You've requested...

Download this next:

12 top enterprise risk management trends in 2023

Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change.

Executives recognize that stronger ERM programs are required to remain competitive in this new era. One aspect of the current risk landscape that companies must contend with is the connectivity of risks.

Businesses are increasingly more interconnected to partners, vendors and suppliers across global markets. As a result, the impact, for example, of a local natural disaster, the ongoing war in the Ukraine or high interest rates can cascade across an entire global supply chain.

Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.

These are also closely related to: "Introducing AppManager 6.0"

  • Focus: how to avoid being hit by ransomware

    The global ransomware attack of May 2017 that affected more than 200,000 computers in over 150 countries shocked many business and political leaders – not least in the UK, where parts of the National Health Service were forced to restrict operations and turn away patients.

    But the scale of the attack came as less of a surprise to IT and information security experts, who have been predicting an incident of this severity for a long time.

    Will the rapid spread of the WannaCry exploit finally be a wake-up call to organisations to take cyber security more seriously? Only time will tell – but there are no more excuses for not being prepared for further ransomware threats.

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software. 

  • A Computer Weekly buyer's guide to managing paper processes

    Modern paper processes are ripping up the rule book. In this 13-page buyer’s guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.

Find more content like what you just read:

  • Infographic: 5 questions to ask when creating a ransomware recovery plan

    Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.

    Download

  • Global Risks Report 2017

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

    Download

  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.

    Download

  • Remediating IT vulnerabilities: Quick hits for risk prioritization

    There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.

    Download

  • E-Guide: Best practices for pen testing Web applications

    This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.

    Download

  • E-Guide: VM in the Cloud

    Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.

    Download

  • Royal Holloway: Driverless vehicle security for military applications

    Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.

    Download

  • Step-by-step disaster recovery planning guide

    IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.

    Download

  • Targeted attacks: Preparation and Mitigation

    This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.

    Download

  • Managing Cloud Computing Risk

    Have you done your best to reduce the risk of harm to your company in the event of a service interruption? In this e-guide by SearchCloudSecurity.com, gain expert insight on how to manage the risk of cloud outages as well as uncover a framework you can implement for evaluating cloud computing risk.

    Download

  • To hack back or not to hack back ...

    This e-guide discusses hacking back as a viable option to combat hacking attempts. Expert Kevin Beaver discusses the merits and drawbacks of an "offense is the best defense" approach to security and how to implement more permanent security tools moving forward.

    Download

  • CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa

    Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?

    Download

  • Threat prevention techniques: How to build a strong network

    Consult this expert E-Guide to learn how you can develop best practices for threat management and how you can build a strong network. Find out tips from the experts on how you can build a foundation for complete threat protect ion by consulting this guide now.

    Download

  • How MDM and the Consumerization of IT are Reshaping IT Decision-Making

    Access this white paper to learn why your organization needs to start integrating IT consumerization and BYOD into its business – and how to get there.

    Download

  • Proactive security measures: How to prevent malware attacks

    Read this expert E-guide to find out what new malware threats can mean for your business. Learn how to stop the malware inside your network and other key tips to evolving your security in order to combat dangerous new forms of malware by consulting this resource.

    Download

  • Threat management: Essential guide

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

    Download

  • Disaster recovery and business continuity: Essential guide

    Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.

    Download

  • Internal Controls Checklist for Corporate Data Protection and Compliance

    In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.

    Download

  • Achieve risk-based vulnerability management

    Information overload challenges from data and threats can overwhelm cybersecurity professionals, causing many to unwisely skip vulnerability mitigation. Consequently, some organizations are operating at unacceptably high levels of risk. Read this guide to understand the framework of a modern, risk-based vulnerability management program.

    Download

  • How Can You Avoid a Web Security Breach? It's All in the Preparation

    In this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.

    Download

  • Ask the experts: Discover how to handle external security auditors

    A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.

    Download

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

    Download

  • Object Storage 101

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.

    Download

  • Information Security Threats: Building Risk Resilience

    Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.

    Download

  • Are we trusting social networks too much?

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

    Download

  • Focus: Securing for the future

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

    Download

  • What a leading cybersecurity program looks like

    In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.

    Download

  • How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction

    Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.

    Download

  • Top IT security priorities: Addressing risk management and compliance

    In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

    Download

  • Cyber Security 2016 and beyond

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

    Download

  • Infographic: Top 12 risk management skills

    Risk management is a must for anyone who aspires to be a leader or manager. There is risk to be addressed at all business levels, and if a leader is unable to manage risk, their upward mobility will disappear. Here are some skills needed to be a successful risk manager.

    Download

  • E-Guide: Remediating IT vulnerabilities: Expert Tips

    This expert E-Guide uncovers 3 quick ways you can remediate IT vulnerabilities and discusses best practices for improved vulnerability management.

    Download

  • Infographic: 5 essential open source cybersecurity tools for 2022

    There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.

    Download

  • Computer Weekly – 24 January 2017: World leaders discuss risks of social unrest from advances in technology

    In this week's Computer Weekly, we examine the fears raised at the World Economic Forum over the potential for social unrest as technology transforms working practices. We hear from the CIO at the World Health Organization about how IT helped tackle the Ebola crisis. And we look at progress in adopting big data analytics. Read the issue now.

    Download

  • MITRE ATT&CK, a guide for businesses in 2022

    Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.

    Download

  • Risk management is the beating heart of your cyber strategy

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

    Download

  • Five Tips to Improve a Threat and Vulnerability Management Program

    Access this e-guide for 5 expert tips to improve the effectiveness of an enterprise threat and vulnerability management program.

    Download

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

    Download

  • Check the network before moving to the cloud

    Before considering a move to the cloud, it’s important to ensure that your network is free of vulnerabilities that could put your data at risk. This expert resource offers tips on how to make sure your network is secure before extending the network infrastructure. View now to uncover key processes and tools to help detect configuration mistakes.

    Download

  • SAAS Vulnerability Management: Choosing a Cloud-Based Service Provider

    This expert guide from SearchSecurity.com examines how to decide if SaaS vulnerability management is right for your organization and provides helpful tips for finding the right option for your environment.

    Download

  • The Importance of End-User Experience to Video Collaboration Success

    This E-Guide from SearchUnifiedCommunications.com explores how to calculate the value of video collaboration and why measuring end-user experience is so vital.

    Download

  • Traditional vs. enterprise risk management: How do they differ?

    Businesses understand they cannot exist in a risk-free environment. How to manage the risks they face depends on many variables, including the industry the business is in and its size. In this e-guide, we compare traditional risk management and enterprise risk management and outline the important differences between the two.

    Download

  • New privacy laws are coming, first stop California

    The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.

    Download

  • Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities

    Expert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.

    Download

  • eGuide: Information Security - Buyer's Guide to Messaging Security

    Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.

    Download

  • CW APAC - March 2020: Expert Advice: Security Operations Centre

    In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.

    Download

  • Infographic: 2019 IT Priorities - Middle East

    In this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East.

    Download