You've requested...

EY Operational Resilience: Reimagining Business Service continuity, Powered by ServiceNow

If a new window did not open, click here to view this asset.

Download this next:

How to build supply chain resiliency with automation

With all of the supply chain disruptions that have affected global markets over the past few years, many lessons have been learned. One of the most important lessons is that leaders need to plan to ensure their supply chain operations are resilient to disruptions when the time comes.

In this e-book, you will learn about the role of digital transformation and automation in supply chain resiliency and how you can set your organization up for logistics success with the right plan and the right partner.

Read on to learn more about the importance of making the move to automation in your supply chain and how you can be confident next time a major disruption occurs.

These are also closely related to: "EY Operational Resilience: Reimagining Business Service continuity, Powered by ServiceNow"

  • How to accelerate your risk and compliance initiatives—and get to value faster

    Business risks, including operations, technology, security, regulatory, climate, supply chain, and AI, continue to evolve at an ever-accelerating pace. Business leaders are struggling to make better risk-informed decisions while continually facing pressure to do more with less.

    Explore in this e-book some of the top risk and resilience management solutions available to your organization that can help you break silos, help embed risk and compliance management into daily work, and streamline operations so people and organizations perform better through risk-informed decisions.

  • Application Security Handbook: Application Security: Managing Software Threats

    Addressing security concerns from the outset of a software project all the way through to production is the only way that enterprise application delivery teams can prevent skilled attackers from stealing sensitive corporate data.

    Yet in many organizations, what should be a top priority gets pushed to the backburner; in some cases, it's because tight-fisted (and short-sighted!) C-level execs won't provide the necessary resources, in others, it's because developers don't think it's their responsibility, and in still other cases, it's assumed that waiting until the last, prerelease phases of a project is sufficient for security testing. (It's not.)

    Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened:

    1. Ten Ways to Build in Security From the Start
    2. Secure Your Mobile Apps in Enterprise Integration
    3. How to Boost Your Application Security Savvy

Find more content like what you just read:

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

    Download

  • Executive Interview: Unleashing blockchain's potential

    Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.

    Download

  • Global payroll and compliance: HR leader’s guide

    With 50% of financial leaders reporting that they expect the personal liability of compliance professionals to increase, it’s no wonder that companies have started to step up their game. But for those who haven’t, what are the best ways to overcome the effects of these new legislative changes? Browse this report to learn more.

    Download

  • Rethinking MDM in a BYOD World

    Discover the ins and outs of the Bring Your Own Device (BYOD) trend and why traditional mobile device management solutions are no longer sufficient. Also inside, learn a security strategy that will keep your enterprise protected.

    Download

  • Why IT hiring is picking up amid ongoing economic concerns

    Hiring hasn’t stopped in 2023 despite fears of an economic recession; with software developers and cybersecurity specialists at the top of the list of in-demand roles: discovery why in this TechTarget e-guide.

    Download

  • Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries

    In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to post-Covid-19 supply chain management

    The supply chain has been under great pressure during the Covid-19 pandemic, not helped by several high-profile cyber attacks. In this 15-page buyer's guide, Computer Weekly looks at the key considerations for business leaders going forward, the importance of data transparency and how cyber attacks on the supply chain have increased.

    Download

  • Cutting through the AI hype with actionable strategies

    This white paper addresses the hesitation many executives feel amidst the AI craze, highlighting the opportunities AI presents and the complexities to consider. Although it may be too early to adopt AI across all your operations, it’s also too late to not use any. Read on to learn how you can operationalize AI for your business.

    Download

  • Computer Weekly - 1 March 2022: Post Office Horizon scandal enters public conscience - at last

    In this week's Computer Weekly, 13 years after Computer Weekly first reported on flaws in the Post Office IT system, a public inquiry finally allows victims to reveal the devastating impact on their lives. Enterprises are starting to evaluate the uses of 5G. And we look at how SMEs have turned to e-commerce after the pandemic. Read the issue now.

    Download

  • CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT

    Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.

    Download

  • CW Benelux - August-October 2022: Belgium seeks top tech talent

    The battle for the right IT staff to transform businesses is changing and recruiters and job-seekers need to be clued up. In this issue, a Belgium-based recruiter gives the lowdown on tech job-seeking. Also read why Dutch beer brewer Heineken has replaced more than 60 different HR systems with SAP SuccessFactors as its central HR system.

    Download

  • Computer Weekly buyer's guide to fintech

    In this 14-page buyer's guide, Computer Weekly weighs up thecompetition from tech-based challenger banks, the importanceof customer experience and the value of leaving conventionalbanking in the past.

    Download

  • CW APAC, October 2021: Tech Career Guide

    In this handbook, Computer Weekly looks what is being done to close cyber security’s gender gap in the Asia-Pacific region

    Download

  • The ultimate guide to Robotic Process Automation (RPA)

    Robotic process automation is a hot commodity in today's enterprises -- its impact has been described as transformational and disruptive. Still, RPA software is not without risks. In this e-guide, we explain everything you need to know for a successful RPA implementation, from the basics to analysis of where this rapidly evolving market is headed.

    Download

  • CIO Trends #2

    Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs.

    Download

  • Ransomware in 2024: What should you expect?

    To learn about trends in ransomware in Q4 2023, and to unlock predictions about ransomware in 2024, tap into this 6-page research report by CyberMaxx.

    Download

  • CW APAC - October 2019: Expert Advice on storage

    The creation of ever-increasing volumes of data is posingescalating problems for storage. In this issue of Expert Advice, Computer Weekly looks at how APAC firms are dealing with storage management issues in the cloud age. Read the issue now.

    Download

  • Setting a plan for employee payroll data safety

    Despite the increasing cyber-attacks and data insecurity trends, only 52% of today’s companies report that they’ve developed a playbook and a contingency plan across their geographies. This is concerning, especially for payroll teams. Browse this report to learn more.

    Download

  • A Computer Weekly buyer's guide to customer and employee experience management

    Businesses are facing new challenges to meet the expectations of customers and employees. In this 14-page buyer's guide, Computer Weekly looks at the benefits of the experience economy, the customer service implications of always-on mobile users and how digital platforms can engage customers across all channels.

    Download

  • Deloitte Global CIO Survey 2018 – UK Edition

    Fewer than 10% of CIOs identified themselves and their companies as being advanced in the journey to incorporate technology into their digital business strategies, Deloitte's 2018 CIO survey reveals in the UK edition of its 2018 global CIO survey, Manifesting Legacy: Looking Beyond the Digtal Era.

    Download

  • A Computer Weekly Buyer's Guide to Application Development and DevOps

    Harnessing the right developer tools offers new advantages for businesses. In this 14-page buyer's guide, Computer Weekly looks at the benefits and limitations of the DevOps approach, what Microsoft is doing with its developer platform and the rise of the holistic application.

    Download

  • Computer Weekly buyer's guide to customer insight

    In this 14-page buyer's guide, Computer Weekly looks at how firms adapt to new behaviors, as well as utilize deep learning to gain better insights and use intelligent analytics apps to enhance interactions.

    Download

  • A Computer Weekly buyer's guide to supply chain security

    Organisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.

    Download

  • July ezine: Getting storage right

    An issue looking at what products are in demand now in the storage world and what technologies are coming that need to be embraced by the channel.

    Download

  • Computer Weekly – 8 January 2019: Technology innovation in music

    In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.

    Download

  • The Managed Detection & Response Landscape

    Organizations of all sizes are turning to managed detection and response (MDR) solutions to quickly handle suspicious activity and contain threats. However, while MDR solutions have been proven, there are a lot of options in the market to choose from which makes picking the right solution for you a challenge. Read on to learn how to choose wisely.

    Download

  • IT Decision Checklist: Messaging Security

    Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.

    Download

  • Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise

    In this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.

    Download

  • Computer Weekly - 2 November 2021: What the Budget means for UK technology

    In this week's Computer Weekly, we look through the chancellor's Autumn Budget and Spending Review to find what it means for the UK tech sector. As COP26 starts, we assess the green credentials of the IT industry. And we hear one CTO's experiences of learning the privacy lessons of GDPR. Read the issue now.

    Download

  • eGuide: Information Security - Buyer's Guide to Messaging Security

    Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.

    Download

  • Buyer's Guide to Antimalware

    Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.

    Download

  • Robotic Process Automation blends into AI for thoroughly modern ERP

    Robotic Process Automation has emerged in recent years as one way to modernise the ERP systems that run the entire gamut of business processes for many organisations. Download this e-guide and read more about how the advance of the robots continues.

    Download

  • Computer Weekly – 13 March 2018: Unlocking digital change in criminal justice

    In this week's Computer Weekly, we talk to the IT and digital chief at the Ministry of Justice about digital transformation across the criminal justice system. European cities are trying to attract British IT talent as a result of Brexit – what does it mean for UK IT? And we take an in-depth look at the fintech sector. Read the issue now.

    Download

  • CW ANZ: Trend Watch – Security

    With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.

    Download

  • Large Enterprises: Consider Your MSSP Options

    Take a look through this “ISG Provider Lens Quadrant” report to learn about 27 MSSPs that can support the needs of large enterprises.

    Download

  • Computer Weekly – 13 June 2023: The most influential people in UK technology

    In this week's Computer Weekly, we reveal the 13th annual UKtech50 list, with this year's most influential person award shared by secretaries of state for science, innovation and technology Michelle Donelan and Chloe Smith. Also, we examine mounting legal challenges faced by the emergence of generative AI tools such as ChatGPT. Read the issue now.

    Download

  • Defining the datacentre needs of 21st century enterprises

    This guide is designed to provide IT leaders with some insight into how their peers are addressing current problems through the use of cloud and colocation, and shine a light on how the analyst community sees the role of the datacentre changing over time.

    Download

  • MicroScope: Grasp the social networking opportunity

    An issue looking at the issues around social media, the growth in unclouding and some security industry predictions for the year ahead.

    Download

  • CW ANZ - December 2018: Rise to cloud and data management challenges

    In this edition of CW ANZ, we look at how enterprises in ANZ are approaching data management in the cloud, and some of the best practices that they can adopt to address cloud related challenges.

    Download

  • Computer Weekly – 14 February 2023: Where next for NHS IT?

    In this week's Computer Weekly, as NHS Digital is folded into NHS England, we consider what the merger could mean for the future of NHS IT. We find out how data science and analytics has become an increasingly important function for John Lewis. And we examine the importance of building empathy into metaverse applications. Read the issue now.

    Download

  • Computer Weekly – 10 July 2018: Tackling the digital identity problem

    In this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.

    Download

  • Computer Weekly - 21 April 2020: Taking robot technology to a New World

    In this week's Computer Weekly, we talk to the technology team behind a project to recreate the voyage of the Mayflower using a fully autonomous ship. We look at how India's coronavirus lockdown is affecting UK companies that use offshore outsourcing. And we examine the challenges of making edge computing work. Read the issue now.

    Download

  • Computer Weekly - 9 August 2022: Eurotunnel's digital journey for the realities of post-Covid travel

    In this week's Computer Weekly, the travel industry was devastated by the pandemic, but we find out how Eurotunnel is turning to digital to better engage customers in the post-Covid world. We examine the impact of the economic slowdown on the tech giants. And we explain all you need to know about data gravity. Read the issue now.

    Download

  • Computer Weekly – 15 October 2019: Securing the internet of things

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

    Download

  • Computer Weekly – 19 September 2023: Securing Eurovision's online voting system against cyber attacks

    In this week's Computer Weekly, we discover how Once.net and Cloudfare defended the 2023 Eurovision Song Contest against cyber attacks. Our buyer's guide continues to look at integrating software-as-a-service applications, with the governance of SaaS connectivity to the fore. Read the issue now.

    Download

  • CW Buyers Guide To Finance and Insurance

    This 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight.

    Download

  • The Holistic Identity Security Model

    According to a recent study conducted by Enterprise Strategy Group (ESG), only 9% of organizations have reached full maturity in their identity security programs. This report presents the full scope of findings from ESG’s recent research into identity security. Read on to learn more.

    Download