Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed   
IT Risk Management White Papers (View All Report Types)
 
Best Practices in Transaction Monitoring Scenario Threshold Tuning and Model Verification
sponsored by SAS
WHITE PAPER: How can your bank lower the cost of compliance? In this white paper, discover the analytic techniques responsible for reducing the costs of compliance within AML banking programs, and explore how implementing a process of periodic model verification, threshold tuning, and validation, can optimize your banks AML compliance standards.
Posted: 18 Mar 2019 | Published: 31 Dec 2017

SAS

A Guide to Digital Identity Verification: The Technology and Trends
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
sponsored by ServiceNow
WHITE PAPER: Discover 8 simple steps to slash audit costs, improve efficiency, and minimize risk within your organization by automating your GRC.
Posted: 01 Oct 2018 | Published: 01 Oct 2018

ServiceNow

The Future of Model Risk Management for Financial Services Firms
sponsored by SAS
WHITE PAPER: In this white paper, discover how model risk management (MRM) groups are helping banks keep up with evolving regulations, and uncover the 5 essential features of successful MRM. To plan for the future of MRM, download this white paper today, and learn more about the technology fueling your MRM journey.
Posted: 19 Mar 2019 | Published: 31 Dec 2016

SAS

A Quick History of IoT Botnets
sponsored by Radware
WHITE PAPER: Gartner estimates that there will be 20 billion connected devices by 2020. Access this resource to learn about the history of IoT botnets and how the rise of connected devices can bring upon the rise of dangerous bot attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Radware

Beyond FTP: Securing and Managing File Transfers
sponsored by HelpSystems
WHITE PAPER: This white paper examines how IT security teams can bring the implementations of file transfer protocol (FTP) into a more modern, secure framework to increase user productivity and enhance the manageability of file transfers.
Posted: 26 Jun 2018 | Published: 26 Jun 2018

HelpSystems

Effectively Monitor, Prioritize, and Automate Response to Third-Party Risk
sponsored by ServiceNow
WHITE PAPER: While assessing vendor risk on a regular basis is critical, it can often be an extremely time-consuming and error-prone exercise involving spreadsheets, email, and rudimentary risk management tools. Learn how to build a more advanced vendor risk management program.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

ServiceNow

Seamless Security Integration During a Merger or Acquisition Process
sponsored by Dell SecureWorks
WHITE PAPER: In addition to the challenges of brokering and completing a merger or acquisition, the logistics of integrating two or more businesses and closing potential risk gaps can be staggering. In this white paper, learn how a cybersecurity firm can deliver crucial expertise to facilitate a seamless integration of each company's cybersecurity program.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

Dell SecureWorks

Four Steps to Developing a World-Class Security Program
sponsored by Dell SecureWorks
WHITE PAPER: A reactive security approach is all too common, even though the question is not if a company will suffer an incident but when. By adopting a proactive stance, organizations minimize the likelihood of suffering a breach. In this white paper, discover 4 steps to developing a world-class security program.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

Dell SecureWorks

Overcoming Payment Declines
sponsored by Riskified
WHITE PAPER: In the cutthroat eCommerce environment, any overlooked leak in the payment funnel can be devastating. In this white paper, learn more about payment declines including what they are, why it's hard to measure their impact and where they are most likely to occur.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Riskified
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement