Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed   
IT Risk Management Reports
 
RISK-BASED AUTHENTICATION: A Critical Element to Any Zero-Trust Deployment
sponsored by Panda Security
EBOOK: Access this e-book to read about the powerful connection between zero-trust adoption and risk policies, and how multi-factor authentication sits at the core of these approaches by bringing the technology to protect user identities and Cloud applications.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

TOPICS:  Risk Management
Panda Security

How to fight hackers & respond to ransomware
sponsored by Fidelis
EGUIDE: Cyberthreats aren’t going away any time soon. It’s vital that you take steps to ready your organization for any attack that comes your way. In this expert e-guide, explore 5 actionable deception-tech steps for fighting hackers as well as 9 steps for creating a ransomware incident response plan. Open now to put your best security foot forward.
Posted: 20 Jan 2021 | Published: 15 Jan 2021

Fidelis

ServiceNow Risk & Compliance: Advancing GRC, Risk & BCM
sponsored by ServiceNow
RESEARCH CONTENT: Download this Forrester Total Economic Impact Report for exclusive insight into the efficiencies and advancements in governance, risk and compliance (GRC), vendor risk management (VRM) and business continuity management (BCM) with ServiceNow Risk and Compliance – as well as an analysis of costs.
Posted: 10 Feb 2021 | Published: 31 Jan 2021

ServiceNow

Analyst1 for the Healthcare Industry
sponsored by Analyst1
WHITE PAPER: The healthcare industry is uniquely vulnerable to cyberattacks and investing in the right tools is important. Analyst1 is a powerful solution for training threat teams on the critical skills needed to identify malicious activity. Access this white paper to learn more about the benefits and capabilities of Analysist1.
Posted: 02 Jun 2021 | Published: 02 Jun 2021

TOPICS:  Risk Management
Analyst1

CW Innovation Awards: SIA taps blockchain for loyalty app
sponsored by ComputerWeekly.com
EGUIDE: In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.
Posted: 11 May 2021 | Published: 11 May 2021

ComputerWeekly.com

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

Evaluating Data-Centric Protection Solutions
sponsored by Comforte AG
EBOOK: Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

Comforte AG

Emerging Third Party Risks Threaten Operational Resilience In Financial Services
sponsored by Interos
WHITE PAPER: After years of outsourcing non-core functions, and using services provided by affiliates, financial institutions often find themselves dealing with complex—and risky—supply chains. In this white paper, learn about third-party risk management (TPRM) and how it can help FSIs address these challenges, and ultimately improve operational resilience.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Interos

Methodology of an IAM Introduction
sponsored by Beta Systems
WHITE PAPER: IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Beta Systems

Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
sponsored by ComputerWeekly.com
RESOURCE: Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences