Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed   
Enterprise Risk Management Reports
 
Spreadsheet-Based GRC: A Self-Assessment to Gauge the Effectiveness of Your Program
sponsored by Lynx Technology Partners
RESOURCE: This resource offers a self-assessment to gauge the effectiveness of your spreadsheet-based governance, risk and compliance program.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Lynx Technology Partners

The 5 News Headlines You Don't Want to Be About Your Organization
sponsored by Juniper Networks
RESOURCE: 1/4 of major organizations experience at least one network breach each month, according to The Cyber Security Breaches Survey. This resource provides 5 security worse case scenarios and advice on how to prevent your organization from appearing in cyberattack news headlines.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

Juniper Networks

Making Risk Management More Effective With Security Ratings
sponsored by BitSight
WHITE PAPER: With the growth and sophistication of cyber threats and daily reports of security breaches, cyber risk is high on the list of most significant risks that organizations face. This resource offers 3 risk management approaches organizations have taken to effectively improve their security.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

BitSight

Building a Secure Foundation to Reduce Cyber Risk
sponsored by Tenable, Inc.
WHITE PAPER: According to the Dimensional Research survey "Trends in Cybersecurity Frameworks and Foundational Controls", 52% of respondents said their cybersecurity program has major gaps or weaknesses, or many minor ones. This resource offers a strategy for building a secure foundation to reduce cyber risks within your organization.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Tenable, Inc.

The Cybersecurity Blueprint
sponsored by Solarwinds MSP
WHITE PAPER: As cybersecurity attacks grow in variety, taking a broad layer approach with clients is crucial. Explore this resource to uncover the 4 pillars of a comprehensive, layered security approach and learn how to provide strong layered security.
Posted: 25 Jan 2018 | Published: 31 Dec 2017

Solarwinds MSP

Computer Weekly – 30 January 2018: Davos debates global tech risks
sponsored by ComputerWeekly.com
EBOOK: In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.
Posted: 26 Jan 2018 | Published: 25 Jan 2018

ComputerWeekly.com

CISO Interview
sponsored by ServiceNow
WEBCAST: Take a look at this webcast interview to learn about security issues organizations are trying to overcome and how CISOs are dealing with the challenges of cybersecurity.
Posted: 01 Feb 2018 | Premiered: Feb 1, 2018

ServiceNow

Attack Your Attack Surface: How to Reduce Your Exposure to Cyberattacks
sponsored by Skybox Security
WHITE PAPER: The average enterprise today must defend against exploitation of an attack surface composed of tens of thousands of potentially exploitable attack vectors on its networks and system. This resource offers insight into reducing exposure to cyberattacks with an attack surface visualization strategy.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Skybox Security

The CISO'S Guide to Machine Learning & User and Entity Behavioral Analytics
sponsored by Hewlett Packard Enterprise
EBOOK: Utilize this 40-page Cisco e-book to learn how combining all of a user's data along with machine learning insights, UBEA becomes a powerful approach to detecting threats inside an organization and empower analyst with new threat hunting capabilities.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Hewlett Packard Enterprise

Controlling and ManagingPrivileged Access
sponsored by One Identity
WHITE PAPER: Managing privileged accounts is becoming more critical as security and compliance initiatives grow. This white paper explores the risks associated with privileged accounts, and offers an easy-to-use risk mitigation strategy, which enables granular access control and accountability.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement