You've requested...

Risk Management – Prescriptive Guidance

If a new window did not open, click here to view this asset.

Download this next:

Risk management: 5 stages to compliance

Maturing your risk management program is vital for meeting enterprise-wide objectives. Get insights on how you can raise the maturity level of enterprise risk management. You’ll discover how your teams can make better decisions that lead to greater outcomes, by connecting business and IT with a common language on a single platform.

These are also closely related to: "Risk Management – Prescriptive Guidance"

  • Optimizing cloud costs through visibility and automation

    Cloud spending is set to reach 26% of IT budgets, but mismanagement leads to 40% overspending. With 30% of cloud workloads oversized and a quarter of subscriptions dormant, manual cost tracking is ineffective, and disparate systems hinder automation.

    FinOps teams need to align tech efforts with budget limits. ServiceNow Cloud Cost Management offers a unified platform to monitor hybrid cloud expenses, budget effectively, optimize resources, and deactivate unused services. ServiceNow users report significant savings from rightsizing and identifying inactive resources.

    Discover how to enhance your cloud efficiency and expenditure by reading the full content.

  • Ways to avoid cloud risk & security exposure

    Nearly half of the organizations using the cloud today plan to migrate at least 50% or more of their apps to the cloud in the coming year.

    Learn the 3 essential elements you should look for in an integrated solution that can help strengthen security, manage risk and monitor compliance in the cloud while also reducing costs and the risk of human error.

    In this e-book, you’ll see how ServiceNow can help you confidently support innovation, with a single platform.

Find more content like what you just read:

  • Object Storage 101

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.


  • 5 tips for digital transformation success: Tackling digital risk

    Read Digital Transformation & Risk For Dummies, 2nd ServiceNow Special Edition to learn how you can manage and tackle digital risk with a single platform that unlocks a common language between business and IT.


  • IT asset tracking: Why having all the data won't suffice

    Explore in this e-book the kind of data you need to see all your software, hardware, and cloud-based assets – as well as cloud resources that are often overlooked.


  • How to secure your ServiceNow SaaS

    Many organizations rely on ServiceNow to manage their IT systems. But with the inherent risks associated with SaaS deployment, organizations need to know how they can best secure their ServiceNow usage. This guide offers an overview of ServiceNow, helping you understand and secure the complex platform. Read on to learn more.


  • Explore artificial intelligence in ITSM and the tool options

    Artificial intelligence in ITSM is the way of the future. Dive into this comprehensive buyer's guide to discover if you have the right conditions in place to introduce this multifaceted technology, and learn guidelines to help you choose the most suitable suite of products.


  • Artificial intelligence in ITSM: Finding the right tools for you

    AI functionality is poised to be a game-changer in the ITSM world. But before exploring the possibilities for AI in ITSM, it's important to first understand what AI is - and what it is not.


  • U.S. SLTT entities: Boosting cybersecurity with grants

    U.S. State, Local, Tribal or Territorial (SLTT) entities are responsible for securing citizens’ data. This white paper explores how grants can help SLTTs with that important mission. Read on to learn about the types of grants available to SLTTs and how SLTTs can leverage them.


  • A Computer Weekly buyer's guide to intelligent workload management

    One huge advantage digital transformation brings with it is the phenomenon of intelligent workload management. In this 17-page buyer's guide, Computer Weekly looks at the various tools available, asset management best practices and the complications to look out for with hybrid and multicloud deployments.


  • Computer Weekly – 3 July 2018: Future-proofing Gatwick Airport's technology

    In this week's Computer Weekly, we go behind the scenes at London Gatwick Airport and talk to its CIO about a critical network upgrade to support passenger growth. Our latest buyer's guide examines automation and intelligent systems management. And we assess the latest technologies for boosting storage performance. Read the issue now.


  • Tightly Control and Manage Access to Applications and Services with Zero Trust

    In this research report, AT&T’s Chief Security Officer (CSO) provides a unique perspective on implementing Zero Trust to control and manage access to applications and services. Read the full report to unlock this exclusive insight.


  • Prepare to meet evolving risk and compliance mandates

    To meet government disclosure mandates, firms require integrated risk and security programs. With a centralized platform, ServiceNow helps identify threats, contain incidents, ensure compliance, and report material events within required timeframes. Case. Read more about how ServiceNow enables robust risk management and expedites reporting.


  • Revenue acceleration for digital leaders

    This report from KPMG identifies three priorities for organisations to embrace to drive better, quicker and more certain returns.


  • Product security: How Cybellum helps with reporting obligations

    The NIS2 is an advancement of the EU’s cybersecurity framework building upon the initial Network and Information Security (NIS) Directive, including specific sections relevant to product security professionals. Use this white paper as a reference to better understand the NIS2 with regards to product security.


  • Oracle PBCS vs. EPBCS: Which one better aligns with your requirements?

    Oracle’s Planning and Budgeting Cloud Service (PBCS) and Enterprise Planning and Budgeting Cloud Service (EPBCS): is one a better fit for your organization? How are these two tools the same? How are they different? Before you go any further, review this guide to compare your options.


  • 3 ways to prepare for impending HIPAA Security Rule updates

    Covered entities and business associates should prepare for changes as HHS plans to update the HIPAA Security Rule this spring.


  • How SASE and SD-WAN are making on-premises firewalls redundant

    According to Gartner, by 2024 at least 40% of enterprises will have explicit strategies to adopt SASE, up from less than 1% at year-end 2018. Access this resource to learn how SASE and SD-WAN can make on-premises firewalls redundant.


  • Data modeling guide

    This document describes core elements you will use to model and handle data in Couchbase CapellaTM (or Couchbase Server). It describes the ways you can structure individual JSON documents for your application, how to store the documents with a Couchbase SDK, and different approaches you may take when you structure data in documents.


  • Anticipate, Prevent, and Minimize the Impact of Business Disruptions

    Read this guide to discover how you can enable confident risk-based decisions across business and IT by building a proactive, comprehensive and competitive resilience strategy—especially in times of uncertainty and disruption. Start building a resilience programme that can give you a competitive edge, with ServiceNow.


  • Comparison Guide: Guardicore vs. Traditional Microsegmentation Solutions

    One of the core elements of a good micro-segmentation solution is the ability to protect critical assets no matter where they are deployed or accessed. Read this comparison guide to learn about what makes Akamai different when it comes to zero trust segmentation and micro-segmentation offerings.


  • Generative AI: Debunking common misconceptions to realise organisational value

    Despite Gen AI's potential, many organisations remain cautious. This paper debunks the common misconceptions around Generative AI and shares deep insights into its true potential.


  • The Gorilla Guide to IT asset management

    Smarter approaches to asset management addresses the hidden asset cost gotchas; download this Gorilla Guide e-book to find out how.


  • Steps, tools & services to know when developing EPM strategy

    While developing an enterprise performance management (EPM) strategy seems straightforward enough, it’s critical to consider the many processes, people, and systems involved before choosing which path to take. Browse this guide to learn more.


  • Cloud computing storage key management

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.


  • 4 ways to avoid gambling with cyber risk disclosure

    In this e-book, learn the top 4 ways your organization can avoid gambling with cyber risk disclosure, and discover everything you need to know about recent US SEC mandates.


  • The state of the threat landscape

    The advent of AI as a tool has lowered the barrier of entry for hackers, only adding fuel to the fire that is the rapidly expanding threat landscape. With this 2024 Global Threat Report, CrowdStrike’s elite Counter Adversary Operations team delivers actionable intelligence you can use to stay ahead of today’s threats. Read on to learn more.


  • Accelerating Zero Trust Capabilities eBook

    The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.


  • NIS2 and European boards: 2024 analyst report by ESG

    By the end of 2024, this report by Enterprise Strategy Group (ESG) explains, the “Network and Information Systems 2 (NIS2) directive of the European Union will significantly affect Union countries and nation-states in its periphery.” So, what will that impact look like? Unlock insights in the report.


  • 2024 security report: Predictions from 3 CISOs

    In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.


  • DORA: What cybersecurity leaders need to do to succeed

    The Digital Operational Resilience Act (DORA) is now law in EU countries, with enforcement starting January 17, 2025. This new white paper looks at the implications for cybersecurity leaders and the actions you need to take to ensure you’re compliant by 2025. Access the paper to learn more.


  • How to accelerate your risk and compliance initiatives—and get to value faster

    Explore in this e-book some of the top risk and resilience management solutions available to your organization that can help you break silos, help embed risk and compliance management into daily work, and improve performance through risk-informed decisions.


  • Protecting your organisation from itself

    This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.


  • Royal Holloway: Information security of the 2016 Philippine automated elections

    We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.


  • Getting the best out of robotic process automation

    IT leaders are used to doing more with less, but the pandemic has forced many organisations to reassess whether the way processes have always been run, is optimal. With people having to work from home, many organisations have needed to automate previous manual tasks, in order to remain operational.


  • LogicGate Risk Cloud®: A Next-Generation GRC Management Platform

    Today’s enterprises need modern governance, risk management, and compliance (GRC) software that is adaptive, integrated, and intuitive enough to meet these challenges head-on. For GRC 20/20’s Michael Rasmussen, LogicGate Risk Cloud is a top contender among those solutions.


  • Tanium & ServiceNow: Delivering Asset Management Peace of Mind

    99% of organizations using CMDB tooling that do not confront configuration item data quality gaps will experience visible business disruptions according to Gartner. So, how can you level-up your CMDB? Browse this e-book to discover how Tanium and ServiceNow deliver asset management peace of mind and can improve your CMDB.


  • A Finance Leader's Guide to Automating Analytics

    This 38-page e-book from O’Reilly maps out the role of the modern CFO and explains how finance leaders can do more with less. Inside, you’ll discover how analytics automation can help finance leaders transform their analytics from manual and error-prone to fully automated with complete visibility. Read on to learn more.


  • GRSee PCI-DSS 4.0 Compliance for Guardicore

    A new assessment from GRSee indicates how Akamai Guardicore Segmentation can help organizations meet, support, or validate 9 of the 12 high-level requirements of Payment Card Industry Data Security Standard (PCI DSS) compliance. Get the third-party validation you need to start your segmentation project.


  • How growing businesses can better manage their financials

    Today’s finance and accounting (F&A) leaders are expected to meet business goals with efficiency. However, with new demands and pressures facing teams, this is easier said than done. Access this guide to discover top tips for success.


  • HIPAA and PHI security with access management

    CyberArk's privileged access management (PAM) solutions enhance PHI security, manage privileged access, and support HIPAA compliance. Discover how its identity-centric method secures credentials, monitors sessions, and detects threats. Read this product overview to learn how CyberArk PAM lowers breach risks and proves compliance.


  • 3 modern SOC challenges & how to address them

    Along with digging into 3 issues challenging today’s SOC teams, this overview explores how your organization can overcome the obstacles by leveraging an AI-driven SOC platform. Read on to unlock the complete insights.


  • Discovering & eliminating shadow cloud workloads

    How can organizations discover shadow cloud workloads and eliminate the risk they pose? Learn how to examine your cloud environment the way adversaries do and manage your exposure properly in this white paper.


  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.


  • The DORA act explained

    The Digital Operational Resilience Act (DORA) went into effect in 2023, but do you know what is required from you to stay compliant? Explore this white paper to find out and learn how Contrast Security helps support DORA regulation.


  • 7 best practices for Web3 security risk mitigation

    Web3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.


  • Stemming the threat of high-risk credentials

    For cybersecurity, the unfettered buildup of cloud architecture is like a powder keg, and the larger it grows, the more the spark of high-risk access credentials threatens your organization. This white paper covers identity security compliance challenges, benefits, and best practices for securing your AWS cloud. Read on to learn more.


  • Managing third-party identity risk

    Today’s organizations no longer reside behind a digital perimeter, with countless other third-party entities presenting access risk. SailPoint Non-Employee Risk Management aims to bolster identity security by extending advanced governance controls to large and complex populations of non-employee users. Download this data sheet to learn more.


  • Managing the third-party risk of non-employee identities

    Organizations utilize non-employee workers and services to supplement their workforce, but each of these non-employee entities presents an increase in third-party risk. This white paper explores how non-employee identities present new demands to organizations’ existing authentication systems and protocols. Read on to learn more.