Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed   
Business Risk Analysis Reports
How To Continuously Improve Risk Management Within Leading Cybersecurity Programs
sponsored by AT&T Cybersecurity
WHITE PAPER: In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Risk Management
AT&T Cybersecurity

Cybereason Mobile
sponsored by Cybereason
DATA SHEET: Mobile devices are now more popular for enterprise use and workplace productivity than desktops or laptops. With millions of malware threats for a growing variety of devices and OS’s alongside cloud and mobile-first apps, the risks are complex and expanding. Don’t get left behind, view this data sheet to learn how to keep mobile devices secure.
Posted: 21 Aug 2020 | Published: 21 Aug 2020


Risk In A Real-time World
sponsored by Dataminr
RESEARCH CONTENT: Dataminr commissioned Forrester Consulting to evaluate current risk management priorities and practices and how real-time information can be utilized for decision-making in risk management and crisis response. Download this research paper to learn more about Forrester’s findings and the power of real-time information.
Posted: 02 Jun 2021 | Published: 02 Jun 2021

TOPICS:  Risk Management

The Cost of Making the Front Page: What You Need to Know About the Growing Threat of Public Breaches
sponsored by Dell SecureWorks
WHITE PAPER: A September 2018 attack on British Airways costing them close to $1B USD did not involve data encryption or ransom demands. Instead it saw cybercriminals using third-party code on the BA website to fraud 380,000 people out of their credit card numbers. These ‘public breaches’ are on the rise – read this white paper to learn more.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Dell SecureWorks

COVID-19 Creates Perfect Storm for Insider Risk Growth, Organizations Unprepared to Protect Data
sponsored by Code 42
RESEARCH CONTENT: Download the Code42 2021 Data Exposure Report on Insider Risk (with Ponemon Institute survey data) to gain a better understanding of the many dimensions that impact organizations’ security posture around insider risk to data.
Posted: 14 May 2021 | Published: 14 May 2021

TOPICS:  Risk Management
Code 42

Top Security and Risk Management Trends
sponsored by Palo Alto Networks
RESOURCE: Acting on the relentless pace of digital business and ongoing transition to the cloud, security and risk management leaders can and must improve resilience, better support business objectives and elevate their organizational standing. View this Gartner resource detailing top security and risk management trends to give you the upper hand.
Posted: 25 Mar 2021 | Published: 27 Feb 2020

Palo Alto Networks

The CISO's guide to supply chain security
sponsored by
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

Risk Tech 100 2021
sponsored by MetricStream
ANALYST REPORT: As organizational risk increases, risk management professionals must get an objective assessment of technology vendors in their market in order to make the best decisions. Download the RiskTech100 for 2021, a globally acknowledged, comprehensive independent study of the world’s major players in risk and compliance technology.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TOPICS:  Risk Management

Risk-Based Authentication A Critical Element To Any Zero-Trust Deployment
sponsored by WatchGuard Technologies, Inc.
EBOOK: MSPs looking to enhance multi-cloud security would do well to consider risk-based authentication, which can help you fuse flexibility and higher protection into one coherent, customized setup. Download this e-book to discover how risk policies and multi-factor authentication can be applied in a manner that promotes secure, flexible architectures.
Posted: 15 Jul 2021 | Published: 15 Jul 2021

WatchGuard Technologies, Inc.

Role Of Erm In Managing Risks Related To New Technologies
sponsored by The Santa Fe Group
WHITE PAPER: As technology grows stronger, risk becomes greater. Because to a degree, IT departments are jumping into the unknown with each new investment they make, so it’s important that the risks associated with these new technologies are adequately mitigated. Dive into this white paper to view 7 steps to effective risk management for emerging tech.
Posted: 12 Mar 2021 | Published: 12 Mar 2021

TOPICS:  Risk Management
The Santa Fe Group

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences