Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed   
IT Risk Management Reports
 
The New Age of Fraud
sponsored by Concur Technologies
WHITE PAPER: Today, there is a realization that fraud is an enterprise risk that falls in the same realm as supply chain, disaster and regulatory risks. But how can companies prevent, detect and mitigate this risk? In this white paper, examine how companies are putting a microscope on employee spend to better prevent and detect fraud across their business.
Posted: 18 Sep 2019 | Published: 31 Aug 2019

Concur Technologies

Evolve your Security Operations Center
sponsored by Optiv
WEBCAST: Digital transformation has revolutionized the way business is conducted. However, cybersecurity hasn’t kept pace with technology changes and trends. Evolving your SOC will help your organization better analyze, plan, build, run and measure. Continue to this video to get started.
Posted: 04 Dec 2019 | Premiered: Sep 23, 2019

Optiv

Continuous Cyber Situational Awareness
sponsored by FireMon
WHITE PAPER: Enterprises can use continuous monitoring to determine the security posture of systems and the organization at any given moment. Organizations of all sizes should consider a comprehensive continuous monitoring strategy to decrease risk. Download this white paper to learn how you can get started.
Posted: 22 May 2019 | Published: 22 May 2019

FireMon

Ransomware - Protect Your Data
sponsored by Commvault
WEBCAST: One trend that is gaining popularity in ransomware is a holistic solution because of its ability to align recovery operations to the value of the data. Access this webcast to learn the key takeaways from the Gartner report, analyze real world ransomware case studies, and discover the 4 key elements of a risk mitigation strategy.
Posted: 17 Jan 2020 | Premiered: Jan 17, 2020

Commvault

Planning for Office 365 Gaps
sponsored by Mimecast
WHITE PAPER: Although Office 365 is widely used, easy to use and has built in security features, it has resilient gaps in terms of security, data retention and email continuity. In this white paper, learn how to protect your organization by implementing a cyber-resilience strategy for Office 365.
Posted: 09 Jul 2019 | Published: 09 Jul 2019

Mimecast

Protecting Data in The Cloud 2019 Thales Cloud Security Study
sponsored by Thales
WHITE PAPER: During 2019, research was conducted to better understand the trends in cloud security practices across organizations in order to uncover emerging trends, encryption practices, IAM features to consider & why some organizations fail to protect sensitive data. Download the executive summary to discover the key findings of the research.
Posted: 11 Nov 2019 | Published: 31 Oct 2019

Thales

The Top Industries at Risk for Cyber Attacks
sponsored by Barracuda
VIDEO: This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.
Posted: 29 May 2019 | Premiered: 31 Dec 2018

Barracuda

Conversational Geek Office 365 Risk Mitigation
sponsored by Mimecast
EBOOK: If you are moving to or already using Office 365 then it's essential for you to formulate a plan toward a risk-free cyber resilience experience. Download this e-book to learn about the security, data assurance and continuity gaps that exist in Office 365 and how Mimecast can help reduce risk and add resilience.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

Mimecast

Putting Cybercrime in Perspective
sponsored by InteliSecure
WHITE PAPER: When it comes to cybercrime, it can difficult to separate hype from the truth. This white paper puts these threats into perspective to help you to understand your organization’s risk appetite, the cost of data loss and the steps your organization needs to take to reduce cybercrime impact.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

InteliSecure

Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.
Posted: 21 Jun 2019 | Published: 31 Jan 2019

Proofpoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info