, gain expert insight on how to remain vigilant in meeting regulatory compliance standards, and uncover top compliance monitoring tools for financial institutions to meet their industry-specific regulations.
-
E-Guide: VM in the Cloud
By: TechTarget Security
Type: eGuide
Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.
-
CW ANZ, July 2020: Expert Advice on Security
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
-
How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction
By: AT&T Cybersecurity
Type: White Paper
Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.
-
Demystifying risk management
By: ServiceNow
Type: eGuide
Risk management refers to the practices and systems an organization employs to identify, monitor and remediate this risk. To shed light on risk management TechTarget has provided this article-guide, which will take you through the ins and out of risk management, as well as its importance for modern IT. Read on to learn more.
-
How this insurance company secured its attack surface
By: Ionix
Type: Case Study
A fortune 500 insurance and financial services company found itself with increased risks throughout its organization. With IONIX Attack Surface Management, the company was able to discover and inventory all internet-facing assets. Download now to unlock the full case study.
-
Risk management is the beating heart of your cyber strategy
By: TechTarget ComputerWeekly.com
Type: eBook
In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.
-
A Computer Weekly buyer's guide to compliance, risk and governance
By: TechTarget ComputerWeekly.com
Type: eGuide
Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
-
A Computer Weekly buyer's guide to managing paper processes
By: TechTarget ComputerWeekly.com
Type: eGuide
Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
-
Analyst report: Take control of your data with cloud ERP
By: SAP
Type: Analyst Report
In this analyst report, you’ll discover how a cloud ERP system can help organizations overcome the symptoms of siloed data and drive productivity by solving core challenges for financial teams. Read on to learn how you can build a foundation for success.
-
How Dignity Used Risk Cloud® to Adapt to an Evolving Regulatory Environment
By: LogicGate
Type: Case Study
When new regulatory requirements were imposed in the U.K., the Dignity team had a significant challenge on their hands: They had to launch an entire risk and compliance program from scratch. Find out how Risk Cloud made the process easy
-
How to accelerate your risk and compliance initiatives—and get to value faster
By: ServiceNow
Type: eBook
Explore in this e-book some of the top risk and resilience management solutions available to your organization that can help you break silos, help embed risk and compliance management into daily work, and improve performance through risk-informed decisions.
-
What a leading cybersecurity program looks like
By: AT&T Cybersecurity
Type: White Paper
In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.
-
Cloud Management: Overcoming today’s Top Risks
By: TechTarget Security
Type: eGuide
Under a cloud paradigm, as services become more concentrated, risks follow suit, so it is important to understand and account for these changes and adjust security programs accordingly. View this e-guide to explore the top security risks in cloud computing today and how to overcome them.
-
Report for Enterprise Risk Management (ERM) Software
By: LogicGate
Type: Analyst Report
G2's quarterly grid reports rank companies against each other by customer satisfaction and market presence. The Enterprise Risk Management (ERM) category evaluates GRC platforms for companies looking to define, implement, and monitor company-wide strategies for risk management, so they can better mitigate risk. Read on to learn more.
-
Mobile device protection: tackling mobile device security risks
By: TechTarget Security
Type: eGuide
The proliferation of mobile devices into the enterprise has put mobile device security risks as a top priority for many organizations today. In this e-guide from SearchSecurity.com, gain expert insight on how to tackle mobile device security risks and explore why your current approach might need to be reevaluated.
-
Emerging PaaS security tactics
By: TechTarget Security
Type: eGuide
Like all other cloud deployments, PaaS introduces some security concerns because of underlying security features that are beyond the customer’s control. This e-guide explores these challenges and lists security areas that can affect the risk profile of deployed applications, as well as offers key advice for mitigating risk.
-
5 building blocks for strengthening your IT security program
By: AT&T Cybersecurity
Type: White Paper
Given how rapidly cybersecurity threats emerge and change, it can be hard to keep up. Security leaders must be ready to build security programs that will take their operations to a whole new level of risk reduction— without hampering the flexibility and recovery offered by digital transformation in a post-pandemic business world.
-
5 building blocks for strengthening your IT security program
By: AT&T
Type: White Paper
Given how rapidly cybersecurity threats emerge and change, it can be hard to keep up. Security leaders must be ready to build security programs that will take their operations to a whole new level of risk reduction— without hampering the flexibility and recovery offered by digital transformation in a post-pandemic business world.
-
2023 research paper: How to secure OT environments
By: Palo Alto Networks
Type: Research Content
Though they present great opportunity, Industrial Internet of Things (IIoT) initiatives present great security risk as well as financial risk, because of the costly nature of shutting down operations. So, how can you secure your business’s OT environment and mitigate such risks? Tap into this 2023 VDC Research paper for insights.
-
Anticipate, Prevent, and Minimize the Impact of Business Disruptions
By: ServiceNow
Type: White Paper
Read this guide to discover how you can enable confident risk-based decisions across business and IT by building a proactive, comprehensive and competitive resilience strategy—especially in times of uncertainty and disruption. Start building a resilience programme that can give you a competitive edge, with ServiceNow.
-
Aligning risk & service models for operational resilience
By: ServiceNow
Type: White Paper
Integrating an entity hierarchy into risk management aligns with CMDB and CSDM for risk visibility. Maturing from tactical to service-centric, it includes third parties, enhancing accountability and transparency. Read to build a robust framework aligned with business services and infrastructure.
-
Improve risk management by connecting business & IT
By: ServiceNow
Type: White Paper
Organisations that invest in resilience during times of uncertainty are better able to seize opportunity when it arises. In this eBook, discover how you can optimise operations, reduce costs and risk and boost resilience by connecting business and IT on a single platform. Learn more about Integrated Risk Management from ServiceNow in this ebook.
-
Global Risks Report 2017
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
-
Risk management: 5 stages to compliance
By: ServiceNow
Type: White Paper
Maturing your risk management program is vital for meeting enterprise-wide objectives. Get insights on how you can raise the maturity level of enterprise risk management. You’ll discover how your teams can make better decisions that lead to greater outcomes, by connecting business and IT with a common language on a single platform.
-
Improve cyber risk management operations for your organization
By: Google
Type: Product Overview
Cyber risks demand effective management. This white paper examines cyber risk operations, identifying capabilities to advance threat visibility, align threats with critical assets, and enable risk-based decisions. It provides a methodology and framework to continuously improve risk mitigation. Read now to enhance your cyber risk program.
-
Threat management: Essential guide
By: TechTarget ComputerWeekly.com
Type: eGuide
Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
-
CISSP Exam Guide Chapter 1 sample download
By: McGraw Hill
Type: White Paper
In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
-
Building the case for third-party Oracle support
By: Spinnaker Support
Type: White Paper
Today, many IT teams are struggling to mitigate risks, especially when it comes to trying to manage budgets that can enable resources to better focus on strategic initiatives that drive critical business priorities. Browse this white paper to learn more.
-
6 tips to modernise your fight against money laundering
By: SAS
Type: White Paper
This white paper explores how advanced technologies like AI and machine learning can empower risk management and make anti-money laundering (AML) efforts more effective. After reading, you’ll understand how your business can make better use of limited resources and stay resilient. Download now to learn more.
-
How CPM Software Points to Future Financial Risks and Opportunities
By: TechTarget HR Software
Type: eGuide
This expert e-guide from SearchFinancialApplications.com discusses why corporate performance management (CPM) software has become a financial planning necessity.
-
Top 10 CI/CD security risks you can't ignore
By: Palo Alto Networks
Type: eBook
Pipelines open new attack surfaces if not secured properly. In this 42-page eBook, learn key strategies to lock down your CI/CD environments and processes to avoid data breaches, compromised infrastructure, and failed audits.
-
Eguide: Top 10 risks in cloud computing and how to stay compliant
By: TechTarget Security
Type: eGuide
Transitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing.
-
Managing M&A Risk
By: Tanium
Type: White Paper
To optimally manage cyber risk in the mergers and acquisitions process, acquiring organizations need a rapid, accurate way to map all the endpoint assets in a target company. Read about how this is done in Managing M&A Risk: How Endpoint Visibility Can Deliver Critical Advantages.
-
Focus: how to avoid being hit by ransomware
By: TechTarget ComputerWeekly.com
Type: eGuide
In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.
-
Royal Holloway: Driverless vehicle security for military applications
By: TechTarget ComputerWeekly.com
Type: Research Content
Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
-
CW Europe - September-November 2020: IT expertise in banks' boardrooms reduces risk, says European regulator
By: TechTarget ComputerWeekly.com
Type: Ezine
The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.
-
DORA: What cybersecurity leaders need to do to succeed
By: Panaseer
Type: White Paper
The Digital Operational Resilience Act (DORA) is now law in EU countries, with enforcement starting January 17, 2025. This new white paper looks at the implications for cybersecurity leaders and the actions you need to take to ensure you’re compliant by 2025. Access the paper to learn more.
-
6 ways to recession-proof your business with ServiceNow risk products
By: ServiceNow
Type: eBook
In this eBook, discover how you can optimise operations, reduce costs and risk and boost resilience by connecting business and IT on a single platform. Learn more about Integrated Risk Management from ServiceNow in this ebook.
-
Quantified benefits of Elastic Observability & Security
By: Elastic
Type: Forrester Total Economic Impact Report
This Forrester report is designed to help you understand the benefits, costs, and risks associated with Elastic’s suite of observability and security solutions. Download the report now to gain insights into 4 different customer experiences with this investment and assess the financial implications of adding Elastic solutions to your tech stack.