Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed   
Enterprise Risk Management Reports
 
Incident Responder's Field Guide
sponsored by Digital Guardian
RESOURCE: You've been breached. Now what? Get access to these easy-to-follow steps for creating an incident response plan in the event of a cybersecurity attack.
Posted: 18 Jul 2018 | Published: 31 Dec 2016

Digital Guardian

Solving the Cybersecurity Skills Shortage
sponsored by Arctic Wolf
WEBCAST: 22% of respondents suffered a security breach at their law firms, according to a survey conducted by the American Bar Association. Download this webcast to explore the challenges of finding cybersecurity personnel and what you can do to find qualified personnel that will help you protect your data.
Posted: 10 Aug 2018 | Premiered: Aug 10, 2018

Arctic Wolf

Reporting to the Board - A Toolkit for CISOs
sponsored by Dell SecureWorks
RESOURCE: Boards oversee risk, not operations. Rather than tell them how your cybersecurity program works, show them how and how well risks are being managed. Download this CISO toolkit for tips and techniques to approach your board of directors about cybersecurity.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Dell SecureWorks

Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal
sponsored by Tenable
WHITE PAPER: Find out what steps you can take today to improve your vulnerability assessment strategy – no matter where you are on the maturity scale
Posted: 20 Aug 2018 | Published: 08 Aug 2018

Tenable

A Best Practices Guide for Comprehensive Employee Awareness Programs
sponsored by MediaPRO
RESOURCE: The 2018 Verizon Enterprises Data Breach Investigations Report found that one in five data breaches in 2017 involved human error. Properly training your employees on security is essential now more than ever. Download this guide to learn how your organization can build an effective employee security awareness program, today.
Posted: 25 Sep 2018 | Published: 25 Sep 2018

MediaPRO

Defend your Digital Business from Cyberattacks
sponsored by LogRhythm, Inc.
ANALYST REPORT: Download this Forrester Executive Overview to explore the Zero Trust Model, how it can accelerate digital business, and how you can start defending your customers.
Posted: 09 Nov 2018 | Published: 09 Nov 2018

LogRhythm, Inc.

Busting Threat Intelligence Myths: A Guide for Security Pros
sponsored by Recorded Future
WHITE PAPER: There are many misconceptions about what threat intelligence is, leading many security pros to believe that threat intelligence doesn't have an advantage to bring into their particular role. Explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Recorded Future

The Confidence Game: How to Build a People-centric Cybersecurity Strategy
sponsored by Proofpoint, Inc.
VIDEO: Learn how your organization can take a people-centric approach to security and find out how humans are increasingly becoming the #1 target for cyberattacks.
Posted: 30 Oct 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

Five Ways Privileged Access Management Prevents Insider Threats
sponsored by HelpSystems
WHITE PAPER: Over a quarter of attacks are perpetrated by insiders, according to The Verizon Data Breach Report (2018) and threats coming from the inside are notoriously tough to spot. Find out how you can determine a potential threat without preventing employees from accessing the data they need to do their jobs.
Posted: 05 Jul 2018 | Published: 05 Jul 2018

HelpSystems

Secure On- and Off- Premises IT Service Delivery Platforms
sponsored by Hewlett Packard Enterprise
EBOOK: Learn how to protect your most organizationally critical digital assets and their interactions, regardless of location or device. Download this eBook so you can adhere to these security checklists.
Posted: 16 Jul 2018 | Published: 31 Oct 2017

Hewlett Packard Enterprise
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement