You've requested...

Risk Management – Prescriptive Guidance

If a new window did not open, click here to view this asset.

Download this next:

How to break down data silos with the Now Platform

Platform owners must constantly prioritize their resources across the enterprise. Chances are that you have had to place high importance on platform maintenance, routine changes, modifying existing apps and managing catalog items all the while restricted to prioritizing outcomes for a specific service or a small number of apps.

How can you empower your customers, employees, and partners with modern, consumer-grade experiences?

Read on to learn how the Now Platform can help you break down silos, seamlessly connecting your people, systems and processes with enterprise-wide digital workflows while increasing speed to value.

These are also closely related to: "Risk Management – Prescriptive Guidance"

  • Optimizing cloud costs through visibility and automation

    Cloud spending is set to reach 26% of IT budgets, but mismanagement leads to 40% overspending. With 30% of cloud workloads oversized and a quarter of subscriptions dormant, manual cost tracking is ineffective, and disparate systems hinder automation.

    FinOps teams need to align tech efforts with budget limits. ServiceNow Cloud Cost Management offers a unified platform to monitor hybrid cloud expenses, budget effectively, optimize resources, and deactivate unused services. ServiceNow users report significant savings from rightsizing and identifying inactive resources.

    Discover how to enhance your cloud efficiency and expenditure by reading the full content.

  • Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule

    When implemented carefully, the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) can help healthcare organizations bolster their cybersecurity programs and further safeguard patient data and critical systems.

    When faced with a data breach that compromises protected health information (PHI), HIPAA-covered entities must comply with the HIPAA Breach Notification Rule, which sets strict guidelines on when and how to notify patients of a breach.

Find more content like what you just read:

  • Digital Fortitude Enhancing Resilience in the Age of Cyber Evolution

    The NIS2 Directive aims to strengthen cybersecurity across the EU, impacting organizations globally. It enforces mandatory security measures and penalties for non-compliance. Learn how Eviden and ServiceNow can help your organization accelerate its compliance journey with their NIS2 Compliance Management solution. Read the full overview.

    Download

  • Object Storage 101

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.

    Download

  • Explore artificial intelligence in ITSM and the tool options

    Artificial intelligence in ITSM is the way of the future. Dive into this comprehensive buyer's guide to discover if you have the right conditions in place to introduce this multifaceted technology, and learn guidelines to help you choose the most suitable suite of products.

    Download

  • Artificial intelligence in ITSM: Finding the right tools for you

    AI functionality is poised to be a game-changer in the ITSM world. But before exploring the possibilities for AI in ITSM, it's important to first understand what AI is - and what it is not.

    Download

  • IT Asset Discovery: From Visibility to Workflow

    Explore in this e-book the kind of data you need to see all your software, hardware, and cloud-based assets – as well as cloud resources that are often overlooked.

    Download

  • Computer Weekly – 3 July 2018: Future-proofing Gatwick Airport's technology

    In this week's Computer Weekly, we go behind the scenes at London Gatwick Airport and talk to its CIO about a critical network upgrade to support passenger growth. Our latest buyer's guide examines automation and intelligent systems management. And we assess the latest technologies for boosting storage performance. Read the issue now.

    Download

  • Guiding Your Leadership Team Through the Zero Trust Mindset

    Zero trust identifies users and entities and grants them just the right amount of access as needed. In this e-book, LATAM Field Technology Director at CyberArk, Cláudio Neiva, leverages his 24 years of experience to break down the essential elements of zero trust. Read on to learn more.

    Download

  • Building industrial security capabilities to drive compliance

    With an increase in cyberattacks, organizations in the industrial sector need to invest significant resources in understanding their responsibilities and ensuring compliance. This white paper details the main requirements of NIS2 and how organizations can benefit from the Cisco security portfolio to drive compliance. Read on to learn more.

    Download

  • A Computer Weekly buyer's guide to intelligent workload management

    One huge advantage digital transformation brings with it is the phenomenon of intelligent workload management. In this 17-page buyer's guide, Computer Weekly looks at the various tools available, asset management best practices and the complications to look out for with hybrid and multicloud deployments.

    Download

  • Name Matching Software Tackles AML/KYC Challenges

    As financial institutions face increased AML/KYC challenges, Babel Street's AI-powered name matching software can help by reducing false positives, accelerating identity verification, and streamlining compliance workflows. Learn more about Babel Street Analytics Name Match in this eBook.

    Download

  • Recognizing the trends in healthcare data breach lawsuits

    Lawsuits often follow a healthcare data breach, but understanding what drives litigation trends can help healthcare organizations prepare.

    Download

  • The HIPAA security guide for cloud communications

    With it being reported that approximately 70% of today’s organizations are not HIPAA compliant, it has become critical for leaders to ensure that they take the necessary steps to stay up to date. For many, this starts in their unified communications operations. Access this guide to learn more.

    Download

  • Financial service leader’s guide to compliance

    In January of 2025, the EU will begin enforcing the Digital Operational Resilience Act (DORA). This guide provides a more detailed breakdown of the compliance law and provides you with the information and resources you need to prepare your organization to meet the regulations. Access now to learn more.

    Download

  • Revenue acceleration for digital leaders

    This report from KPMG identifies three priorities for organisations to embrace to drive better, quicker and more certain returns.

    Download

  • Oracle PBCS vs. EPBCS: A Comprehensive Comparison Guide

    Oracle’s Planning and Budgeting Cloud Service (PBCS) and Enterprise Planning and Budgeting Cloud Service (EPBCS): is one a better fit for your organization? How are these two tools the same? How are they different? Before you go any further, review this guide to compare your options.

    Download

  • AI-powered solutions can help close the AML/KYC risk-confidence gap

    As data volumes and complexity increase, financial institutions face a growing risk-confidence gap in AML/KYC compliance. Babel Street's AI-powered identity intelligence solutions can help close this gap by automating processes, reducing false positives, and providing deeper insights. Read the full product overview to learn how.

    Download

  • 2024 Research Report: State of Exposure Management

    In 2023, the XM Cyber Continuous Exposure Management (CEM) platform uncovered more than 40 million exposures. To access 7 key findings that these exposures illuminated, and to deepen your understanding of the state of exposure management in 2024, dig into this research report.

    Download

  • 3 ways to prepare for impending HIPAA Security Rule updates

    Covered entities and business associates should prepare for changes as HHS plans to update the HIPAA Security Rule this spring.

    Download

  • Streamline NIS2 compliance

    With the Network and Information Security Directive 2.0 (NIS2), the EU is expanding the reach of regulations, imposing stricter requirements, and stepping up enforcement. How can your organization reduce security risks and streamline compliance? Download the white paper to learn more.

    Download

  • Building digital operational resilience: DORA compliance through enhanced identity security

    The EU's Digital Operational Resilience Act (DORA) aims to enhance the financial industry's operational resilience. Implementing robust identity security and governance is key to achieving DORA compliance. Learn how to build digital operational resilience through enhanced identity security in this IDC report.

    Download

  • Navigating the Compliance Labyrinth with AI in Finance

    This e-book examines how AI can help financial institutions meet compliance mandates, fight fraud, and improve customer relationships. For example, AI can automate KYC processes, detect money laundering, and provide a holistic view of customers. Read the e-book to discover how AI can address your financial institution's key challenges.

    Download

  • Steps, tools & services to know when developing EPM strategy

    While developing an enterprise performance management (EPM) strategy seems straightforward enough, it’s critical to consider the many processes, people, and systems involved before choosing which path to take. Browse this guide to learn more.

    Download

  • How HHS-OIG conducts cybersecurity audits

    Healthcare organizations and HHS entities can use the recommendations provided in HHS-OIG cybersecurity audit reports to strengthen the security of their systems.

    Download

  • Guide to the NYDFS Cybersecurity Regulations

    Recently, the New York State Department of Financial Services (NYDFS) introduced an update to its cybersecurity regulations, adding requirements to ensure against growing concerns. Download this white paper for a full breakdown of the new changes.

    Download

  • How to secure multi-cloud estates

    How can organizations minimize compromised access in the cloud? This white paper covers identity security and the challenges and benefits of cloud compliance to reduce security risk. Read on to learn about best practices to secure identities in the cloud as well as three phases to achieve cloud identity security success.

    Download

  • A guide to protecting your intellectual property abroad

    In today’s hybrid and remote world, IP and data protection has never been more important. This is especially true for companies with international employees, who can experience a handful of consequences. So, how can you avoid these pitfalls? Dig into this guide to learn more.

    Download

  • What to expect in the NSA's independent dispute resolution process

    The No Surprises Act's independent dispute resolution process provides a channel for payers and providers to negotiate payments without affecting patient spending.

    Download

  • Cloud computing storage key management

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

    Download

  • CrowdStrike Global Threat Report 2024

    In this 61-page eBook, discover research into and an analysis of the latest trends and developments in today's threat landscape. Topics covered inside include: an overview of the threat landscape, key cyberattack themes, Crowdstrike's recommendations for moving forward, and more.

    Download

  • Protecting your organisation from itself

    This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.

    Download

  • NIS2 and European boards: 2024 analyst report by ESG

    By the end of 2024, this report by Enterprise Strategy Group (ESG) explains, the “Network and Information Systems 2 (NIS2) directive of the European Union will significantly affect Union countries and nation-states in its periphery.” So, what will that impact look like? Unlock insights in the report.

    Download

  • Understanding what Zero Trust is and isn’t

    This e-book, What is Zero Trust? (Really), teaches you exactly what Zero Trust really is. Dive into the e-book here.

    Download

  • Accelerating Zero Trust Capabilities eBook

    The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.

    Download

  • Procurement transformation in the age of generative AI

    As procurement evolves from traditional, back-office functions to more strategic lines of business, so are the technologies that organizations are adopting. But with so many solutions available, how can you know which is best for you? Browse this report to learn more.

    Download

  • Named entity disambiguation: Boost your data science efforts

    Named entity disambiguation is a natural language processing technique that resolves ambiguity in text by mapping named entities to specific meanings. Learn about the approaches, challenges, and benefits of this powerful method in the full blog post now.

    Download

  • Data Modeling Guidebook

    Digital transformation is providing an unprecedented amount of predictive insights, but making the best use of this data can be daunting. Check out HighByte’s e-book to gain a better understanding of how data modeling works, what it looks like, how it works with existing standards, and to gather tips on how to establish a data modeling strategy.

    Download

  • Getting the best out of robotic process automation

    IT leaders are used to doing more with less, but the pandemic has forced many organisations to reassess whether the way processes have always been run, is optimal. With people having to work from home, many organisations have needed to automate previous manual tasks, in order to remain operational.

    Download

  • Financial crime compliance: How you should be preparing for the future

    In this e-book, discover how global trends in AML and financial crimes compliance have been evolving due to AI and other emerging technologies in anti-fraud defenses.

    Download

  • NIS2: Forecasting the effects of the new compliance

    In January 2023, the European Union's (EU) updated Network and Information Security Directive, NIS2, came into force, giving member states 21 months to comply. In this report, IDC analysts provide insight into the new legislation, highlighting the most important areas.

    Download

  • Identity governance key for NIS2 compliance

    The NIS2 Directive will require EU organizations to enhance their cybersecurity risk management and governance. Identity governance is crucial for compliance, automating identity processes and providing AI-driven risk detection. Read the full analyst report to learn how identity security solutions can help your organization prepare for NIS2.

    Download

  • HIPAA and PHI security with access management

    CyberArk's privileged access management (PAM) solutions enhance PHI security, manage privileged access, and support HIPAA compliance. Discover how its identity-centric method secures credentials, monitors sessions, and detects threats. Read this product overview to learn how CyberArk PAM lowers breach risks and proves compliance.

    Download

  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.

    Download

  • Stemming the threat of high-risk credentials

    For cybersecurity, the unfettered buildup of cloud architecture is like a powder keg, and the larger it grows, the more the spark of high-risk access credentials threatens your organization. This white paper covers identity security compliance challenges, benefits, and best practices for securing your AWS cloud. Read on to learn more.

    Download

  • Royal Holloway: Information security of the 2016 Philippine automated elections

    We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.

    Download

  • IT4IT for Managing the Business of IT

    IT4IT™ for Managing the Business of IT – A Management Guide, from The Open Group, provides best practice advice and focuses on the data and automated workflows needed to manage IT services in a lean, agile and business-focused way.

    Download

  • Unlock the power of your data with a semantic layer

    The growth of data complexity and the need for seamless data integration across systems have propelled the need for a semantic layer. This white paper explores how a semantic layer can optimize data reuse, enhance data governance, and unlock the full potential of enterprise data. Read the full white paper now to learn more.

    Download

  • Enjoy an overview of the NIST Cybersecurity Framework 2.0, a framework for managing and mitigating cybersecurity risk.

    Enjoy an overview of the NIST Cybersecurity Framework 2.0, a framework for managing and mitigating cybersecurity risk. Learn how CyberArk's Identity Security Platform can help organizations comply with various subcategories of the framework, by offering solutions for identity security.

    Download