Business of Information Technology  >   Business Management  >   Risk Management  >  

Environmental Health

RSS Feed   
Environmental Health Reports
 
Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Cybersecurity Risk Management Simplified
sponsored by CyberSaint
DATA SHEET: There could be no greater luxury in today’s unpredictable world than having cybersecurity and risk management simplified. In this white paper, you can learn about a standardized risk management platform that allows you to integrate your strategy for a unified approach, manage expectations for risk reduction, and intelligently present cost.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

CyberSaint

Rapid Response IT Business Continuity Checklist
sponsored by Habour IT
RESOURCE: As the COVID-19 pandemic continues to escalate, businesses worldwide are adapting to meet unprecedented challenges. If you’re looking for an effective framework for identifying these challenges and setting priorities, read this rapid response IT business continuity checklist. It may help you get a technical sense of where your organization stands.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

Habour IT

An Overview of Insider Threat Management
sponsored by Proofpoint
EBOOK: The average cost of an insider-caused cybersecurity incident has grown to $11.45 million – and these attacks are becoming more frequent, too. In this e-book, enhance your understanding of insider threats by looking at industry specific concerns, common use cases, the increasingly popular people-centric approach, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Proofpoint

2020 SMB Cyberthreat Landscape
sponsored by Acronis
RESOURCE: Contrary to a popular misconception, SMBs are targeted at the same rate (and by the same means) as larger enterprises. However, SMBs typically lack the resources of a larger enterprise – making attacks potentially more damaging. Read this infographic to learn more about the SMB cyberthreat landscape.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Acronis

Identity & Access Management from IBM
sponsored by IBM
RESOURCE: Although intricate, identity and access management (IAM) has become a key practice for effective risk management and information security programs. The following resource contains an interactive whitepaper, which uses a helpful metaphor to demonstrate the value of IAM.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

Lockdown Lessons
sponsored by Webroot
WHITE PAPER: Network security is the immune system of an organization. If a business does not maintain a healthy immune system, then it’s vulnerable to a host of rapidly evolving threats. If you want to learn how to best secure your network, read this white paper from Webroot, which details best practices and innovative methods of protection.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Webroot

Beyond COVID-19 Webinar
sponsored by Hyperproof
WEBCAST: COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.
Posted: 14 Sep 2020 | Premiered: Sep 14, 2020

Hyperproof

Transforming Compliance
sponsored by riskconnect
RESOURCE: This e-book will help you transform compliance from a check-the-box function to a well-oiled machine that seamlessly integrates people, processes, and technology with data-driven visibility to champion the organization's future.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

TOPICS:  Risk Management

Simple Steps for Setting Up A Project Risk Register
sponsored by LogicGate
RESOURCE: For sophisticated projects, organizations typically turn to a project manager to assess and plan for risks. One emerging practice being used by project managers is the curation of a risk register. But what is a risk register? What does it entail? How can your organization get started making one? Read on to find out.
Posted: 06 Oct 2020 | Published: 18 Jun 2019

LogicGate
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info