IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk AssessmentReports
101 - 125 of 335 Matches Previous Page  | Next Page
Safeguard your organization from Red Flags Rule non compliance
sponsored by Iron Mountain
WHITE PAPER: Since the Red Flags Rule took effect in 2011, there has been a lot of confusion over which businesses must comply and develop identity theft prevention programs. Is your business covered? This paper clearly defines which businesses are affected, explains the key aspects of the Red Flags Rule and more.
Posted: 13 Jun 2012 | Published: 01 Jun 2012

Iron Mountain

Data Protection Masterclass: Global Privacy
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions.
Posted: 12 Jun 2012 | Published: 24 May 2012

ComputerWeekly.com

The Cloud Risk Framework
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This unique cloud framework is designed to help organisations assess the financial risks of moving to the cloud.
Posted: 01 Jun 2012 | Published: 01 Jun 2012

ComputerWeekly.com

Capturing opportunity: Cleantech business booms
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Cleantech is emerging as a suitable alternative source of energy or a means of reducing  consumption of expensive resources, this report from Grant Thornton reveals.
Posted: 01 May 2012 | Published: 01 May 2012

ComputerWeekly.com

Managing Cloud Computing Risk
sponsored by SearchSecurity.com
EGUIDE: Have you done your best to reduce the risk of harm to your company in the event of a service interruption? In this e-guide by SearchCloudSecurity.com, gain expert insight on how to manage the risk of cloud outages as well as uncover a framework you can implement for evaluating cloud computing risk.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

SearchSecurity.com

5 Ways to Ensure Information Management Compliance
sponsored by Iron Mountain
DATA SHEET: Use this resource as a guide to to make sure your information is maintaining compliance with regulations and standards. Find five tips to help lower your risk profile and boost your audit readiness.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

Iron Mountain

Packaging tips to safeguard your physical records
sponsored by Iron Mountain
DATA SHEET: Read this white paper to learn proper techniques and best practices for packaging and storing your physical documents and information in cartons to avoid risk and records exposure. Find tips on what to look for in a quality carton, how to know when your carton is too old and needs to be replaced, and how to properly pack your carton.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

Iron Mountain

2012 Security Outlook
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

ComputerWeekly.com

Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

LogRhythm, Inc.

Holistic risk management: Perspectives for IT professionals
sponsored by IBM
WHITE PAPER: Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.
Posted: 28 Jun 2012 | Published: 16 Oct 2012

IBM

Healthcare Information at Risk: Encryption is not a Panacea
sponsored by Intel
WHITE PAPER: This resource demonstrates how encryption technology can play a key role in safeguarding sensitive patient information. But encryption isn’t a cure-all – there are still some downfalls associated with exclusive reliance on upon it. Read now to learn about the benefits and shortcomings of encryption, as well as other ways to protect electronic data.
Posted: 15 Jun 2012 | Published: 15 Jun 2012

Intel

Approaches for Agile development teams
sponsored by IBM
EGUIDE: This expert e-guide discusses the different approaches for agile development teams. Learn about a handful of methods from experts Mary LeMieux-Ruibal, Mirkeya Capellan and Lisa Crispin, including focusing more on trends than numbers, employing a risk-based testing approach, calculating testing costs and much more.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

IBM

Key Challenges in Risk Management: How Immediate Access to Integrated Information Can Mitigate Risk
sponsored by Sybase, an SAP company
WHITE PAPER: This white paper reveals the findings of a recent survey of senior risk and IT decision-makers in international financial institutions, exploring their current risk management capabilities and their plans for introducing integrated technologies, and examining the relationship between data management and risk mitigation in depth.
Posted: 04 Jun 2012 | Published: 30 Apr 2012

Sybase, an SAP company

Symantec Internet Security Threat Report: Trends for 2011
sponsored by Symantec Corporation
WHITE PAPER: This threat report takes a thorough look back at the most significant threats, trends and outright attacks of the year that was. Read now for helpful tips and best practices for keeping your confidential information safe.
Posted: 25 May 2012 | Published: 30 Apr 2012

Symantec Corporation

Risk Management: Safeguarding Against a World of Threats
sponsored by HP Enterprise Security
EBOOK: Access this expert e-book to discover all the different components that make up a comprehensive risk management policy. Uncover the importance of accurate risk management metrics, why governance, risk, and compliance are a unified framework, 4 components your risk management strategy may be missing, and more.
Posted: 17 May 2012 | Published: 01 May 2012

HP Enterprise Security

Supporting information technology risk management
sponsored by IBM
WHITE PAPER: Access the resource to discover the 5 stages of an effective IT risk mitigation program, the 5 components of efficiently managing IT risks and 5 questions to ponder when assessing risk solutions.
Posted: 04 May 2012 | Published: 01 Oct 2011

IBM

Establishing a Formal Cyber Intelligence Capability
sponsored by Verisign, Inc.
WHITE PAPER: While the benefits of advanced intelligence are substantial, achieving the capability requires a careful planning and consideration. In this paper, uncover best practices and a proven process for establishing a formal cyber intelligence capability as well as explore key considerations.
Posted: 03 May 2012 | Published: 03 May 2012

Verisign, Inc.

How much security do you really need?
sponsored by IBM
WHITE PAPER: Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.
Posted: 26 Apr 2012 | Published: 02 May 2011

IBM

Security strategy roadmap for cloud computing
sponsored by IBM
DATA SHEET: The benefits of the cloud cannot be fully realized without tackling the security and privacy concerns associated with cloud environments. In this resource, uncover a security roadmap that can help you build a sound approach for successfully achieving your cloud security needs.
Posted: 24 Apr 2012 | Published: 24 Apr 2012

IBM

Channel executives see need to bolster hospital IT security
sponsored by Hewlett-Packard Company
EGUIDE: Regardless of the size of the institution, hospitals need a sufficient IT security system in place. This E-guide explores why channel professionals and VARs should not only understand hospital vulnerabilities but also be able to convince customers that risk mitigation is worth the price.
Posted: 12 Apr 2012 | Published: 12 Apr 2012

Hewlett-Packard Company

Comparing health care data security compliance to other industries
sponsored by Hewlett-Packard Company
EGUIDE: This e-guide discusses the challenges health care companies run into meeting state and federal data security compliance regulations and how health care organizations compare to other industries such as financial services.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

Hewlett-Packard Company

The Forrester Wave™: Risk-Based Authentication, Q1 2012
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper reviews the top six risk-based authentication (RBA) vendors in the market today. Discover the pros and cons of each and how they stack up to one another. Review evaluations of each based on 16 key criteria, including customer satisfaction, mobile strategy, product revenue, and much more.
Posted: 02 Apr 2012 | Published: 22 Feb 2012

RSA, The Security Division of EMC

Risk-Based Test Automation from a Business Process Perspective: Automating the Testing of Critical Business Processes Enables you to Manage Change More Effectively
sponsored by Worksoft
WHITE PAPER: Being able to adapt your business processes to changing environments effectively is crucial to the overall success of your business. Read this white paper to learn how SAP users can implement the best risk-based testing strategies and the right automated testing tool to accommodate change.
Posted: 02 Apr 2012 | Published: 02 Apr 2012

Worksoft

A Prudent Approach to Risk Management
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Today's organizations are in need of more comprehensive and continuous risk management programs. Unfortunately, many do not have the appropriate processes, skills or technology foundation to meet this goal. Access this resource to uncover a prudent approach that uses three simple steps to help advance your risk management cause.
Posted: 23 Mar 2012 | Published: 01 Feb 2011

RSA, The Security Division of EMC

Setting standards in IT Industries
sponsored by DLT Solutions
EGUIDE: Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces.
Posted: 19 Mar 2012 | Published: 16 Mar 2012

DLT Solutions
101 - 125 of 335 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement