All resources sponsored by:

BitSight

13 Matches
Better Security and Business Outcomes with Security Performance
sponsored by BitSight
ANALYST REPORT:BitSight commissioned Forrester Consulting to evaluate how security leaders measure their enterprise’s security performance. Download the full study to learn more about Forrester's key recommendations for building a successful security performance management program.
Posted: 10 Oct 2019 | Published: 10 Oct 2019
Get This Now


Utility Regulations Demand Robust Third-Party Risk Management
sponsored by BitSight
WHITE PAPER:In this white paper, learn how utilities organizations can comply with regulations and prevent cyberattacks, data breaches, and potential physical harm by using a robust third-party risk management program.
Posted: 18 Jul 2019 | Published: 18 Jul 2019
Get This Now


The Challenges & Urgency of Managing Third-Party Risk
sponsored by BitSight
WHITE PAPER:Managing cyberthreats is becoming more challenging and urgent as businesses expand their ecosystems through their reliance on third parties. As a result, cyberthreats are top concerns for modern organizations worldwide. In this white paper, learn how organizations can better manage their third-party risk.
Posted: 18 Jul 2019 | Published: 18 Jul 2019
Get This Now


An Expanding Attack Surface: 5 Tips to Manage Third-Party Risk
sponsored by BitSight
WHITE PAPER:In this e-book, learn 5 actionable steps to help you establish an effective third-party risk management program.
Posted: 18 Jul 2019 | Published: 18 Jul 2019
Get This Now


5 Ways CIOs Can Optimize Communication With Other Executives
sponsored by BitSight
WHITE PAPER:Despite the fundamental importance of information technology and security, many organizations continue to treat it as separate from the rest of the organization. In this white paper, explore 5 ways CIOs can optimize communication with other executives to help strengthen an organization's security.
Posted: 23 May 2019 | Published: 23 May 2019
Get This Now


How to Strengthen Your Vendor Risk Management Strategy Through Automation
sponsored by BitSight
RESOURCE:To reduce third-party cyber-risk organizations need processes and solutions that leverage automation. In this resource, Stephen Boyer, CTO of BitSight, explains how organizations can incorporate automation to develop more mature vendor risk management programs.
Posted: 23 May 2019 | Published: 23 May 2019
Get This Now


A Risk Manager's Guide to the General Data Protection Regulation (GDPR)
sponsored by BitSight
RESOURCE:Learn how you can evaluate your enterprise's security measures and maintain ongoing compliance with GDPR.
Posted: 17 Jul 2018 | Published: 17 Jul 2018
Get This Now


The Secret to Creating a Cyber Risk-Aware Organization
sponsored by BitSight
WHITE PAPER:Cybersecurity within an organization is no longer just the security pro's responsibility. It's everyone's. Find out why your business could benefit from a security awareness training and become a cyber risk-aware organization.
Posted: 17 Jul 2018 | Published: 17 Jul 2018
Get This Now


Risk Assessment: The Roles Vendors and Frameworks Play
sponsored by BitSight
EGUIDE:Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.
Posted: 23 Feb 2017 | Published: 15 Feb 2017
Get This Now


Security Rating Scores for Third-Party Vendors Catching On
sponsored by BitSight
EGUIDE:In this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry.
Posted: 23 Feb 2017 | Published: 15 Feb 2017
Get This Now


Risk Management: Best and Worst Practices
sponsored by BitSight
EGUIDE:Discover the downsides to digitization, how to manage the risk to your organization's data, and 5 top IT risk management mistakes.
Posted: 15 Feb 2017 | Published: 15 Feb 2017
Get This Now


Third-Party Risk Management: Evaluating and Contracting with Vendors
sponsored by BitSight
EGUIDE:This expert e-guide describes how to use standardized documentation for third-party risk assessment in order to minimize risk before deciding on a vendor. Access this resource now for advice on the security-related clauses that financial institutions need to include in their vendor contracts in order to comply with regulatory requirements.
Posted: 02 Mar 2016 | Published: 26 Feb 2016
Get This Now


Security: Communicating to the Board of Directors and Evaluating Vendors' Promises
sponsored by BitSight
EGUIDE:This informative e-guide provides expert advice on how to plan security assessment reports to effectively communicate key security elements to the board of directors. Inside, also discover how a vendor security checklist can help you weigh your security needs against vendors' claims.
Posted: 02 Mar 2016 | Published: 26 Feb 2016
Get This Now


13 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement