Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed   
Enterprise Risk Management Reports
 
Beyond COVID-19 Webinar
sponsored by Hyperproof
WEBCAST: COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.
Posted: 14 Sep 2020 | Premiered: Sep 14, 2020

Hyperproof

2019 Report for Identity Governance & Administration
sponsored by IBM
RESOURCE: For the fifth consecutive year, Gartner has named IBM a Leader in the Magic Quadrant for Identity Governance & Administration (IGA). With IBM, clients have access to the broadest set of IGA capabilities on their journey to the cloud.
Posted: 07 Aug 2020 | Published: 09 Oct 2019

IBM

Public Cloud Adoption in Financial Services- 7 key considerations for CIOs (Celent paper)
sponsored by IBM
WHITE PAPER: Access this white paper for 7 critical considerations as financial institutions plan and execute their technology transformation and public cloud migration strategies.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

IBM

Simple Steps for Setting Up A Project Risk Register
sponsored by LogicGate
RESOURCE: For sophisticated projects, organizations typically turn to a project manager to assess and plan for risks. One emerging practice being used by project managers is the curation of a risk register. But what is a risk register? What does it entail? How can your organization get started making one? Read on to find out.
Posted: 06 Oct 2020 | Published: 18 Jun 2019

LogicGate

Cybersecurity Risk Management Simplified
sponsored by CyberSaint
DATA SHEET: There could be no greater luxury in today’s unpredictable world than having cybersecurity and risk management simplified. In this white paper, you can learn about a standardized risk management platform that allows you to integrate your strategy for a unified approach, manage expectations for risk reduction, and intelligently present cost.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

CyberSaint

Managing Digital Risk: The Security Challenge Beyond Your Perimeter
sponsored by Mimecast
WHITE PAPER: Today’s security leaders are feeling the pressure that cyber risks presents to their organization’s reputation. But managing digital risk can sometimes be resource exhaustive. Read this Mimecast guide for an overview of modern challenges and how to overcome them.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Mimecast

Airbus Cybersecurity Strengthens its Threat Intelligence with ThreatQuotient
sponsored by ThreatQuotient
CASE STUDY: How do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

ThreatQuotient

How to Get the Most Value out of Your Penetration Test
sponsored by RSA Conference
WEBCAST: At RSA Conference, Ed Skoudis from the SANS Institute facilitated a problem-solving discussion in the RSAC Engagement Zone. Jump into this webcast to see how he follows up on that discussion. He shares insights into what he learned from the community on getting the most value from penetration testing.
Posted: 07 Jul 2020 | Premiered: May 5, 2020

RSA Conference

Manage Security Risk with Red Hat Insights
sponsored by Red Hat
WHITE PAPER: Access this white paper to learn about Red Hat Enterprise Linux, a tool that offers 5 key benefits for organizations looking to analyze, prioritize, and remediate issues as well as report their status.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Red Hat

Identity & Access Management from IBM
sponsored by IBM
RESOURCE: Although intricate, identity and access management (IAM) has become a key practice for effective risk management and information security programs. The following resource contains an interactive whitepaper, which uses a helpful metaphor to demonstrate the value of IAM.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info