Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Risk Management White Papers (View All Report Types)
 
Architecting for HIPAA Security and Compliance on Amazon Web Services
sponsored by Amazon Web Services
WHITE PAPER: AWS customers with HIPAA compliance requirements have a great deal of flexibility in how they meet encryption requirements for PHI. In this white paper, uncover HIPAA privacy and security rules and learn techniques for meeting compliance requirements.
Posted: 09 Oct 2017 | Published: 30 Sep 2017

Amazon Web Services

How to Implement NIST CSF : A 4-Step Journey to Cybersecurity Maturity
sponsored by Rsam
WHITE PAPER: Read this white paper to discover how a NIST Cybersecurity Framework platform provides users like you with strong security and threat protection against possible attackers.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Rsam

Beginner's Guide to Ransomware Detection and Protection
sponsored by AlienVault
WHITE PAPER: Within hours of the outbreak of WannaCry, it had infected more than 230,000 computers in over 150 countries. Gain a deeper understanding of ransomware attacks, how they work, who is targeted, and what you can do to stop them.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

AlienVault

The Eaton Power Management Guide
sponsored by Eaton
WHITE PAPER: This white paper offers a five step guide to building a proper power management solution while optimizing your existing one. Engage in this intelligent power management strategy to fully reap the benefits of the existing modern IT architectures and avoid unforeseen risks.
Posted: 26 Oct 2016 | Published: 30 May 2016

Eaton

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Cloud apps introduce a new threat vector, with lots of credentials floating around that provide direct access to business critical data. This white paper provides planning strategies for adopting cloud apps as well as information on managing the human factor.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Symantec & Blue Coat Systems

Study on the Cyber Resilient Organization: United Arab Emirates
sponsored by IBM Resilient
WHITE PAPER: Take an in-depth look at this Ponemon study to reveal factors effecting cyber resilience. Learn more about activities to improve it, barriers, and threats.
Posted: 12 Sep 2017 | Published: 30 Jun 2017

IBM Resilient

The Security Benefits of Prioritizing Critical Data Assets
sponsored by InteliSecure
WHITE PAPER: Do you know what your critical data assets are? This 6-part white paper explores how to define your critical data assets so you can save time and money, all while improving your security posture.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

InteliSecure

4 Ways Neustar Strengthens your DNS Security
sponsored by Neustar
WHITE PAPER: The once blue skies of cyber space have become the Wild West. Discover 4 steps you can take to protect DNS, lower business risk and defend your brand. Defend your organization against every new and existing malicious actor on the web to ensure customer safety and zero site downtime.
Posted: 10 Oct 2016 | Published: 31 Dec 2015

Neustar

2016 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

4 Mobile Security Insights for CISOs
sponsored by Lookout
WHITE PAPER: Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Posted: 12 May 2017 | Published: 12 May 2017

Lookout
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement