You've requested...

Download this next:

12 top enterprise risk management trends in 2023

Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change.

Executives recognize that stronger ERM programs are required to remain competitive in this new era. One aspect of the current risk landscape that companies must contend with is the connectivity of risks.

Businesses are increasingly more interconnected to partners, vendors and suppliers across global markets. As a result, the impact, for example, of a local natural disaster, the ongoing war in the Ukraine or high interest rates can cascade across an entire global supply chain.

Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.

These are also closely related to: "VigilEnt Policy Center 4.2 Trial"

  • Are we trusting social networks too much?

    User privacy and commercial profit are in an ongoing battle. Social networks engage in extensive information collection, analysis and storage and users have no control over such data collection practices.

    Most social network users will never read the policies provided by social networks, yet are showing an increased desire for better privacy.

    This article examines the main flaws in the privacy policies of Facebook, Twitter, LinkedIn and Google+/Google that may put user privacy at risk. To some, these flaws may present the appearance that ever-increasing profits override concerns for privacy.

  • Financial markets regulatory outlook 2017

    The regulatory outlook for financial services firms in 2017 will be determined by a number of factors. Firms continue to be challenged by the introduction of regulations, continued macro-policy uncertainty and digital disruption from new technologies.

    Fintech and regtech

    • In 2017, fintech will continue to change the industry, along with artificial intelligence (AI) and data analytics. Innovative entrants will find greater support from regulators, but those regulators will become increasingly vigilant about the risks that they pose.

    • In payments, PSD2 presents many business opportunities. However, the lack of specificity in some of its provisions could complicate its implementation for fintechs and retail banks.

    • Elsewhere, regtech promises to push down costs, rein in compliance risk and improve controls. However, its adoption will remain gradual this year. Effective implementation of such solutions will require significant up-front investment and firms will need to demonstrate that this will create valuable business returns, especially in the trickier commercial conditions that are set to continue in 2017.

    • A number of recent high-profile attacks on firms have encouraged supervisors to increase their focus on the cyber resilience of the financial sector. In 2017, supervisory expectations will evolve to include more detailed response planning for cyber breaches and clearer responsibilities among management and boards. Firms will increasingly use testing, war-gaming and red-team exercises to demonstrate the robustness of their resilience plans to public authorities.

    Persistently low and volatile interest rates have also seen greater pressure on profitability, despite being a decade on since the origins of the financial crisis. Looking ahead, it is clear that many financial services firms must steer a course into 2017’s uncertain winds by taking decisive and, in some cases, bold actions to adapt to an increasingly challenging environment.

Find more content like what you just read:

  • Focus: how to avoid being hit by ransomware

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

    Download

  • A Computer Weekly buyer's guide to managing paper processes

    Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.

    Download

  • Infographic: 5 questions to ask when creating a ransomware recovery plan

    Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.

    Download

  • The cybersecurity balancing act: How to prepare for the unpredictable

    Cybersecurity is, at its most essential core, a balancing act, requiring constant study and vigilance of past trends while maintaining an awareness that anything is possible. Access this analyst report to cultivate your understanding of the current threat landscape and stay prepared for the uncertainties of cybersecurity.

    Download

  • Global Risks Report 2017

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

    Download

  • Disaster recovery and business continuity: Essential guide

    Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.

    Download

  • Eliminate your API vulnerabilities with Cequence Unified API Protection

    Today’s security teams simply lack the visibility and defense capabilities they need to protect the ever-growing risk from APIs and other application connections. Check out this data sheet to see how the Cequence Unified API Protection solution can reinforce the vulnerabilities that may undermine your organization.

    Download

  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.

    Download

  • How SASE can protect your digital assets

    Between skyrocketing amounts of data and the IT skills shortage, organizations encounter significant obstacles on their path toward securing their digital assets. Along with digging into those challenges, this white paper explores how businesses can surmount them with SASE. Keep reading to unlock these insights.

    Download

  • 7 key factors for effective PKI management

    Managing a legacy PKI is like running a marathon with your legs tied. And like a marathon, managing a legacy PKI is a grueling test of endurance that requires a robust strategy, skilled expertise, and constant vigilance. In this webinar, you’ll gain practical tips about the tools you need for effective PKI management. Tune in to learn more.

    Download

  • Compliance Field Guide: Reducing Costs in an Increasingly Regulated World

    This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.

    Download

  • Infographic: 6 information governance best practices

    Information governance can streamline an organization's data management, cut storage costs and ensure compliance, which are all critical for content management. Best practices, such as forming a committee, accounting for collaboration tools and creating reports, can guide the way.

    Download

  • Today's attacks target people, not just technology

    Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.

    Download

  • New privacy laws are coming, first stop California

    The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.

    Download

  • 2 ways to boost employee productivity & cut HR costs

    How can you balance productivity, retention and performance to drive growth, while lowering cost to serve? Read this ebook to see how you can improve productivity and business performance by streamlining employee experiences with the ServiceNow platform.

    Download

  • How AI is changing the way data centers are designed

    Artificial intelligence (AI) deployments are taking up an increasingly large portion of data center workloads. This paper explains relevant attributes and trends of AI workloads and describes the resulting data center challenges, including Guidance for how to address these challenges. Read on to learn more.

    Download

  • Top Health IT Analytics Forecasts and Goals for the Coming Year

    Health IT analytics and artificial intelligence experts say that healthcare organizations should focus on AI governance, transparency, and collaboration in 2024.

    Download

  • How to remediate SOC, workforce, & network blind spots

    Companies that use more than 50 tools are 8% less effective in detecting attacks and put a significant strain on security operations centers (SOCs) with endless alerts. Access this infographic to learn how to steer clear of security blind spots plaguing your company, with guidance for SOCs on how to catch and remediate said blind spots.

    Download

  • Royal Holloway: Driverless vehicle security for military applications

    Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.

    Download

  • Step-by-step disaster recovery planning guide

    IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.

    Download

  • 7 free GRC tools for compliance professionals

    All organisations need to meet a variety of regulatory compliance requirements, such as General Data Protection Regulation (GDPR), but they don't all have the budget for GRC software. In this e-guide, learn about the free, open source options.

    Download

  • 5 endpoint security best practices

    With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To get started writing a policy customized for your company, here are five universal endpoint security best practices to consider.

    Download

  • How Oversight helped White Cap fight fraud

    White Cap Construction Supply distributes construction materials to contractors across 450 branches. With so much infrastructure comes an equally large quantity of data. Read the case study now to learn how Oversight helped White Cap tighten up procure-to-pay operations and fight fraud.

    Download

  • To hack back or not to hack back ...

    This e-guide discusses hacking back as a viable option to combat hacking attempts. Expert Kevin Beaver discusses the merits and drawbacks of an "offense is the best defense" approach to security and how to implement more permanent security tools moving forward.

    Download

  • Prepare to meet evolving risk and compliance mandates

    To meet government disclosure mandates, firms require integrated risk and security programs. With a centralized platform, ServiceNow helps identify threats, contain incidents, ensure compliance, and report material events within required timeframes. Case. Read more about how ServiceNow enables robust risk management and expedites reporting.

    Download

  • Examining Identity and Access Management's Function in Healthcare

    Identity and access management is a crucial component of any healthcare organization's security strategy.

    Download

  • Take a strategic approach to IAM for Atlassian Cloud

    Businesses must proactively address IAM for cloud apps to enable secure collaboration. This white paper explores extending enterprise IAM to Atlassian Cloud. With Atlassian Access, admins can enforce policies, manage users, and audit across products. Read the white paper to learn how global companies scaled IAM in the cloud.

    Download

  • CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa

    Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?

    Download

  • Privacy impact assessments: 8 best practices for compliance

    Privacy impact assessments (PIAs) are essential for organizations to manage risks to personal data rights. The process, however, has become increasingly intricate due to diverse privacy regulations. This white paper delves into 8 essential PIA considerations to ensure compliance and reduce risk. Read on to gain practical PIA compliance guidance.

    Download

  • Overcoming the power distribution hurdle in dense data centers

    Discover in this case study how Panduit’s Overhead Power Distribution System helped UI Health overcome the power distribution and server hardware challenges that many data centers are facing today.

    Download

  • Focus ASEAN: Security & Digital Transformation

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

    Download

  • SASE: How to establish a unified data protection policy

    According to Gartner, a cloud access security broker (CASB) is an on-premises or cloud-based security policy enforcement point, which is designed to combine and interject enterprise security policies as cloud-based resources are accessed. Access this resource to learn how you can achieve a unified data protection policy approach.

    Download

  • How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction

    Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.

    Download

  • Facebook's leaked documents and tech in party manifestos

    In this week's episode we discuss the about 7,000 leaked facebook documentes. It reveals how Facebook used and abused developers, cut off data to competitors, gave privileged access to its friends and used a "pivot to privacy" as camouflage. The team also talks about party manifestos in wake of the upcoming election.

    Download

  • Threat management: Essential guide

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

    Download

  • Data governance for all seasons and reasons

    To promote business buy-in and avoid resistance to governance policies, programs should be business-driven, with data owners involved and the data governance committee making the decisions on standards, policies and rules. This infographic highlights some of the best practices for implementing and managing data governance programs.

    Download

  • A New World of Workplace Assistance

    Large language models (LLMs) like ChatGPT offer revolutionary potential for data-driven decisions. However, concerns loom over data privacy and accuracy. This e-book advocates leveraging virtual agents as gatekeepers to LLMs. Instead of outright bans, virtual agents can verify policy adherence around LLM use. Read on to learn how.

    Download

  • How to slash cloud costs while boosting data security

    Two goals that compete for a CISO’s attention are reducing cloud costs and leveling up data security. So, is it possible to accomplish both goals? Yes, argues this white paper. Read on to unlock guidance.

    Download

  • Your Guide to Zero-Trust Security

    Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.

    Download

  • Eliminate Shadow IT threats in your organization: A practical guide

    Unapproved tools put organizations at risk. Learn how to govern, identify, protect, detect, respond, and recover from shadow IT. Read this white paper for a comprehensive plan to shed light on the shadows – also inside, find a self-assessment quiz that helps you determine your risk factor.

    Download

  • Practical guidance for securing SaaS data on Workday

    Workday is a popular software as a service (SaaS) solution used by many organizations. This guide provides an overview of Workday, aiming to equip security professionals with a solid understanding of Workday’s unique risks. Read on to learn more.

    Download

  • Achieve risk-based vulnerability management

    Information overload challenges from data and threats can overwhelm cybersecurity professionals, causing many to unwisely skip vulnerability mitigation. Consequently, some organizations are operating at unacceptably high levels of risk. Read this guide to understand the framework of a modern, risk-based vulnerability management program.

    Download

  • Cyber Security 2016 and beyond

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

    Download

  • Combatting IoT challenges brought on by digital transformation

    The widespread digital transformation has given rise to the internet of things (IoT). With so many devices in play, endpoint security is of the utmost importance, with little to no room for error. This data sheet looks at how Palo Alto aims to solve the IoT problem. Access the full data sheet to learn how you could secure your IoT network.

    Download

  • Managing the risk of third-party identities

    The efficiency demanded by modern business has led organizations to enlist more third-party workers than ever before. This KuppingerCole report looks at the options available for managing non-employee and other third-party identities, including a technical review of SailPoint’s Non-Employee Risk Management solution. Read on to learn more.

    Download

  • Building a flexible workforce despite increased patient demand

    Combining data analytics, workforce strategy, and recruitment into a technology-forward, total talent solution, AMN Healthcare prescriptively identified Temple Health’s staffing needs and created a foundation of data guidance and utilization to reallocate and balance their workforce.

    Download

  • Vendor-neutral MSP revolutionizes staffing ops & cost management

    Combining data analytics, workforce strategy, and recruitment into a technology-forward, total talent solution, AMN Healthcare prescriptively identified Temple Health’s staffing needs and created a foundation of data guidance and utilization to reallocate and balance their workforce.

    Download