All resources sponsored by:

BitSight

15 Matches
5 Ways CIOs Can Optimize Communication With Other Executives
sponsored by BitSight
WHITE PAPER:Despite the fundamental importance of information technology and security, many organizations continue to treat it as separate from the rest of the organization. In this white paper, explore 5 ways CIOs can optimize communication with other executives to help strengthen an organization's security.
Posted: 23 May 2019 | Published: 23 May 2019
Get This Now


How to Strengthen Your Vendor Risk Management Strategy Through Automation
sponsored by BitSight
RESOURCE:To reduce third-party cyber-risk organizations need processes and solutions that leverage automation. In this resource, Stephen Boyer, CTO of BitSight, explains how organizations can incorporate automation to develop more mature vendor risk management programs.
Posted: 23 May 2019 | Published: 23 May 2019
Get This Now


Third-Party Cyber-Risk for Financial Services: Blind Spots, Emerging Issues & Best Practices
sponsored by BitSight
RESEARCH CONTENT:Today's complex business world means that organizations need to work with third parties. While this is critical, the exchange of sensitive information creates a new set of security risks. In this research report, explore key findings from a survey aimed to assess how financial institutions are responding to third-party cyber-risk.
Posted: 22 May 2019 | Published: 30 Apr 2019
Get This Now


Cybersecurity Benchmarking & Security Performance Management
sponsored by BitSight
WHITE PAPER:A new, data-driven security performance management approach is required to maintain security, minimize risk, and reduce costs. The key component of this new data-driven approach is the security rating. In this white paper, explore how the approach can be applied to security performance management, benchmarking and reporting.
Posted: 22 May 2019 | Published: 22 May 2019
Get This Now


A Risk Manager's Guide to the General Data Protection Regulation (GDPR)
sponsored by BitSight
RESOURCE:Learn how you can evaluate your enterprise's security measures and maintain ongoing compliance with GDPR.
Posted: 17 Jul 2018 | Published: 17 Jul 2018
Get This Now


The Secret to Creating a Cyber Risk-Aware Organization
sponsored by BitSight
WHITE PAPER:Cybersecurity within an organization is no longer just the security pro's responsibility. It's everyone's. Find out why your business could benefit from a security awareness training and become a cyber risk-aware organization.
Posted: 17 Jul 2018 | Published: 17 Jul 2018
Get This Now


Using Security Ratings for Cybersecurity Benchmarking
sponsored by BitSight
RESOURCE:Smart benchmarking requires objective, verifiable and actionable metrics on security performance. However, when it comes to quantifying cybersecurity, many companies don't know where to start. This Ebook explores various benchmarking tools and why cybersecurity benchmarking is so important.
Posted: 27 Apr 2018 | Published: 27 Apr 2018
Get This Now


How to Streamline Vendor Risk Management
sponsored by BitSight
WHITE PAPER:Explore how vendor risk management has traditionally been handled, why traditional strategies alone are inadequate, and 3 ways to make vendor risk management more efficient.
Posted: 06 Feb 2017 | Published: 06 Feb 2017
Get This Now


Reporting Cybersecurity to the Board
sponsored by BitSight
WHITE PAPER:Today, boards have to consider the regulatory, fiduciary, organizational, and personal liability that could come from a data breach. Download this free guide today, and you'll have everything you need for your next board presentation to hit all the right points.
Posted: 07 Jun 2016 | Published: 01 May 2016
Get This Now


40 Questions You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER:In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014
Get This Now


Risk Assessment: The Roles Vendors and Frameworks Play
sponsored by BitSight
EGUIDE:Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.
Posted: 23 Feb 2017 | Published: 15 Feb 2017
Get This Now


Security Rating Scores for Third-Party Vendors Catching On
sponsored by BitSight
EGUIDE:In this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry.
Posted: 23 Feb 2017 | Published: 15 Feb 2017
Get This Now


Risk Management: Best and Worst Practices
sponsored by BitSight
EGUIDE:Discover the downsides to digitization, how to manage the risk to your organization's data, and 5 top IT risk management mistakes.
Posted: 15 Feb 2017 | Published: 15 Feb 2017
Get This Now


Third-Party Risk Management: Evaluating and Contracting with Vendors
sponsored by BitSight
EGUIDE:This expert e-guide describes how to use standardized documentation for third-party risk assessment in order to minimize risk before deciding on a vendor. Access this resource now for advice on the security-related clauses that financial institutions need to include in their vendor contracts in order to comply with regulatory requirements.
Posted: 02 Mar 2016 | Published: 26 Feb 2016
Get This Now


Security: Communicating to the Board of Directors and Evaluating Vendors' Promises
sponsored by BitSight
EGUIDE:This informative e-guide provides expert advice on how to plan security assessment reports to effectively communicate key security elements to the board of directors. Inside, also discover how a vendor security checklist can help you weigh your security needs against vendors' claims.
Posted: 02 Mar 2016 | Published: 26 Feb 2016
Get This Now


15 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement