IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Assessing Risk

RSS Feed   
Assessing Risk Reports
 
Insider Threat Report Executive Summary
sponsored by Verizon
RESEARCH CONTENT: Since insider threats have few barriers to overcome, it can take months or years for the threat to be discovered. Therefore, rogue partners, careless contractors and negligent (or malicious) employees can seriously disrupt your organization. In Verizon's Insider Threat Report, learn more about insider threats and how to prevent them.
Posted: 03 May 2019 | Published: 03 May 2019

Verizon

Episode 3: The Compromise
sponsored by Proofpoint
WEBCAST: This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how unintentional insider behaviors can lead to credential compromise and wire transfer fraud.
Posted: 07 Jun 2019 | Premiered: Jun 7, 2019

Proofpoint

Webcast: Solutions for Privileged Account Resilience
sponsored by One Identity
WEBCAST: Tune into this informative webcast with two security experts from One Identity. They discuss solutions for Privileged Account Resilience and how to overcome the challenges that come with them.
Posted: 14 Jun 2019 | Premiered: Jun 14, 2019

One Identity

How Mobile Devices Simplify Manufacturing Compliance and Risk Management
sponsored by Samsung Electronics
RESOURCE: The global footprint of many manufacturing companies makes compliance with mandatory regulations particularly challenging. In this article, explore some potential bottlenecks in production processes that present challenges for manufacturing compliance and how mobile devices can deliver efficiencies.
Posted: 29 Mar 2019 | Published: 11 Mar 2019

Samsung Electronics

Maturing a Threat Intelligence Program
sponsored by ThreatConnect
WHITE PAPER: In order to fully harness the power of threat intelligence, your organization must make the case for an intelligence-driven security approach and identify the right people to staff the program. In this white paper, explore how ThreatConnect's Threat Intelligence Maturity Model can help you better apply threat intelligence at your organization.
Posted: 01 May 2019 | Published: 01 May 2019

ThreatConnect

Laying the Foundation for GDPR Compliance
sponsored by SentryOne LLC
WHITE PAPER: The GDPR is in effect but, many businesses are still struggling with how to properly implement protections across systems and processes. This white paper discusses the 4 key rights that European citizens have under GDPR, and what businesses need to do to ensure they are GDPR compliant.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

SentryOne LLC

State and Local Governments Chart Their Path Toward Improved Digital Security
sponsored by Dell EMC
RESOURCE: State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
Posted: 14 May 2019 | Published: 14 May 2019

Dell EMC

AXCESS Financial Finds & Stops Fraud with Interaction Analytics
sponsored by CallMiner
CASE STUDY: AXCESS Financial needed a way to solve their fraud problem. In order to do this they deployed CallMiner Eureka Interaction Analytics which helped them to identify fraudsters. In this case study, learn more about how AXCESS Financial turned insight into prevention using CallMiner Eureka.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

CallMiner

Shipping Fast
sponsored by Trend Micro, Inc.
WEBCAST: In the security world, you don't normally hear people talking about moving fast. However, a modern and resilient security strategy is just as fast as the rest of your business. In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses the benefits of reducing the number of security tools your team uses.
Posted: 05 Apr 2019 | Premiered: Apr 5, 2019

Trend Micro, Inc.

Security and Compliance Fears Keep Companies from Cloud Migration
sponsored by Ziften
RESOURCE: Migrating parts of your IT operations to the cloud can seem like a huge chore, and a dangerous one at that. There are a lot of security issues to deal with when migrating to the cloud. In this article, learn about how to keep your environment secure before, during and after a cloud migration.
Posted: 25 Mar 2019 | Published: 27 Feb 2019

Ziften
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement