Business of Information Technology  >   Business Management  >   Risk Management  >  

Environmental Health

RSS Feed   
Environmental Health Reports
 
Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

A New Era in On-boarding - It's All About Managing Relationships
sponsored by IBM
WHITE PAPER: In this technological overview, explore how IBM's Partner Engagement Manager (PEM) can help your organization improve its onboarding process. Review PEM product features and benefits, and decide if PEM is right for your organization.
Posted: 30 May 2019 | Published: 30 May 2019

IBM

Gauge your Data Security and Privacy Maturity
sponsored by Akamai Technologies
ANALYST REPORT: Download this Forrester assessment so you can gauge where your firm is on its data security and privacy journey and discover which core competencies you need to strengthen or develop.
Posted: 07 May 2019 | Published: 07 May 2019

Akamai Technologies

Shipping Fast
sponsored by Trend Micro, Inc.
WEBCAST: In the security world, you don't normally hear people talking about moving fast. However, a modern and resilient security strategy is just as fast as the rest of your business. In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses the benefits of reducing the number of security tools your team uses.
Posted: 05 Apr 2019 | Premiered: Apr 5, 2019

Trend Micro, Inc.

Why Method R Should Form a Core Part of Your Journey to the Cloud
sponsored by Cintra
WHITE PAPER: With this white paper, discover how a cloud transition will affect your application and website performance, and learn how Cintra's Method R Workbench can help resolve Oracle-based latency issues before they impact customer experiences.
Posted: 11 Apr 2019 | Published: 31 Dec 2018

Cintra

Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
sponsored by Forcepoint
WEBCAST: Some approaches to information security simply won't deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy. In this webcast, Doug Landoll discusses how to take a risk-first approach to addressing information security.
Posted: 15 May 2019 | Premiered: May 15, 2019

Forcepoint

5 Ways CIOs Can Optimize Communication With Other Executives
sponsored by BitSight
WHITE PAPER: Despite the fundamental importance of information technology and security, many organizations continue to treat it as separate from the rest of the organization. In this white paper, explore 5 ways CIOs can optimize communication with other executives to help strengthen an organization's security.
Posted: 23 May 2019 | Published: 23 May 2019

BitSight

How to Migrate from Oracle Reports to TIBCO JasperReports for Dummies
sponsored by TIBCO
EBOOK: In this e-book, discover why and how to migrate from Oracle Reports to TIBCO JasperReports. Gain access to a 4 step migration plan for modern reporting, and explore results from those who have already migrated by gleaning insight from real-world use cases.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

TIBCO

The Insider Threat: Real Defense for Real Businesses
sponsored by Proofpoint
WEBCAST: How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place? In this webinar, Kate Burnell, Global Insider Threat Specialist at Dtex Systems and Kurt Wescoe, Chief Architect at Wombat Security discuss how cybersecurity professionals can address the insider threat without shutting down business.
Posted: 30 May 2019 | Premiered: Nov 30, 2018

Proofpoint

The Cost of Third-Party Cybersecurity Risk Management
sponsored by CyberGRX
RESEARCH CONTENT: Third-party breaches remain a dominant security challenge for organizations, with over 63% of breaches linked to a third party, according to the Ponemon Institute. In this report, find out more about the cost and efficacy of the tools and processes used to conduct third-party cyber risk management today.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

CyberGRX
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement