Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk
By: IBM Line of Business View more from IBM Line of Business >>
Download this next:
Information Security Threats: Building Risk Resilience
By: TechTarget Security
Type: eGuide
Enterprises need an agile risk management strategy to deal with today’s evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
These are also closely related to: "Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk"
-
Managing Cloud Computing Risk
By: TechTarget Security
Type: eGuide
Despite attractive agility and cost saving benefits the cloud offers, its important to remember the cloud is not perfect, and we are reminded of this with recent cloud outages at Microsoft, Amazon and others. Have you done your best to reduce the risk of harm to your company in the event of a service interruption?
In this e-guide by SearchCloudSecurity.com, gain expert insight on how to manage the risk of cloud outages as well as uncover a framework you can implement for evaluating cloud computing risk.
-
Top IT security priorities: Addressing risk management and compliance
By: Dell Software
Type: eGuide
When TechTarget conducted its Annual Salary and Careers Survey, IT risk management and regulatory compliance emerged out of the myriad of enterprise security responsibilities as the most time-consuming.
The activities of identifying, measuring, and mitigating risk can eat up company time, and each industry has its own unique requirements for compliance – so coming up with an effective strategy for managing both can be a complex task.
In this expert e-guide, we explore the issues of IT risk management and compliance. You’ll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.
Find more content like what you just read:
-
Insuring the uninsurable: Is cyber insurance worth its salt?
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
-
Top Monitoring Tools to Help Meet Regulatory Compliance Standards
By: TechTarget Security
Type: eGuide
In this e-guide, gain expert insight on how to remain vigilant in meeting regulatory compliance standards, and uncover top compliance monitoring tools for financial institutions to meet their industry-specific regulations.
-
Reducing the Risks of Social Media
By: TechTarget Security
Type: eGuide
Social Media can enhance brand reputation, build connections with external customers, improve collaboration and more. However using social media also carries risks. Fortunately, this expert e-guide explores the potential identity, security and privacy threats associated with social media.
-
Infographic: Top 12 risk management skills
By: TechTarget ComputerWeekly.com
Type: Infographic
Risk management is a must for anyone who aspires to be a leader or manager. There is risk to be addressed at all business levels, and if a leader is unable to manage risk, their upward mobility will disappear. Here are some skills needed to be a successful risk manager.
-
E-Guide: VM in the Cloud
By: TechTarget Security
Type: eGuide
Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.
-
How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction
By: AT&T Cybersecurity
Type: White Paper
Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.
-
KX: Safety in Numbers
By: KX
Type: eBook
Access this e-book to learn how microsecond-fast, ever-present surveillance is the key to minimizing, mitigating and monetizing banking risk.
-
BFSI leader’s guide to third-party risk management
By: GEP
Type: White Paper
In order to manage third-party risks, it has become crucial for banking, financial services and insurance (BFSI) companies to develop a high level of risk resilience in the face of ongoing issues and disruption. Access this white paper to learn the best practices for doing so.
-
Translate cyber risk into terms that stakeholders understand
By: ThreatConnect
Type: White Paper
New Gartner research shows that 88% of board of directors’ regard cybersecurity as a business risk. This has led many to ask, “how do you translate business cyber risk into financial terms that stakeholders understand?” This white paper presents 4 ways to operationalize cyber risk quantification. Download now to learn more.
-
ThreatConnect Risk Quantifier (RQ)
By: ThreatConnect
Type: Data Sheet
Open this data sheet to learn how ThreatConnect RQ can help strengthen collaboration between all stakeholders by providing them with regularly updated results.
-
E-book: Reducing web app risks
By: Digital.ai
Type: eBook
Web applications enable financial services and e-commerce companies to offer faster, better online experiences – but they also expose the organization (and users) to new vulnerabilities. Read this e-book to learn more about the risks facing today’s web apps and how to mitigate them.
-
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
By: TechTarget ComputerWeekly.com
Type: Resource
Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
-
CW ANZ, July 2020: Expert Advice on Security
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
-
What a leading cybersecurity program looks like
By: AT&T Cybersecurity
Type: White Paper
In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.
-
Top 5 security approaches for financial services in 2022
By: F5 Inc.
Type: eBook
Since sensitive financial data is so highly valued by bad actors, financial services institutions need to take every precaution to ensure secure application development and deployment. Access this e-book to learn how to shrink the widening gap of potential security vulnerabilities.
-
How RPA can impact your financial department
By: UiPath
Type: White Paper
RPA is impacting the way business manage finances because it increases efficiency, reduces the need to outsource (and the security risks created by that), and can be easily deployed on top of your existing programs. Read on to learn about RPA and how your business can use it to improve your company’s financial department.
-
A Perfect Storm: Increasing At-Risk Contracted Lives & Decreasing Nursing Capacity—Building a Scalable Model for VBC
By: CareSignal
Type: Webcast
Identify the clinical and financial importance of managing the rising-risk portion of your population and best practices for building these cohorts. Describe how to sustainably operationalize care management teams to manage larger patient populations with scaling enrollment processes and automation
-
Cloud Management: Overcoming today’s Top Risks
By: TechTarget Security
Type: eGuide
Under a cloud paradigm, as services become more concentrated, risks follow suit, so it is important to understand and account for these changes and adjust security programs accordingly. View this e-guide to explore the top security risks in cloud computing today and how to overcome them.
-
Does your bank have vulnerable mobile apps?
By: Eclypses
Type: White Paper
In the financial services sector, the number of cyber risks is huge. While this is not new information, you would be surprised to know that while most have secure apps and networks, but a very large number do not shield their mobile apps. According to one study, almost 77% of financial apps have some kind of vulnerability. Read on to learn more.
-
Risk management is the beating heart of your cyber strategy
By: TechTarget ComputerWeekly.com
Type: eBook
In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.
-
Emerging PaaS security tactics
By: TechTarget Security
Type: eGuide
Like all other cloud deployments, PaaS introduces some security concerns because of underlying security features that are beyond the customer’s control. This e-guide explores these challenges and lists security areas that can affect the risk profile of deployed applications, as well as offers key advice for mitigating risk.
-
A Computer Weekly buyer's guide to managing paper processes
By: TechTarget ComputerWeekly.com
Type: eGuide
Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
-
Innovation on the public cloud is key to success!
By: F5 Inc.
Type: White Paper
As financial institutions advance their cloud strategies, be wary of running before learning to walk so as not to invite unneeded costs, operational disruption, or increased exposure to cyber risk. Access this white paper to learn how to develop a framework for financial services to utilize the cloud to support innovation at their companies.
-
Mobile device protection: tackling mobile device security risks
By: TechTarget Security
Type: eGuide
The proliferation of mobile devices into the enterprise has put mobile device security risks as a top priority for many organizations today. In this e-guide from SearchSecurity.com, gain expert insight on how to tackle mobile device security risks and explore why your current approach might need to be reevaluated.
-
5 building blocks for strengthening your IT security program
By: AT&T Cybersecurity
Type: White Paper
Given how rapidly cybersecurity threats emerge and change, it can be hard to keep up. Security leaders must be ready to build security programs that will take their operations to a whole new level of risk reduction— without hampering the flexibility and recovery offered by digital transformation in a post-pandemic business world.
-
A Computer Weekly buyer's guide to compliance, risk and governance
By: TechTarget ComputerWeekly.com
Type: eGuide
Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
-
Best practices for reporting risk
By: Tanium
Type: eBook
With cyber threats increasing, it’s vital for business leaders to understand and mitigate risks that could jeopardize their business. Download this guide to learn the importance of understanding risk as uncertainty about objectives and aligning risk measurements with the strategic objectives your company’s leadership team cares most about.
-
Business Leaders Need to Quickly Shift Focus to Industrial Cybersecurity
By: Nozomi Networks
Type: White Paper
To keep critical systems running and protect the financial results and reputation of your organization, it is essential to improve industrial cybersecurity. Without visibility and cybersecurity, customer and employee safety are at risk. Read on to uncover how you can actively monitor and secure OT networks.
-
Banking on Digital Risk
By: TIBCO
Type: White Paper
The financial services industry is experiencing challenges across multiple areas amid DX. Find out how to simplify the transformation process with TIBCO and their analytics, data management/operations, and connectivity capabilities in this white paper.
-
The Cost of OT Cybersecurity Incidents & How To Reduce Risk
By: Nozomi Networks
Type: EBRIEF
Cyberthreats targeting the industrial sector have grown 67% in the last five years, with costs reaching hundreds of millions of dollars. Read this e-brief for a deep-dive into the most prominent risks to OT security environments, as well as best practices for improving OT/IoT security and visibility – read on to get started.
-
Third-party risk management: Best practices
By: ProcessUnity
Type: Resource
Read this guide to understand the building blocks of third-party risk management (TPRM), the importance of residual risk, how to augment your team and steps to take for a more mature TPRM program.
-
What you don't know can hurt you: Expert advice on measuring risk
By: Tanium
Type: eBook
Managing risks begins with measuring risks. Inaccurate or incomplete measurements can lead to dire consequences. So, where do you start? In this e-book, 3 IT industry experts share their wisdom on the practice of measuring risk in the most practical, comprehensive, and actionable way. Download this e-book to get started.
-
Optimize your data agility with a universal repository
By: MarkLogic
Type: White Paper
Firms in financial services face two major problems today: data is in silos and data is complex. To remedy these issues, companies can implement a universal repository. Read this whitepaper to learn what you need to consider when building a universal repository and how it can increase productivity and improve data quality for your business.
-
Leverage Authorization to Overcome Authentication Challenges
By: Axiomatics
Type: White Paper
When authentication responds to users in an all-in or all-out fashion, businesses can face significant risk. For example, if an insider threat actor is granted full access to company resources, financial devastation can follow. Review this white paper to learn how leveraging authorization can prevent such a scenario.
-
Automated payment operations: Benefits & challenges
By: Modern Treasury
Type: Research Content
98% of financial decision-makers claim that automated payment operations would reap benefits for their businesses, according to a recent Modern Treasury report. Is your organization considering adopting an automated payment system? To understand the upsides to and challenges of doing so, examine this report.
-
How Esse Health Built a Scalable Model for Value-based Care and Increased Health Equity with Deviceless Remote Patient Monitoring
By: CareSignal
Type: Webcast
How can executive leaders deliver enterprise-wide virtual care solutions to high and rising-risk patients to improve clinical and financial outcomes? Hear from Esse Health's leadership to learn how Deviceless Remote Patient Monitoring has helped them face and overcome those challenges, including recent staffing shortages.
-
How CPM Software Points to Future Financial Risks and Opportunities
By: TechTarget HR Software
Type: eGuide
This expert e-guide from SearchFinancialApplications.com discusses why corporate performance management (CPM) software has become a financial planning necessity.
-
CISSP Exam Guide Chapter 1 sample download
By: McGraw Hill
Type: White Paper
In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
-
Eguide: Top 10 risks in cloud computing and how to stay compliant
By: TechTarget Security
Type: eGuide
Transitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing.
-
The Rise of ESG In Third-Party Risk Management
By: ProcessUnity
Type: White Paper
91% of companies take sustainability into account when making purchasing decisions, according to EcoVadis. Access this white paper to discover key tools you can use to evaluate third-party companies in terms of ESG risk.
-
The Economic Effects of Digital.ai Agility
By: Digital.ai
Type: Analyst Report
Tap into Forrester's key findings regarding Digital.ai Agility's risks, costs, and benefits in this analyst report.
-
Build A Modern Core Banking Platform
By: Red Hat
Type: Data Sheet
Financial institutions must quickly modernize their core banking systems or risk becoming a relic of the past compared to today’s fast-moving fintechs. This briefing details what the characteristics of a modern core banking platform are and explains how Red Hat and Intel can help make it a reality for your organization. Access the brief here.
-
Manage your M&A risk with endpoint visibility
By: Tanium
Type: White Paper
To optimally manage cyber risk in the mergers and acquisitions process, acquiring organizations need a rapid, accurate way to map all the endpoint assets in a target company. Read about how this is done in Managing M&A Risk: How Endpoint Visibility Can Deliver Critical Advantages.
-
Struggling to measure and monitor cyber risk?
By: Tanium
Type: Analyst Report
Data from this Harvard Business Review Pulse Survey, commissioned by Tanium, illuminates how effective cyber-risk oversight is hampered by the mutual shortage of knowledge between executives and cybersecurity leaders. Read the report to learn from top executives and analyze the data for yourself.
-
5 uses for RPA in financial services
By: Ten10
Type: White Paper
This white paper takes a closer look at 5 ways RPA can help financial institutions avoid risk and increase efficiency. Download now to learn more.
-
Threat management: Essential guide
By: TechTarget ComputerWeekly.com
Type: eGuide
Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
-
A story about being lean, sustainable, and successful
By: Minitab
Type: Case Study
All businesses are looking for ideas to boost productivity and profitability. For companies specifically looking for ways to improve and innovate, there is a platform that provides problem-solving tools, and project management methodologies that will show you an ROI in just a short time. Read on to learn more about it.