You've requested...

Download this next:

12 top enterprise risk management trends in 2023

Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change.

Executives recognize that stronger ERM programs are required to remain competitive in this new era. One aspect of the current risk landscape that companies must contend with is the connectivity of risks.

Businesses are increasingly more interconnected to partners, vendors and suppliers across global markets. As a result, the impact, for example, of a local natural disaster, the ongoing war in the Ukraine or high interest rates can cascade across an entire global supply chain.

Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.

These are also closely related to: "VigilEnt Policy Center 4.2 Trial"

  • Are we trusting social networks too much?

    User privacy and commercial profit are in an ongoing battle. Social networks engage in extensive information collection, analysis and storage and users have no control over such data collection practices.

    Most social network users will never read the policies provided by social networks, yet are showing an increased desire for better privacy.

    This article examines the main flaws in the privacy policies of Facebook, Twitter, LinkedIn and Google+/Google that may put user privacy at risk. To some, these flaws may present the appearance that ever-increasing profits override concerns for privacy.

  • Financial markets regulatory outlook 2017

    The regulatory outlook for financial services firms in 2017 will be determined by a number of factors. Firms continue to be challenged by the introduction of regulations, continued macro-policy uncertainty and digital disruption from new technologies.

    Fintech and regtech

    • In 2017, fintech will continue to change the industry, along with artificial intelligence (AI) and data analytics. Innovative entrants will find greater support from regulators, but those regulators will become increasingly vigilant about the risks that they pose.

    • In payments, PSD2 presents many business opportunities. However, the lack of specificity in some of its provisions could complicate its implementation for fintechs and retail banks.

    • Elsewhere, regtech promises to push down costs, rein in compliance risk and improve controls. However, its adoption will remain gradual this year. Effective implementation of such solutions will require significant up-front investment and firms will need to demonstrate that this will create valuable business returns, especially in the trickier commercial conditions that are set to continue in 2017.

    • A number of recent high-profile attacks on firms have encouraged supervisors to increase their focus on the cyber resilience of the financial sector. In 2017, supervisory expectations will evolve to include more detailed response planning for cyber breaches and clearer responsibilities among management and boards. Firms will increasingly use testing, war-gaming and red-team exercises to demonstrate the robustness of their resilience plans to public authorities.

    Persistently low and volatile interest rates have also seen greater pressure on profitability, despite being a decade on since the origins of the financial crisis. Looking ahead, it is clear that many financial services firms must steer a course into 2017’s uncertain winds by taking decisive and, in some cases, bold actions to adapt to an increasingly challenging environment.

Find more content like what you just read:

  • Key principles of AI-powered network security

    As networks expand, network security must evolve. One way that you can transform your security is by adopting AI-powered capabilities that can defend against evasive threats, unify security management, and more. In this white paper, learn all about that approach and deepen your understanding of today's top network-security obstacles.

    Download

  • How to build your digital communications governance (DCG) strategy

    The message from the regulators is clear; having an off-channel policy for mobile communications is not good enough. Download this e-book to learn about the top 5 mobile DCG best practices that will cultivate productive, flexible and compliant mobile communications.

    Download

  • Focus: how to avoid being hit by ransomware

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

    Download

  • A Computer Weekly buyer's guide to managing paper processes

    Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.

    Download

  • Infographic: 5 questions to ask when creating a ransomware recovery plan

    Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.

    Download

  • The cybersecurity balancing act: How to prepare for the unpredictable

    Cybersecurity is, at its most essential core, a balancing act, requiring constant study and vigilance of past trends while maintaining an awareness that anything is possible. Access this analyst report to cultivate your understanding of the current threat landscape and stay prepared for the uncertainties of cybersecurity.

    Download

  • Eliminate your API vulnerabilities with Cequence Unified API Protection

    Today’s security teams simply lack the visibility and defense capabilities they need to protect the ever-growing risk from APIs and other application connections. Check out this data sheet to see how the Cequence Unified API Protection solution can reinforce the vulnerabilities that may undermine your organization.

    Download

  • Disaster recovery and business continuity: Essential guide

    Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.

    Download

  • Global Risks Report 2017

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

    Download

  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.

    Download

  • MicroScope - July-August 2024: Is it worth taking a risk?

    In this issue, we take a closer look at the channel's approach to risk, with experts weighing in on with their approach to playing it safe versus taking steps towards innovation. Also read up on why the time is now to learn about AI-capable PCuse cases, as well as why the human factor should not be underestimated when it comes to AI

    Download

  • How SASE can protect your digital assets

    Between skyrocketing amounts of data and the IT skills shortage, organizations encounter significant obstacles on their path toward securing their digital assets. Along with digging into those challenges, this white paper explores how businesses can surmount them with SASE. Keep reading to unlock these insights.

    Download

  • Compliance Field Guide: Reducing Costs in an Increasingly Regulated World

    This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.

    Download

  • Today's attacks target people, not just technology

    Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.

    Download

  • Infographic: 6 information governance best practices

    Information governance can streamline an organization's data management, cut storage costs and ensure compliance, which are all critical for content management. Best practices, such as forming a committee, accounting for collaboration tools and creating reports, can guide the way.

    Download

  • Anticipate, prevent, and minimize the impact of business disruptions

    Read this guide to discover how you can enable confident risk-based decisions across business and IT by building a proactive, comprehensive and competitive resilience strategy—especially in times of uncertainty and disruption.

    Download

  • New privacy laws are coming, first stop California

    The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.

    Download

  • How to remediate SOC, workforce, & network blind spots

    Companies that use more than 50 tools are 8% less effective in detecting attacks and put a significant strain on security operations centers (SOCs) with endless alerts. Access this infographic to learn how to steer clear of security blind spots plaguing your company, with guidance for SOCs on how to catch and remediate said blind spots.

    Download

  • Top Health IT Analytics Forecasts and Goals for the Coming Year

    Health IT analytics and artificial intelligence experts say that healthcare organizations should focus on AI governance, transparency, and collaboration in 2024.

    Download

  • Step-by-step disaster recovery planning guide

    IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.

    Download

  • Royal Holloway: Driverless vehicle security for military applications

    Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.

    Download

  • 7 free GRC tools for compliance professionals

    All organisations need to meet a variety of regulatory compliance requirements, such as General Data Protection Regulation (GDPR), but they don't all have the budget for GRC software. In this e-guide, learn about the free, open source options.

    Download

  • Streamline cloud security across all environments

    Secure your hybrid cloud with consistent security policies across Red Hat Enterprise Linux and AWS. Learn how to mitigate risks, implement layered security, and streamline compliance. Download this product overview to discover the integrated security capabilities.

    Download

  • Six essential identity security capabilities for healthcare

    As healthcare organizations adopt cloud-based identity security, they need essential capabilities like unified platforms, reduced non-employee risk, AI-driven access management, and centralized visibility. Learn how KPMG and SailPoint can help your organization achieve these goals in this white paper.

    Download

  • Rethinking identity governance in modern healthcare organizations

    Discover how healthcare organizations can modernize identity security and governance to reduce cyber risks, ensure patient data privacy, and scale cost-effectively with SaaS-based solutions. Read the full report to learn more.

    Download

  • 5 endpoint security best practices

    With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To get started writing a policy customized for your company, here are five universal endpoint security best practices to consider.

    Download

  • How Oversight helped White Cap fight fraud

    White Cap Construction Supply distributes construction materials to contractors across 450 branches. With so much infrastructure comes an equally large quantity of data. Read the case study now to learn how Oversight helped White Cap tighten up procure-to-pay operations and fight fraud.

    Download

  • To hack back or not to hack back ...

    This e-guide discusses hacking back as a viable option to combat hacking attempts. Expert Kevin Beaver discusses the merits and drawbacks of an "offense is the best defense" approach to security and how to implement more permanent security tools moving forward.

    Download

  • Explore the role of privileged access management in compliance

    Privileged Access Management (PAM) is essential for compliance and regulatory needs. PAM solutions offer detailed control over privileged accounts, enforce robust security, and provide auditing and monitoring. Discover how PAM aids in regulation compliance and data protection. Read the e-book for more.

    Download

  • Examining Identity and Access Management's Function in Healthcare

    Identity and access management is a crucial component of any healthcare organization's security strategy.

    Download

  • CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa

    Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?

    Download

  • Overcoming the power distribution hurdle in dense data centers

    Discover in this case study how Panduit’s Overhead Power Distribution System helped UI Health overcome the power distribution and server hardware challenges that many data centers are facing today.

    Download

  • Focus ASEAN: Security & Digital Transformation

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

    Download

  • Transform your contact centers with top AI & cloud tech

    Discover how ConnectIV CX, a revolutionary contact center solution by InterVision, leverages cutting-edge AI/ML, cloud flexibility, and customer-centric design to transform the contact center experience. Learn more by reading the full blog post.

    Download

  • Threat management: Essential guide

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

    Download

  • SASE: How to establish a unified data protection policy

    According to Gartner, a cloud access security broker (CASB) is an on-premises or cloud-based security policy enforcement point, which is designed to combine and interject enterprise security policies as cloud-based resources are accessed. Access this resource to learn how you can achieve a unified data protection policy approach.

    Download

  • Facebook's leaked documents and tech in party manifestos

    In this week's episode we discuss the about 7,000 leaked facebook documentes. It reveals how Facebook used and abused developers, cut off data to competitors, gave privileged access to its friends and used a "pivot to privacy" as camouflage. The team also talks about party manifestos in wake of the upcoming election.

    Download

  • Data governance for all seasons and reasons

    To promote business buy-in and avoid resistance to governance policies, programs should be business-driven, with data owners involved and the data governance committee making the decisions on standards, policies and rules. This infographic highlights some of the best practices for implementing and managing data governance programs.

    Download

  • Cyber Security 2016 and beyond

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

    Download

  • Why 85% of organizations worry about cloud security in 2024

    Discover in this product overview how using Red Hat Enterprise Linux as your operating foundation across environments can help you create the consistency needed to maintain security and compliance in the cloud.

    Download

  • Eliminate Shadow IT threats in your organization: A practical guide

    Unapproved tools put organizations at risk. Learn how to govern, identify, protect, detect, respond, and recover from shadow IT. Read this white paper for a comprehensive plan to shed light on the shadows – also inside, find a self-assessment quiz that helps you determine your risk factor.

    Download

  • Your Guide to Zero-Trust Security

    Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.

    Download

  • Managing the risk of third-party identities

    The efficiency demanded by modern business has led organizations to enlist more third-party workers than ever before. This KuppingerCole report looks at the options available for managing non-employee and other third-party identities, including a technical review of SailPoint’s Non-Employee Risk Management solution. Read on to learn more.

    Download

  • How to modernize your data center networking

    When modernizing your data center networking, you should keep 3 considerations in mind: sustainable networking, artificial intelligence and 1 more. To unpack those considerations, and to understand how Cisco and the Nexus 9000 Series can support your networking transformation, watch this webcast.

    Download

  • Vendor-neutral MSP revolutionizes staffing ops & cost management

    Combining data analytics, workforce strategy, and recruitment into a technology-forward, total talent solution, AMN Healthcare prescriptively identified Temple Health’s staffing needs and created a foundation of data guidance and utilization to reallocate and balance their workforce.

    Download

  • Building a flexible workforce despite increased patient demand

    Combining data analytics, workforce strategy, and recruitment into a technology-forward, total talent solution, AMN Healthcare prescriptively identified Temple Health’s staffing needs and created a foundation of data guidance and utilization to reallocate and balance their workforce.

    Download

  • 22-point checklist for Active Directory security

    Because of Active Directory’s key role in Windows-based environments, it exists as a major target for threat actors. So, how can you level up your Active Directory security in the face of proliferating cyberattacks? Unlock guidance in this 22-point checklist.

    Download