Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Risk Management Reports
 
Managing External Identities
sponsored by Simeio
WEBCAST: Listen to this webinar to uncover approaches to enhance your IAM security as well as customer experience.
Posted: 07 Sep 2017 | Premiered: Sep 5, 2017

Simeio

How to Become a Superstar Security Leader
sponsored by Google Cloud
RESEARCH CONTENT: Be the superstar security leader your fellow executives need. This report looks at the biggest changes in firms' expectations of their CISOs and provides specific examples of how top information security professionals rise to those occasions. Download the Forrester report today and secure your future.
Posted: 08 Aug 2017 | Published: 13 Feb 2017

Google Cloud

2017 Unisys Security Index Global
sponsored by Unisys
WHITE PAPER: Identity theft ranks 1st among 8 security threats, with 65% of those surveyed saying they are seriously concerned, according to the 2017 Unisys Security Index. Gain insight into consumer attitudes regarding identity theft, bankcard fraud and other security concerns and how your organization can revamp your security posture based on these insights.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

Unisys

From the Top: What Executives Need to Know About Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: $117,000 is the average financial impact of a data breach for SMBs in North America and $1.3 million is the average impact for a large enterprise in North America. This paper identifies 6 myths about enterprise security to help you strengthen your approach, so you do not fall victim to data breach's large financial impact.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Kaspersky Lab

How to Implement NIST CSF : A 4-Step Journey to Cybersecurity Maturity
sponsored by Rsam
WHITE PAPER: Read this white paper to discover how a NIST Cybersecurity Framework platform provides users like you with strong security and threat protection against possible attackers.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Rsam

Your Employee Security Checklist: 10 Tips
sponsored by Kaspersky Lab
WHITE PAPER: Careless employees were the single biggest cause of serious incidents involving data loss or leakage— involved in 1 in 5 serious data breaches. Find 10 tips for employee security to prevent serious incidents at the employee level.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

IT Security: Cost Center or Strategic Investment?
sponsored by Kaspersky Lab
WHITE PAPER: Understanding the math behind the cost of a cyberattack is more crucial now than ever. By reading this white paper, gain a deeper understanding of the cost of IT security incidents and how to move your organization forward in preventing data breaches.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Kaspersky Lab

Veracode Integrations
sponsored by Veracode, Inc.
WHITE PAPER: As more organizations move to DevOps, application security needs to keep up or risk being left behind. Access this white paper to learn how you can integrate your application security with your security and development teams' existing tools and processes.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veracode, Inc.

Comparing the Best SIEM Systems on the Market
sponsored by TechTarget
RESOURCE: SIEM adoption is on the rise. The global SIEM market will grow to $4.5+ billion in 2019, according to Markets and Markets. Cybersecurity Ventures CEO Steve Morgan predicts a big uptick in SIEM adoption by SMBs in the next few years.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

TOPICS:  Risk Management
TechTarget

Secure Your Endpoint Devices With A Unified Endpoint Management Tool: IBM MaaS360 with Watson Overview
sponsored by IBM
PRODUCT OVERVIEW: Today's end-user devices are comprised of all form factors— everything from smartphones and tablets to laptops and desktops. IT faces the challenge of monitoring, securing and managing all of these end-user devices successfully. Learn how IBM® MaaS360® with Watson™, a cognitive unified endpoint management (UEM) tool, can help overcome this hurdle.
Posted: 30 Aug 2017 | Published: 01 Apr 2017

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement