IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment White Papers (View All Report Types)
126 - 150 of 462 Matches Previous Page  |  Next Page
IT Security for Retail
sponsored by Trustwave
WHITE PAPER: This white paper emphasizes a multi-layer defense program against attacks. This approach helps you avoid infection, halt propagation, stop exfiltration and unify your security systems.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

Get the Incident Responder’s Field Guide: Lessons from a Fortune 100 Incident Response Leader
sponsored by Digital Guardian
WHITE PAPER: The Digital Guardian Incident Responder's Field Guide provides a formal, coordinated approach for responding to security attacks that affect information assets. Written by Tim Bandos, a former Fortune 100 cyber security leader, this e-book provides easy-to-follow steps for crafting an Incident Response plan.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Digital Guardian

IT Security for Financial Sector
sponsored by Trustwave
WHITE PAPER: Learn why threats are growing and how to keep up with them in this white paper. See where financial organizations around the world are falling short of best security practices and how you can avoid making the next £50 million mistake.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

2016 Security Pressures Report
sponsored by Trustwave
WHITE PAPER: The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.
Posted: 18 Jul 2016 | Published: 01 Jun 2016

Trustwave

3 Steps to Create a Data Protection Lifecycle Management Strategy
sponsored by Iron Mountain
WHITE PAPER: Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.
Posted: 15 Jul 2016 | Published: 01 Jun 2016

Iron Mountain

Security and Innovation Converge at Open Source Linux
sponsored by Red Hat
WHITE PAPER: Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

Red Hat

Migration Best Practices for Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: As IT systems age, they become more brittle. Download this white paper to understand the benefits of adopting the latest release of Red Hat Enterprise Linux—which will mitigate risk in the lifecycle of your server platform, and decrease the vulnerability of systems to security threats.
Posted: 15 Jul 2016 | Published: 29 Aug 2014

Red Hat

Cybersecurity Moves Toward Hybrid Models
sponsored by Dell SecureWorks
WHITE PAPER: Discover why the older "all or nothing" kind of relationship between organizations and information security service providers is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Dell SecureWorks

Incident Response Team: Transform Your IR Team From Reactive to Proactive
sponsored by ThreatConnect
WHITE PAPER: Discover how your IR team can become faster and more effective at protecting your network. Unite your people, processes, and technologies across your organization to eliminating barriers between the systems that used to slow you down.
Posted: 06 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

Security Operations Center: Unite People, Processes, and Technologies Across Your SOC
sponsored by ThreatConnect
WHITE PAPER: Discover how to deepen your threat intelligence, validate it, prioritize it and act on it. Bring together the people, processes, and technologies that comprise your Security Operations Center (SOC) team, and the other teams you partner with on a daily basis. Automate mundane security tasks that slow you down by leveraging tools you already have.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

First Principles for Network Defenders: A Unified Theory for Security Practitioners
sponsored by Palo Alto Networks
WHITE PAPER: In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization. The three essential tasks that support the first principle are: threat prevention, threat detection, and threat eradication.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

Palo Alto Networks

Three Critical Steps to Launch a Data Breach Response
sponsored by AllClear ID
WHITE PAPER: This resource highlights three critical steps in launching an effective incident response plan. Learn how to assemble a team, build communication channels with that team, draft different plans around specific incidents types and offer helpful services like identity theft protection.
Posted: 01 Jul 2016 | Published: 31 Dec 2015

AllClear ID

Infographic: Breach Preparedness
sponsored by AllClear ID
WHITE PAPER: This infographic shows you statistics from business executives and consumers on how they handle and perceive a data breach. Learn how to properly deal with a major breach now, before it's too late to formulate a proper breach response plan.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

Build a Data Breach Response Program
sponsored by AllClear ID
WHITE PAPER: Learn how to deliver a timely, organized breach response that boosts customers' confidence, repairs customers' identities if they've been victimized and helps minimize irreparable damage to your brand. Ensure peace of mind by giving your assurance that your organization values both their identities and their loyalties.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

Breach response isn't about losing data. It's about keeping your customers.
sponsored by AllClear ID
WHITE PAPER: The time to prepare for a data breach is today. Give your customers reassurance that they are taken care of and help resolve any harm done to their identity. Learn how to respond to customer queries effectively and reduce customer response time for any size breach to as little as 48 hours.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

Building a Vendor (IT) Risk Management Program
sponsored by BitSight
WHITE PAPER: Understand a vendor's security posture without requiring expensive site visits and penetration tests. Assess your vendors more frequently and focus efforts on those who have serious security issues.
Posted: 29 Jun 2016 | Published: 28 Apr 2016

BitSight

Breach Response: Preparing for the Threat; Controlling the Chaos
sponsored by AllClear ID
WHITE PAPER: Examine past breaches, in this report, to learn the tangible benefits of being well-prepared for a cyberattack, and the key features of a successful incident response plan. Discover how to emerge from every data breach with an enhanced public image of responsibility and competence.
Posted: 28 Jun 2016 | Published: 01 Oct 2014

AllClear ID

Illuminating the Real Cost of Incidents from an Insurer's Perspective
sponsored by AllClear ID
WHITE PAPER: This study helps you understand the true impact of data insecurity and the real cost of incidents by consolidating claims data from multiple insurers.
Posted: 28 Jun 2016 | Published: 31 Dec 2014

AllClear ID

Security Performance Metrics Across Major World Economies
sponsored by BitSight
WHITE PAPER: This report shows you the security performance results of 250 organizations per country from the U.S., the U.K., Singapore, Germany, China and Brazil during May 2015 until May 2016. Discover how to help your organization's security stance as you move forward into new, global markets.
Posted: 28 Jun 2016 | Published: 01 May 2016

BitSight

Don’t Let “Trusted” Vendors Become Cyber-Breach Enablers
sponsored by BitSight
WHITE PAPER: This resource uncovers how evaluate vendors' security ratings simply and effectively. Learn how to police the safety of the vendors entrusted with handling your sensitive data to enhance your vendor risk management program no matter where it is on the maturity curve.
Posted: 28 Jun 2016 | Published: 01 May 2016

BitSight

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
WHITE PAPER: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 24 Jun 2016 | Published: 01 May 2016

Citrix

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Neutralize Emerging Threats: Reducing the Time to Discover and Recover Transcript
sponsored by Intel Security
WHITE PAPER: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Published: 01 May 2016

Intel Security

HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 27 Jun 2016 | Published: 01 May 2016

Intel Security
126 - 150 of 462 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement