You've requested...

Risk Management – Prescriptive Guidance

If a new window did not open, click here to view this asset.

Download this next:

How to break down data silos with the Now Platform

Platform owners must constantly prioritize their resources across the enterprise. Chances are that you have had to place high importance on platform maintenance, routine changes, modifying existing apps and managing catalog items all the while restricted to prioritizing outcomes for a specific service or a small number of apps.

How can you empower your customers, employees, and partners with modern, consumer-grade experiences?

Read on to learn how the Now Platform can help you break down silos, seamlessly connecting your people, systems and processes with enterprise-wide digital workflows while increasing speed to value.

These are also closely related to: "Risk Management – Prescriptive Guidance"

  • Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule

    When implemented carefully, the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) can help healthcare organizations bolster their cybersecurity programs and further safeguard patient data and critical systems.

    When faced with a data breach that compromises protected health information (PHI), HIPAA-covered entities must comply with the HIPAA Breach Notification Rule, which sets strict guidelines on when and how to notify patients of a breach.

  • 4 steps to manage risk and resilience in real time

    Risk teams need better and more accurate visibility into risk, of where personal data resides, and of the exposure third parties represent. But embedding risk management across the business first requires removing silos to manage resilience in real-time

    This eGuide offers a roadmap for doing so:

    1. Integrate workflows, data, and tools for proactive technology, cyber risk, and compliance management.
    2. Embed risk management in daily work, making issue reporting easy for staff.
    3. And 2 more steps.

    Following these steps can yield a 137% ROI, 99% faster control certification, and 50% more efficient BCM administration. Learn how real-time risk management can lead to operational excellence in the eGuide.

Find more content like what you just read:

  • Object Storage 101

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.

    Download

  • Explore artificial intelligence in ITSM and the tool options

    Artificial intelligence in ITSM is the way of the future. Dive into this comprehensive buyer's guide to discover if you have the right conditions in place to introduce this multifaceted technology, and learn guidelines to help you choose the most suitable suite of products.

    Download

  • Artificial intelligence in ITSM: Finding the right tools for you

    AI functionality is poised to be a game-changer in the ITSM world. But before exploring the possibilities for AI in ITSM, it's important to first understand what AI is - and what it is not.

    Download

  • How AI can help bridge custom and standard taxonomies

    AI can bridge the gap between custom and standard taxonomies, enabling organizations to categorize data accurately and enhance operational efficiency. Discover how AI-powered technologies can harmonize diverse taxonomies and streamline integration with global marketplaces. Read the full research content to learn more.

    Download

  • A Computer Weekly buyer's guide to intelligent workload management

    One huge advantage digital transformation brings with it is the phenomenon of intelligent workload management. In this 17-page buyer's guide, Computer Weekly looks at the various tools available, asset management best practices and the complications to look out for with hybrid and multicloud deployments.

    Download

  • Computer Weekly – 3 July 2018: Future-proofing Gatwick Airport's technology

    In this week's Computer Weekly, we go behind the scenes at London Gatwick Airport and talk to its CIO about a critical network upgrade to support passenger growth. Our latest buyer's guide examines automation and intelligent systems management. And we assess the latest technologies for boosting storage performance. Read the issue now.

    Download

  • Name Matching Software Tackles AML/KYC Challenges

    As financial institutions face increased AML/KYC challenges, Babel Street's AI-powered name matching software can help by reducing false positives, accelerating identity verification, and streamlining compliance workflows. Learn more about Babel Street Analytics Name Match in this eBook.

    Download

  • Financial service leader’s guide to compliance

    In January of 2025, the EU will begin enforcing the Digital Operational Resilience Act (DORA). This guide provides a more detailed breakdown of the compliance law and provides you with the information and resources you need to prepare your organization to meet the regulations. Access now to learn more.

    Download

  • HIPAA and cloud communications: Compliance guide & more

    With it being reported that approximately 70% of today’s organizations are not HIPAA compliant, it has become critical for leaders to ensure that they take the necessary steps to stay up to date. For many, this starts in their unified communications operations. Access this guide to learn more.

    Download

  • Explore the NIS2 Directive's impact on cybersecurity

    The NIS2 Directive aims to strengthen cybersecurity in the EU, addressing increasingly sophisticated threats. It expands the scope, enhances reporting, and introduces new compliance requirements. Read this e-book to learn how you can become NIS2-compliant.

    Download

  • Revenue acceleration for digital leaders

    This report from KPMG identifies three priorities for organisations to embrace to drive better, quicker and more certain returns.

    Download

  • Unlock the power of a modern CMDB for digital transformation

    An advanced configuration management database(CMDB) can help organizations gain visibility into their complex, hybrid IT infrastructure and manage digital transformation. Learn how a CMDB can provide transparency, security, and process optimization. Read the full white paper to discover the benefits.

    Download

  • Product security: How Cybellum helps with reporting obligations

    The NIS2 is an advancement of the EU’s cybersecurity framework building upon the initial Network and Information Security (NIS) Directive, including specific sections relevant to product security professionals. Use this white paper as a reference to better understand the NIS2 with regards to product security.

    Download

  • AI-Powered Solutions Help Close the AML/KYC Risk-Confidence Gap

    As data volumes and complexity increase, financial institutions face a growing risk-confidence gap in AML/KYC compliance. Babel Street's AI-powered identity intelligence solutions can help close this gap by automating processes, reducing false positives, and providing deeper insights. Read the full product overview to learn how.

    Download

  • Oracle PBCS vs. EPBCS: Which one better aligns with your requirements?

    Oracle’s Planning and Budgeting Cloud Service (PBCS) and Enterprise Planning and Budgeting Cloud Service (EPBCS): is one a better fit for your organization? How are these two tools the same? How are they different? Before you go any further, review this guide to compare your options.

    Download

  • 3 ways to prepare for impending HIPAA Security Rule updates

    Covered entities and business associates should prepare for changes as HHS plans to update the HIPAA Security Rule this spring.

    Download

  • 7 findings about exposure management in 2024

    In 2023, the XM Cyber Continuous Exposure Management (CEM) platform uncovered more than 40 million exposures. To access 7 key findings that these exposures illuminated, and to deepen your understanding of the state of exposure management in 2024, dig into this research report.

    Download

  • How SASE and SD-WAN are making on-premises firewalls redundant

    According to Gartner, by 2024 at least 40% of enterprises will have explicit strategies to adopt SASE, up from less than 1% at year-end 2018. Access this resource to learn how SASE and SD-WAN can make on-premises firewalls redundant.

    Download

  • Data modeling guide

    This document describes core elements you will use to model and handle data in Couchbase CapellaTM (or Couchbase Server). It describes the ways you can structure individual JSON documents for your application, how to store the documents with a Couchbase SDK, and different approaches you may take when you structure data in documents.

    Download

  • How HHS-OIG conducts cybersecurity audits

    Healthcare organizations and HHS entities can use the recommendations provided in HHS-OIG cybersecurity audit reports to strengthen the security of their systems.

    Download

  • What to expect in the NSA's independent dispute resolution process

    The No Surprises Act's independent dispute resolution process provides a channel for payers and providers to negotiate payments without affecting patient spending.

    Download

  • Navigating the Compliance Labyrinth with AI in Finance

    This e-book examines how AI can help financial institutions meet compliance mandates, fight fraud, and improve customer relationships. For example, AI can automate KYC processes, detect money laundering, and provide a holistic view of customers. Read the e-book to discover how AI can address your financial institution's key challenges.

    Download

  • Steps, tools & services to know when developing EPM strategy

    While developing an enterprise performance management (EPM) strategy seems straightforward enough, it’s critical to consider the many processes, people, and systems involved before choosing which path to take. Browse this guide to learn more.

    Download

  • Cloud computing storage key management

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

    Download

  • Named entity disambiguation: Boost your data science efforts

    Named entity disambiguation is a natural language processing technique that resolves ambiguity in text by mapping named entities to specific meanings. Learn about the approaches, challenges, and benefits of this powerful method in the full blog post now.

    Download

  • Accelerating Zero Trust Capabilities eBook

    The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.

    Download

  • 2024 security report: Predictions from 3 CISOs

    In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.

    Download

  • Royal Holloway: Information security of the 2016 Philippine automated elections

    We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.

    Download

  • NIS2 and European boards: 2024 analyst report by ESG

    By the end of 2024, this report by Enterprise Strategy Group (ESG) explains, the “Network and Information Systems 2 (NIS2) directive of the European Union will significantly affect Union countries and nation-states in its periphery.” So, what will that impact look like? Unlock insights in the report.

    Download

  • Protecting your organisation from itself

    This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.

    Download

  • Specialty pharmacy: The value of turnkey expert services

    As medical innovations create new, more complex drugs, health systems need to invest in specialty pharmacy to fully manage the patient’s treatment journey. In this white paper, discover how Omnicell delivers the technology and know-how to accelerate and maximize your specialty pharmacy outcomes.

    Download

  • LogicGate Risk Cloud®: A Next-Generation GRC Management Platform

    Today’s enterprises need modern governance, risk management, and compliance (GRC) software that is adaptive, integrated, and intuitive enough to meet these challenges head-on. For GRC 20/20’s Michael Rasmussen, LogicGate Risk Cloud is a top contender among those solutions.

    Download

  • Tanium & ServiceNow: Delivering Asset Management Peace of Mind

    99% of organizations using CMDB tooling that do not confront configuration item data quality gaps will experience visible business disruptions according to Gartner. So, how can you level-up your CMDB? Browse this e-book to discover how Tanium and ServiceNow deliver asset management peace of mind and can improve your CMDB.

    Download

  • Simplify Security Operations with XDR

    Cyberattacks are a growing threat to America, with growing infrastructure echoing the urgency in safeguarding the security of State, Local and Education (SLED) entities. Fortunately, a new generation of extended detection and response (XDR) tools, like Cisco's XDR solution, help the challenges faced by SLED organizations.

    Download

  • Getting the best out of robotic process automation

    IT leaders are used to doing more with less, but the pandemic has forced many organisations to reassess whether the way processes have always been run, is optimal. With people having to work from home, many organisations have needed to automate previous manual tasks, in order to remain operational.

    Download

  • NIS2 Compliance: 9-Point Checklist

    In its updated directive, NIS2 expands its scope, impacting new sectors like energy, banking and more. So, does your organization fall under the new scope? Find out in this white paper, which provides a 9-point checklist for achieving NIS2 compliance.

    Download

  • Discovering & eliminating shadow cloud workloads

    How can organizations discover shadow cloud workloads and eliminate the risk they pose? Learn how to examine your cloud environment the way adversaries do and manage your exposure properly in this white paper.

    Download

  • Unlock the power of your data with a semantic layer

    The growth of data complexity and the need for seamless data integration across systems have propelled the need for a semantic layer. This white paper explores how a semantic layer can optimize data reuse, enhance data governance, and unlock the full potential of enterprise data. Read the full white paper now to learn more.

    Download

  • 3 modern SOC challenges & how to address them

    Along with digging into 3 issues challenging today’s SOC teams, this overview explores how your organization can overcome the obstacles by leveraging an AI-driven SOC platform. Read on to unlock the complete insights.

    Download

  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.

    Download

  • The DORA act explained

    The Digital Operational Resilience Act (DORA) went into effect in 2023, but do you know what is required from you to stay compliant? Explore this white paper to find out and learn how Contrast Security helps support DORA regulation.

    Download

  • 5 drivers of value-based care success

    In recent years there has been a push for digital transformation in the value-based care terrain in healthcare, but there needs to be a clear strategy and assessment process entities to determine if digital transformation is appropriate. Read this eBook to ensure that you undertake an intelligent and methodical digital transformation.

    Download

  • 7 best practices for Web3 security risk mitigation

    Web3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.

    Download

  • Navigating risk adjustment challenges for healthcare into 2024

    Without risk adjustment, Medicare and Medicaid would be unable to properly provide for millions of Americans. In this comprehensive 25-page e-book, explore an analysis and forecast by ZeOmega’s experts in risk adjustment solutions,

    Download

  • IT4IT for Managing the Business of IT

    IT4IT™ for Managing the Business of IT – A Management Guide, from The Open Group, provides best practice advice and focuses on the data and automated workflows needed to manage IT services in a lean, agile and business-focused way.

    Download

  • Managing third-party identity risk

    Today’s organizations no longer reside behind a digital perimeter, with countless other third-party entities presenting access risk. SailPoint Non-Employee Risk Management aims to bolster identity security by extending advanced governance controls to large and complex populations of non-employee users. Download this data sheet to learn more.

    Download

  • Managing the third-party risk of non-employee identities

    Organizations utilize non-employee workers and services to supplement their workforce, but each of these non-employee entities presents an increase in third-party risk. This white paper explores how non-employee identities present new demands to organizations’ existing authentication systems and protocols. Read on to learn more.

    Download