Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed   
IT Risk Management Reports
 
Public Cloud Adoption in Financial Services- 7 key considerations for CIOs (Celent paper)
sponsored by IBM
WHITE PAPER: Access this white paper for 7 critical considerations as financial institutions plan and execute their technology transformation and public cloud migration strategies.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

IBM

Analyst Report: Governance, Risk, And Compliance Platforms, Q1 2020
sponsored by ServiceNow
WHITE PAPER: In this most recent edition of The Forrester Wave: Governance, Risk and Compliance Platforms, industry experts at Forrester identify and evaluate 12 key GRC platform providers, how they compare to each other, and offers key insights into emerging market trends. Download this report to leverage Forrester’s GRC expertise.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

ServiceNow

Best Practices for Special-Purpose System Security
sponsored by ColorTokens
RESOURCE: A special-purpose system is an endpoint with a specific function, such as an airport kiosk or an ATM. And while these endpoints facilitate convenience, they also present significant security challenges. Read this article to learn more about where the vulnerabilities lie and how to address them.
Posted: 06 Oct 2020 | Published: 15 Aug 2020

ColorTokens

5 Reasons your SMB workspace needs simple SSO
sponsored by Citrix
EBOOK: SSO should make life easier for both IT and employees. But when new apps require different SSO tools from different vendors, it can complicate your IT. Adopting simple, unified SSO for your workspace can ensure secure, anywhere access to all essential applications.This e-book gives five reasons why your organization needs simple, unified SSO.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Citrix

Analyzing the Economic Benefits of Proofpoint Insider Threat Management
sponsored by Proofpoint
ANALYST REPORT: With cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this ESG report to learn about Insider Threat Management from Proofpoint.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Proofpoint

Is Your Front Door Open and Unlocked for Cyber Criminals?
sponsored by Verizon
RESOURCE: When it comes to cyber security, small businesses represent 43% of all data breaches because their false sense of security leads them to not put proper defenses in place. In this blog, learn why cyber criminals often target SMBs before going after larger organizations.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Verizon

Charting a Course For Enterprise Risk Management
sponsored by riskconnect
RESOURCE: This e-book will explain what ERM is, why it's worthwhile, and how to begin managing risks and opportunities holistically.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

TOPICS:  Risk Management

The Legal Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

Securing the New Normal: A Virtual Happy Hour on Moving Forward
sponsored by RSA Conference
WEBCAST: In this webcast, a panel of industry leaders discuss the future of cybersecurity, highlighting what’s next for the industry, and the ways in which cybersecurity will evolve as we come to understand the “new normal” – focusing on business processes, procedures and policies, network security architecture and much more.
Posted: 08 Jul 2020 | Premiered: Apr 7, 2020

RSA Conference

Cybereason Mobile
sponsored by Cybereason
DATA SHEET: Mobile devices are now more popular for enterprise use and workplace productivity than desktops or laptops. With millions of malware threats for a growing variety of devices and OS’s alongside cloud and mobile-first apps, the risks are complex and expanding. Don’t get left behind, view this data sheet to learn how to keep mobile devices secure.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Cybereason
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info