Automating GRC processes to improve business growth
By: ServiceNow View more from ServiceNow >>
Download this next:
Improve risk management by connecting business & IT
By: ServiceNow
Type: White Paper
Organisations that invest in resilience during times of uncertainty are better able to seize opportunity when it arises. In this eBook, discover how you can optimise operations, reduce costs and risk and boost resilience by connecting business and IT on a single platform. Learn more about Integrated Risk Management from ServiceNow in this ebook.
These are also closely related to: "Automating GRC processes to improve business growth"
-
Aligning risk & service models for operational resilience
By: ServiceNow
Type: White Paper
This whitepaper outlines aligning your entity hierarchy with CMDB and CSDM for effective risk management. It details four maturity levels—tactical to resilient—broadening the risk scope. Learn to define entities, types, and classes for managing risk, with hierarchy examples from basic to complex. The paper shows how ServiceNow's Integrated Risk Management meets organizations at their maturity and helps progress to advanced risk sophistication. Read to build a robust framework aligned with business services and infrastructure.
-
Meet the GRC challenges of the cloud head-on
By: Dell Software
Type: eGuide
The winds of change are blowing, and everyone seems to be moving their data to the cloud. While this is an overall boon to your business, it’s important to think about how it may affect your ability to evaluate governance, risk, and compliance (GRC).
Go inside the world of cloud security with this expert guide and learn about the new challenges put upon enterprises with the loss of visibility, lack of standards, and increase of compliance audits in the cloud-age.
Read about how Sabre, a travel-technology company, has adapted to this new landscape and offers their insights to help you better prepare to meet your GRC needs. In addition, get some of your questions answered about the impact of compliance audits on your IT operations.
Find more content like what you just read:
-
Identity governance and administration (IGA): Unifying workflows
By: Clear Skye
Type: White Paper
For most enterprises, departments have their own data and systems locked up in on-premises legacy technologies. Identity governance and administration (IGA) acts as the connective tissue between digital transformation and optimal workflow. Download this white paper to learn more about Clear Skye’s IGA built on ServiceNow’s Now Platform.
-
ITAM for cybersecurity & risk management: What you need to know
By: ServiceNow and Crowe
Type: eBook
IT asset management (ITAM) practices work to optimize oversight over your assets, enabling ITAM to play a vital role in cybersecurity and risk management. Read this e-book to explore how ServiceNow’s Software Asset Management solution supports your cybersecurity.
-
7 free GRC tools for compliance professionals
By: TechTarget ComputerWeekly.com
Type: eGuide
All organisations need to meet a variety of regulatory compliance requirements, such as General Data Protection Regulation (GDPR), but they don't all have the budget for GRC software. In this e-guide, learn about the free, open source options.
-
Why 76% of organizations are replacing their identity governance solution
By: Clear Skye
Type: eBook
Discover in this e-book why 3 key inflection points are critical for charting why organizations are so discontented with IGA solutions, how you can overcome these challenges, and what’s on the horizon for identity.
-
CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa
By: TechTarget ComputerWeekly.com
Type: Ezine
Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?
-
Computer Weekly Buyer's Guide to EU General Data Protection Regulation
By: TechTarget ComputerWeekly.com
Type: eBook
In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.
-
Risk management: 5 stages to compliance
By: ServiceNow
Type: White Paper
Maturing your risk management program is vital for meeting enterprise-wide objectives. Get insights on how you can raise the maturity level of enterprise risk management. You’ll discover how your teams can make better decisions that lead to greater outcomes, by connecting business and IT with a common language on a single platform.
-
Enabling digital transformation safely & confidently
By: ServiceNow
Type: eBook
Your business is forced to defend against actual cyberthreats and potential ones. So, how can you bolster your security stance in the face of all these risks? Check out this e-book to discover 10 ways that a cloud-based platform with an integrative approach can help you do so.
-
Top Monitoring Tools to Help Meet Regulatory Compliance Standards
By: TechTarget Security
Type: eGuide
In this e-guide, gain expert insight on how to remain vigilant in meeting regulatory compliance standards, and uncover top compliance monitoring tools for financial institutions to meet their industry-specific regulations.
-
Data center power prep for next-gen app architectures
By: Park Place
Type: White Paper
Next-gen apps increase data center density, posing infrastructure and cost challenges. Immersion cooling manages 100kW/rack, reduces CapEx by 50%, and power by 90%, enabling high-density zones in existing sites. It's the future for solving density issues. See the white paper for more.
-
LogicGate Risk Cloud®: A Next-Generation GRC Management Platform
By: LogicGate
Type: Analyst Report
Today’s enterprises need modern governance, risk management, and compliance (GRC) software that is adaptive, integrated, and intuitive enough to meet these challenges head-on. For GRC 20/20’s Michael Rasmussen, LogicGate Risk Cloud is a top contender among those solutions.
-
12 top enterprise risk management trends in 2023
By: TechTarget ComputerWeekly.com
Type: eGuide
Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.
-
A Computer Weekly buyer's guide to compliance, risk and governance
By: TechTarget ComputerWeekly.com
Type: eGuide
Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
-
25 Questions Leaders Should Ask About the Use of AI For GRC
By: LogicGate
Type: eBook
The use of artificial intelligence (AI) in risk management is on the rise, enhancing efficiency and speed in ways that simply cannot be done with other tools. However, the associated risks of AI must be taken into consideration so that your organization can develop a strategy that supports long-term success and scalability. Read on to learn more.
-
Speeding up vulnerabilty detection with automation
By: ServiceNow
Type: eBook
Almost half of all CIOs believe their cybersecurity may not be on par with their digital transformation efforts, but 80% of organizations that use automation say they can respond to vulnerabilities in a shorter timeframe. Download this white paper to help
-
Computer Weekly – 9 January 2018: Countdown to GDPR
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, with the EU General Data Protection Regulation (GDPR) coming in to force this year, we look at the challenges for businesses to comply by the 25 May deadline. We examine the future for HPE as CEO Meg Whitman steps down. And we find out how hyper-converged systems affect your backup strategy. Read the issue now.
-
How digital workflows can enable more efficient ITAM
By: ServiceNow
Type: eBook
Dive into this e-book and explore how digital workflows can enable a more efficient IT asset management system and equip anyone in the organization to be transformative.
-
How to create a risk-aware defense
By: ServiceNow
Type: White Paper
Organizations need visibility into what’s happening, and the ability to adapt fast to external and internal factors. In this e-book, see how your organization can benefit from unlocking a common language and bringing together business and IT on a single platform, to enable integrated enterprise-wide risk management.
-
How Your Next Technology Decision Could Impact Your ESG Goals
By: ServiceNow
Type: eBook
The beginning of your ESG journey can feel daunting, but smart technology decisions can make the road much smoother. To get ahead of your sustainability goals, explore this ServiceNow guide to the top ESG trends and opportunities.
-
The Improvement and Evolution of SIEM
By: TechTarget Security
Type: eGuide
Get an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com.
-
TechTarget’s introduction to risk management
By: ServiceNow
Type: eGuide
Risk management refers to the practices and systems an organization employs to identify, monitor and remediate this risk. To shed light on risk management TechTarget has provided this article-guide, which will take you through the ins and out of risk management, as well as its importance for modern IT. Read on to learn more.
-
How to accelerate your risk and compliance initiatives—and get to value faster
By: ServiceNow
Type: eBook
Explore in this e-book some of the top risk and resilience management solutions available to your organization that can help you break silos, help embed risk and compliance management into daily work, and improve performance through risk-informed decisions.
-
Computer Weekly 22 October 2019: Microsoft vs Google who's winning the cloud email race?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.
-
Third party risk management: A path to a program
By: Coalfire
Type: White Paper
This white paper dives into what risks third-party management faces and how it can change the course of a cyber program. Read on to learn more.
-
Converged Endpoint Management Delivers the Goods: Risk Reduction, Productivity Gains, Licensing Fee Savings, and Improved Employee Experiences
By: Tanium
Type: Analyst Report
Endpoint security and management teams both share the goal of reducing risk, yet they often work in a segregated fashion. Consequently, they choose tech products that support their individual functions, missing opportunities to serve the greater organization better. Read this IDC report to discover the benefits of converged endpoint management.
-
Compliance Report 2023
By: Coalfire
Type: Analyst Report
While in the past compliance was seen as a bureaucratic necessity, many have now realized the full potential of compliance. In this report, experts from Coalfire discuss the state of compliance, taking a deeper look at how compliance has grown into the preferred method for fighting threats at scale. Read on to learn more.
-
DR Planning: Top 10 tips
By: TechTarget Storage
Type: eGuide
This expert E-Guide explores the top ten DR tips from John Toigo to help navigate DR planning more efficiently and shows you how to justify your DR initiatives by analyzing critical DR data.
-
Same cyberthreat, different story
By: ServiceNow
Type: eBook
Organizations like yours are reducing the cost and chaos of vulnerability management by orchestrating an automated response across IT asset management, risk and security. Read this story for a real, practical example of how it's done, helping you stay ahead of the latest cyberthreats and drive continuous improvements.
-
Report for Enterprise Risk Management (ERM) Software
By: LogicGate
Type: Analyst Report
G2's quarterly grid reports rank companies against each other by customer satisfaction and market presence. The Enterprise Risk Management (ERM) category evaluates GRC platforms for companies looking to define, implement, and monitor company-wide strategies for risk management, so they can better mitigate risk. Read on to learn more.
-
Key Drivers for Adopting SaaS Financial Applications
By: TechTarget HR Software
Type: eGuide
Read this e-guide to learn about today's key drivers for SaaS financial applications adoption, as well as what's currently available when it comes to selecting your cloud provider.
-
Insight into the state of security from 2 key conferences
By: Nexum
Type: Blog
Security conferences present a means for professionals to learn, network, and gain new viewpoints into pressing issues. This blog presents a summary of 2 key conventions, Black Hat 2023, and DEF CON 31, comparing the similarities and differences between each. Read on to learn more.
-
Security leader’s guide to identity security
By: SailPoint Technologies
Type: eBook
Providing fast, accurate access to digital resources for those who need it is essential for organizations to secure business and gain a competitive edge. This e-book will review the fundamentals of identity security and discuss how identity security best protects critical assets. Read on to learn more.
-
5 tips for digital transformation success: Tackling digital risk
By: ServiceNow
Type: eBook
Read Digital Transformation & Risk For Dummies, 2nd ServiceNow Special Edition to learn how you can manage and tackle digital risk with a single platform that unlocks a common language between business and IT.
-
ServiceNow Security Operations: The essential use case guide
By: ServiceNow
Type: eBook
The skills shortage and increasing cyberattacks continue to challenge security teams, slowing their responses to security incidents. To help teams avoid disaster, ServiceNow developed Security Operations and the Now Platform. Learn about how these solutions work in this guide.
-
Traditional vs. enterprise risk management: How do they differ?
By: TechTarget ComputerWeekly.com
Type: eGuide
Businesses understand they cannot exist in a risk-free environment. How to manage the risks they face depends on many variables, including the industry the business is in and its size. In this e-guide, we compare traditional risk management and enterprise risk management and outline the important differences between the two.
-
4 key findings of ransomware readiness report
By: Mimecast
Type: Research Content
Ransomware remains a critical challenge for IT teams. To investigate the state of business’s ransomware readiness, Mimecast surveyed 1,100 cybersecurity professionals across the world. Keep reading to unlock the report’s 4 key findings.
-
The ultimate PIA & DPIA handbook for privacy professionals
By: OneTrust
Type: eBook
Privacy Impact Assessments (PIAs) and Data Protection Impact Assessment (DPIAs) are fundamental to evaluating an organization’s privacy activities, and to mitigating risks as efficiently as possible. This e-book serves as a guide to implementing PIA and DPIA protocols within your organization. Read on to learn more.
-
How NASCAR (and other organizations) leverage automation
By: ServiceNow
Type: eBook
In this e-book, discover how – and why – organizations like NASCAR and Hancock Whitney Bank are leveraging hyperautomation and low-code development.
-
Antimalware IT Checklist: Decision Time Part 3
By: TechTarget Security
Type: eGuide
This is the third piece in SearchSecurity.com's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
-
Making the case for cloud-based security
By: TechTarget ComputerWeekly.com
Type: eGuide
Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
-
Making the case for cloud-based security
By: TechTarget ComputerWeekly.com
Type: eGuide
Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
-
4 questions to ask when building your SAP BPC EOL Strategy
By: Wolters Kluwer
Type: White Paper
As SAP BPC approaches its End of Life in 2027, your corporate Finance teams are faced with the challenge of replacing this critical financial management software. Dive into this white paper for answers to your four most pressing questions about this move.
-
Information Security Threats: Building Risk Resilience
By: TechTarget Security
Type: eGuide
Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
-
Prepare to meet evolving risk and compliance mandates
By: ServiceNow
Type: Product Overview
To meet government disclosure mandates, firms require integrated risk and security programs. With a centralized platform, ServiceNow helps identify threats, contain incidents, ensure compliance, and report material events within required timeframes. Case. Read more about how ServiceNow enables robust risk management and expedites reporting.
-
Data classification tools: What they do and who makes them
By: TechTarget ComputerWeekly.com
Type: eGuide
Data classification is an essential pre-requisite to data protection, security and compliance. Firms need to know where their data is and the types of data they hold. In this article, learn more about how these tools can help keep your data tidy and which suppliers offer the best options in the market.
-
Security Big Data: Preparing for a Big Data Collection Implementation
By: TechTarget Security
Type: eBook
This expert e-guide from SearchSecurity.com offers realistic advice to help your enterprise information security team understand what technology and processes must be in place in order to properly and securely take advantage of big data.
-
Privacy by Design: 7 pillars and how to implement them
By: OneTrust
Type: eBook
Privacy by Design is a concept that proposes a framework for seamless data privacy integration as a default across products, services, and system designs. And although many see Privacy by Design as a legal hurdle, considering it a privacy best practice can assist with many central areas of building consumer trust. Read on to learn how.