IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk AssessmentReports
201 - 225 of 360 Matches Previous Page  | Next Page
IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how security intelligence addresses these shortcomings and empowers organizations from Fortune Five companies to mid-sized enterprises to government agencies to maintain comprehensive and cost-effective information security.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

IBM

Presentation Transcript: Client-Side Security Issues - The Twilight Zone of Web Security
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript discusses the various types of JavaScript client-side issues that exist in today’s Web applications, their prevalence on the internet and how to locate and fix them.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

IBM

Handle with Care: Calculating and managing risk is tricky business
sponsored by SearchSecurity.co.UK
EZINE: In this inaugural issue of Information Security Europe, our cover story dives-deep into the difficult task of calculating and managing risk in the ever-changing European threat landscape.
Posted: 25 Mar 2011 | Published: 25 Mar 2011

SearchSecurity.co.UK

The Systems Engineering Balancing Act: Choosing an Optimum Development Approach
sponsored by IBM
WHITE PAPER: This thought leadership white paper proposes a combination of requirements-driven, model-driven and test-driven approaches as a mechanism for delivering systems development projects at a reduced cost and risk.
Posted: 23 Mar 2011 | Published: 23 Mar 2011

IBM

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives
sponsored by ISACA
WHITE PAPER: Globalization and recent economic pressures have resulted in increased requirements for the availability, scalability and efficiency of enterprise information technology (IT) solutions.
Posted: 23 Mar 2011 | Published: 23 Mar 2011

ISACA

E-Guide: Risk Management and Compliance Enforcement for the Financial Industry
sponsored by IBM
EGUIDE: This e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

Smart Decision Making in the Era of New Financial Challenges
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to learn why the Monte Carlo modeling method provides a beacon of financial sanity and reliability at time when consumer confidence is at an all-time low and managers face new levels of accountability and keen public scrutiny in their decision-making.
Posted: 22 Mar 2011 | Published: 02 Mar 2009

Oracle Corporation

Optimize Data Management for Smarter Banking and Financial Markets E-Book
sponsored by IBM
EBOOK: This e-book explains how smarter banks can anticipate customer needs and deliver innovative products faster, more consistently and more nimbly than the competition. They have full visibility of their risk position and customer needs. And they respond quickly to both challenges and opportunities. Read on to learn how to become a smarter bank.
Posted: 18 Mar 2011 | Published: 18 Mar 2011

IBM

IBM Smart Analytics System offerings powered by IBM System X Servers video
sponsored by IBM
VIDEO: This 8 minute video illustrates how customers can quickly turn data into insights to support analytics, reporting and BI needs with solutions built on IBM System x, IBM System Storage and IBM Software. 
Posted: 17 Mar 2011 | Premiered: 17 Mar 2011

IBM

Information Security Magazine: “Health Care Data Protection”
sponsored by Information Security Magazine
EGUIDE: This month’s Information Security Magazine Online cover story dissects the recent HIPAA revisions made by the HITECH Act.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

Information Security Magazine

E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by Safestone Technologies
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 08 Mar 2011 | Published: 08 Mar 2011

Safestone Technologies

Balancing Social Networking with Network Security Objectives
sponsored by BlueCoat
WHITE PAPER: Social networking has achieved a level of popularity that requires reasonable access at work, but it is also sufficiently mature to bring value to many businesses. But safe social networking requires an aggressive and layered security strategy at the web gateway, as well as the definition of new usage policies and priorities from management and IT.
Posted: 04 Mar 2011 | Published: 04 Mar 2011

BlueCoat

March Issue of Information Security magazine: “Virtual Certainty: VMs introduce a new security dynamic”
sponsored by Information Security Magazine
EZINE: This month’s Information Security Magazine Online cover story explores the need for sound security and risk management strategies around virtualization technology.
Posted: 04 Mar 2011 | Published: 04 Mar 2011

Information Security Magazine

Barclays Application Security Assurance Project
sponsored by Veracode, Inc.
CASE STUDY: As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

Veracode, Inc.

Five Signs Your File Data is at Risk
sponsored by Imperva
WHITE PAPER: Persistent insider threats and regulatory compliance mandates make protecting sensitive file data a business requirement for virtually every organization. However, the sheer volume of file data and its rapid and continuous growth make it a challenge to secure properly.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Presentation Transcript: Taming the Data Demons: Leveraging Information in the Age of Risk
sponsored by IBM
PRESENTATION TRANSCRIPT: Check out this presentation transcript from IBM as it discusses the advantages of implementing a holistic approach to data risk management, and provides both the “why” and “how” to begin putting a holistic data risk management program to work in businesses of all sizes.
Posted: 31 Jan 2011 | Published: 31 Jan 2011

IBM

EIU Report: Preemptive Action: Mitigating Project Portfolio Risks in the Financial Services Industry
sponsored by Oracle Corporation
WHITE PAPER: This research report explains how to ensure long-term viability in the financial services industry by depending on your ability to invest wisely in projects, meet regulatory targets and avoid the costly and public failures that brought down so many other organizations in the financial services industry.
Posted: 31 Jan 2011 | Published: 31 Jan 2011

Oracle Corporation

Presentation Transcript: Protect Data and Client Trust - An End-to-End Approach to Protecting Your Client Applications and Organizations
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Protect Data and Client Trust: An End-to-End Approach to Protecting Your Client Applications and Organizations” outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

IBM

Strengthening Governance, Risk, and Compliance in the Banking Industry
sponsored by SAP America, Inc.
ANALYST REPORT: Learn the reasons why a holistic view of risk in your company is essential in times of financial turbulence - and how many companies are adding value through governance, risk, and compliance (GRC) initiatives. Read this report to learn more. (Economist Intelligence Unit, 2009)
Posted: 05 Jan 2011 | Published: 05 Jan 2011

SAP America, Inc.

Presentation Transcript: What’s New with Rational Application Security?
sponsored by IBM
PRESENTATION TRANSCRIPT: Every day, more and more business is conducted online creating new challenges for meeting web application security and compliance.  This presentation transcript explores an approach that will help your organization address today’s biggest threats.
Posted: 18 Dec 2010 | Published: 18 Dec 2010

IBM

E-Book: Standardizing Business Continuity
sponsored by IBM
EBOOK: Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
Posted: 15 Dec 2010 | Published: 15 Dec 2010

IBM

E-Guide: How Risk Management Standards Can Work For Enterprise IT
sponsored by ArcSight, an HP Company
EGUIDE: Every organisation should be able to articulate how IT threats can harm a business. In this e-guide, Forrester Research Analyst Chris McClean explains how a five-step risk management strategy can add value to the rest of the organisation.
Posted: 13 Dec 2010 | Published: 10 Dec 2010

ArcSight, an HP Company

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by ArcSight, an HP Company
EGUIDE: Insider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.
Posted: 13 Dec 2010 | Published: 10 Dec 2010

ArcSight, an HP Company

E-Book: Technical Guide on Application Security: Scanning Production Applications
sponsored by IBM
EBOOK: This e-book explores how many of the risks associated with scanning can be avoided with careful planning and by focusing your scans on exploring where and how a system is vulnerable to attack and not trying to simulate an actual attack. Continue reading to learn more about scanning production applications.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

IBM

E-Book: Technical Guide on Application Security: Secure Development
sponsored by IBM
EBOOK: When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

IBM
201 - 225 of 360 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement