You've requested...

Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk

If a new window did not open, click here to view this asset.

Download this next:

Information Security Threats: Building Risk Resilience

Enterprises need an agile risk management strategy to deal with today’s evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.

These are also closely related to: "Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk"

  • Managing Cloud Computing Risk

    Despite attractive agility and cost saving benefits the cloud offers, its important to remember the cloud is not perfect, and we are reminded of this with recent cloud outages at Microsoft, Amazon and others. Have you done your best to reduce the risk of harm to your company in the event of a service interruption?

    In this e-guide by SearchCloudSecurity.com, gain expert insight on how to manage the risk of cloud outages as well as uncover a framework you can implement for evaluating cloud computing risk.

  • Top IT security priorities: Addressing risk management and compliance

    When TechTarget conducted its Annual Salary and Careers Survey, IT risk management and regulatory compliance emerged out of the myriad of enterprise security responsibilities as the most time-consuming.

    The activities of identifying, measuring, and mitigating risk can eat up company time, and each industry has its own unique requirements for compliance – so coming up with an effective strategy for managing both can be a complex task.

    In this expert e-guide, we explore the issues of IT risk management and compliance. You’ll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

Find more content like what you just read:

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

    Download

  • Top Monitoring Tools to Help Meet Regulatory Compliance Standards

    In this e-guide, gain expert insight on how to remain vigilant in meeting regulatory compliance standards, and uncover top compliance monitoring tools for financial institutions to meet their industry-specific regulations.

    Download

  • Reducing the Risks of Social Media

    Social Media can enhance brand reputation, build connections with external customers, improve collaboration and more. However using social media also carries risks. Fortunately, this expert e-guide explores the potential identity, security and privacy threats associated with social media.

    Download

  • Infographic: Top 12 risk management skills

    Risk management is a must for anyone who aspires to be a leader or manager. There is risk to be addressed at all business levels, and if a leader is unable to manage risk, their upward mobility will disappear. Here are some skills needed to be a successful risk manager.

    Download

  • E-Guide: VM in the Cloud

    Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.

    Download

  • How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction

    Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.

    Download

  • KX: Safety in Numbers

    Access this e-book to learn how microsecond-fast, ever-present surveillance is the key to minimizing, mitigating and monetizing banking risk.

    Download

  • BFSI leader’s guide to third-party risk management

    In order to manage third-party risks, it has become crucial for banking, financial services and insurance (BFSI) companies to develop a high level of risk resilience in the face of ongoing issues and disruption. Access this white paper to learn the best practices for doing so.

    Download

  • Translate cyber risk into terms that stakeholders understand

    New Gartner research shows that 88% of board of directors’ regard cybersecurity as a business risk. This has led many to ask, “how do you translate business cyber risk into financial terms that stakeholders understand?” This white paper presents 4 ways to operationalize cyber risk quantification. Download now to learn more.

    Download

  • ThreatConnect Risk Quantifier (RQ)

    Open this data sheet to learn how ThreatConnect RQ can help strengthen collaboration between all stakeholders by providing them with regularly updated results.

    Download

  • E-book: Reducing web app risks

    Web applications enable financial services and e-commerce companies to offer faster, better online experiences – but they also expose the organization (and users) to new vulnerabilities. Read this e-book to learn more about the risks facing today’s web apps and how to mitigate them.

    Download

  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.

    Download

  • CW ANZ, July 2020: Expert Advice on Security

    In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.

    Download

  • What a leading cybersecurity program looks like

    In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.

    Download

  • Top 5 security approaches for financial services in 2022

    Since sensitive financial data is so highly valued by bad actors, financial services institutions need to take every precaution to ensure secure application development and deployment. Access this e-book to learn how to shrink the widening gap of potential security vulnerabilities.

    Download

  • How RPA can impact your financial department

    RPA is impacting the way business manage finances because it increases efficiency, reduces the need to outsource (and the security risks created by that), and can be easily deployed on top of your existing programs. Read on to learn about RPA and how your business can use it to improve your company’s financial department.

    Download

  • A Perfect Storm: Increasing At-Risk Contracted Lives & Decreasing Nursing Capacity—Building a Scalable Model for VBC

    Identify the clinical and financial importance of managing the rising-risk portion of your population and best practices for building these cohorts. Describe how to sustainably operationalize care management teams to manage larger patient populations with scaling enrollment processes and automation

    Download

  • Cloud Management: Overcoming today’s Top Risks

    Under a cloud paradigm, as services become more concentrated, risks follow suit, so it is important to understand and account for these changes and adjust security programs accordingly. View this e-guide to explore the top security risks in cloud computing today and how to overcome them.

    Download

  • Does your bank have vulnerable mobile apps?

    In the financial services sector, the number of cyber risks is huge. While this is not new information, you would be surprised to know that while most have secure apps and networks, but a very large number do not shield their mobile apps. According to one study, almost 77% of financial apps have some kind of vulnerability. Read on to learn more.

    Download

  • Risk management is the beating heart of your cyber strategy

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

    Download

  • Emerging PaaS security tactics

    Like all other cloud deployments, PaaS introduces some security concerns because of underlying security features that are beyond the customer’s control. This e-guide explores these challenges and lists security areas that can affect the risk profile of deployed applications, as well as offers key advice for mitigating risk.

    Download

  • A Computer Weekly buyer's guide to managing paper processes

    Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.

    Download

  • Innovation on the public cloud is key to success!

    As financial institutions advance their cloud strategies, be wary of running before learning to walk so as not to invite unneeded costs, operational disruption, or increased exposure to cyber risk. Access this white paper to learn how to develop a framework for financial services to utilize the cloud to support innovation at their companies.

    Download

  • Mobile device protection: tackling mobile device security risks

    The proliferation of mobile devices into the enterprise has put mobile device security risks as a top priority for many organizations today. In this e-guide from SearchSecurity.com, gain expert insight on how to tackle mobile device security risks and explore why your current approach might need to be reevaluated.

    Download

  • 5 building blocks for strengthening your IT security program

    Given how rapidly cybersecurity threats emerge and change, it can be hard to keep up. Security leaders must be ready to build security programs that will take their operations to a whole new level of risk reduction— without hampering the flexibility and recovery offered by digital transformation in a post-pandemic business world.

    Download

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

    Download

  • Best practices for reporting risk

    With cyber threats increasing, it’s vital for business leaders to understand and mitigate risks that could jeopardize their business. Download this guide to learn the importance of understanding risk as uncertainty about objectives and aligning risk measurements with the strategic objectives your company’s leadership team cares most about.

    Download

  • Business Leaders Need to Quickly Shift Focus to Industrial Cybersecurity

    To keep critical systems running and protect the financial results and reputation of your organization, it is essential to improve industrial cybersecurity. Without visibility and cybersecurity, customer and employee safety are at risk. Read on to uncover how you can actively monitor and secure OT networks.

    Download

  • Banking on Digital Risk

    The financial services industry is experiencing challenges across multiple areas amid DX. Find out how to simplify the transformation process with TIBCO and their analytics, data management/operations, and connectivity capabilities in this white paper.

    Download

  • The Cost of OT Cybersecurity Incidents & How To Reduce Risk

    Cyberthreats targeting the industrial sector have grown 67% in the last five years, with costs reaching hundreds of millions of dollars. Read this e-brief for a deep-dive into the most prominent risks to OT security environments, as well as best practices for improving OT/IoT security and visibility – read on to get started.

    Download

  • Third-party risk management: Best practices

    Read this guide to understand the building blocks of third-party risk management (TPRM), the importance of residual risk, how to augment your team and steps to take for a more mature TPRM program.

    Download

  • What you don't know can hurt you: Expert advice on measuring risk

    Managing risks begins with measuring risks. Inaccurate or incomplete measurements can lead to dire consequences. So, where do you start? In this e-book, 3 IT industry experts share their wisdom on the practice of measuring risk in the most practical, comprehensive, and actionable way. Download this e-book to get started.

    Download

  • Optimize your data agility with a universal repository

    Firms in financial services face two major problems today: data is in silos and data is complex. To remedy these issues, companies can implement a universal repository. Read this whitepaper to learn what you need to consider when building a universal repository and how it can increase productivity and improve data quality for your business.

    Download

  • Leverage Authorization to Overcome Authentication Challenges

    When authentication responds to users in an all-in or all-out fashion, businesses can face significant risk. For example, if an insider threat actor is granted full access to company resources, financial devastation can follow. Review this white paper to learn how leveraging authorization can prevent such a scenario.

    Download

  • Automated payment operations: Benefits & challenges

    98% of financial decision-makers claim that automated payment operations would reap benefits for their businesses, according to a recent Modern Treasury report. Is your organization considering adopting an automated payment system? To understand the upsides to and challenges of doing so, examine this report.

    Download

  • How Esse Health Built a Scalable Model for Value-based Care and Increased Health Equity with Deviceless Remote Patient Monitoring

    How can executive leaders deliver enterprise-wide virtual care solutions to high and rising-risk patients to improve clinical and financial outcomes? Hear from Esse Health's leadership to learn how Deviceless Remote Patient Monitoring has helped them face and overcome those challenges, including recent staffing shortages.

    Download

  • How CPM Software Points to Future Financial Risks and Opportunities

    This expert e-guide from SearchFinancialApplications.com discusses why corporate performance management (CPM) software has become a financial planning necessity.

    Download

  • CISSP Exam Guide Chapter 1 sample download

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

    Download

  • Eguide: Top 10 risks in cloud computing and how to stay compliant

    Transitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing.

    Download

  • The Rise of ESG In Third-Party Risk Management

    91% of companies take sustainability into account when making purchasing decisions, according to EcoVadis. Access this white paper to discover key tools you can use to evaluate third-party companies in terms of ESG risk.

    Download

  • The Economic Effects of Digital.ai Agility

    Tap into Forrester's key findings regarding Digital.ai Agility's risks, costs, and benefits in this analyst report.

    Download

  • Build A Modern Core Banking Platform

    Financial institutions must quickly modernize their core banking systems or risk becoming a relic of the past compared to today’s fast-moving fintechs. This briefing details what the characteristics of a modern core banking platform are and explains how Red Hat and Intel can help make it a reality for your organization. Access the brief here.

    Download

  • Manage your M&A risk with endpoint visibility

    To optimally manage cyber risk in the mergers and acquisitions process, acquiring organizations need a rapid, accurate way to map all the endpoint assets in a target company. Read about how this is done in Managing M&A Risk: How Endpoint Visibility Can Deliver Critical Advantages.

    Download

  • Struggling to measure and monitor cyber risk?

    Data from this Harvard Business Review Pulse Survey, commissioned by Tanium, illuminates how effective cyber-risk oversight is hampered by the mutual shortage of knowledge between executives and cybersecurity leaders. Read the report to learn from top executives and analyze the data for yourself.

    Download

  • 5 uses for RPA in financial services

    This white paper takes a closer look at 5 ways RPA can help financial institutions avoid risk and increase efficiency. Download now to learn more.

    Download

  • Threat management: Essential guide

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

    Download

  • A story about being lean, sustainable, and successful

    All businesses are looking for ideas to boost productivity and profitability. For companies specifically looking for ways to improve and innovate, there is a platform that provides problem-solving tools, and project management methodologies that will show you an ROI in just a short time. Read on to learn more about it.

    Download