Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Business Risk Analysis Reports
 
Who Owns Your Data?
sponsored by SailPoint Technologies
EBOOK: 7 in 10 users have access to data they shouldn't, according to SailPoint's Market Pulse Survey. This e-book explores IAM and data protection strategies to ensure your organization is taking the correct precautions when protecting access to your data.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

SailPoint Technologies

Definitive Guide to Third-Party Risk Management
sponsored by Navex Global
RESOURCE: According to a Navex Global Benchmark Report, 1/3 of respondent organizations have faced legal or regulatory issues that involved third parties, with 50% involving average costs per incident of $10,000 or more. Take a look at this 30-page guide to learn how to successfully mitigate your organization's third-party risks.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

Navex Global

Executing a Lockdown on Cybersecurity Threats
sponsored by Navex Global
EBOOK: Cybersecurity preparedness and keeping up with the latest developments in security is essential in protecting your organization. This e-book addresses tactics to mitigate risks of cybersecurity threats and offers strategies to take if your organization has been attacked.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

Navex Global

Demystifying Cloud Security
sponsored by Workday
WHITE PAPER: Enterprises deploy more applications to more endpoints than ever before, making them great targets for hackers. Take a look at this white paper to gain insight into how shifting to the cloud can protect your company's increasing applications and endpoints.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Workday

The Sharing Economy: Who Will You Trust
sponsored by Evident
WHITE PAPER: With the evolving digital world, it is challenging to secure personal data and maintain an identity management platform. Explore this white paper to gain a deeper understanding of how you can improve your IAM strategy within the sharing economy in order to protect and secure your data.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Evident

GDPR
sponsored by RSA
WHITE PAPER: GDPR is on track to be the most significant change in global privacy laws in the past 20 years. Everyone wants to know: How will this affect my business? Read this RSA e-book to discover what you need to know about how the GDPR and EU's privacy rules could impact your business operations.
Posted: 08 Nov 2017 | Published: 31 Dec 2016

RSA

Achieve SIEM Solution Success
sponsored by Rapid 7
WHITE PAPER: Looking to unify data, detect attacks, and identify risks across your organization? SIEM can help. This white paper offers 6 challenges Gartner has identified as the main causes behind failed SIEM deployments and suggests an approach to implementing a successful SIEM platform while keeping these challenges in mind.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Rapid 7

Secure Communications for a Safer World
sponsored by BT
CASE STUDY: This case study provides a concrete example of how network security within UK government departments was enhanced with a secure communications strategy. Discover how this approach made processes more agile and efficient, while meeting the most stringent security requirements.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

BT

What Every CISO Needs to Know About Cyber Insurance
sponsored by Symantec
WHITE PAPER: The impact of a cyberattack to an organization's brand, reputation, and business operations can be catastrophic. Access this white paper to learn about why the implementation of cyber insurance can help improve your security posture and mitigate your risks of a cyberattack.
Posted: 04 Dec 2017 | Published: 04 Dec 2017

Symantec

Anti-Bribery and Corruption Risk Assessment Checklist
sponsored by Navex Global
WHITE PAPER: This Anti-Bribery and Corruption Risk Assessment Checklist outlines how to implement an effective anti-bribery compliance program using a methodology of protecting, detecting and correcting to manage core program components.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Navex Global
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement