Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed   
IT Risk Management Reports
How Continuous Monitoring is Revolutionizing Risk Management
sponsored by BitSight
WHITE PAPER: Organizations with continuous monitoring tools put themselves in a position to make more informed decisions that help their businesses succeed. Learn more about how you can help your enterprise continuously monitor vendor, reputational, and strategic risks.
Posted: 18 Jul 2018 | Published: 18 Jul 2018


How Security Ratings Improve Risk Awareness While Delivering a Solid ROI
sponsored by Security Scorecard
WHITE PAPER: Combatting cybersecurity risk is a difficult challenge. Without visibility into internal and external risk, this battle becomes even harder. In this white paper, learn how security ratings offer critical insight into vulnerabilities presented both in your environment and the environment of third-parties.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

Security Scorecard

The Chief Risk Officer and the Dreadful, Horrid, Inefficient, Very Bad Day
sponsored by Smarsh
RESOURCE: Learn how you can handle operational, market, compliance and reputation concerns, and why it is important to get a good handle on your company's electronic communications data.
Posted: 09 May 2018 | Published: 09 May 2018


Integrated Security Analytics
sponsored by Forcepoint
WHITE PAPER: Security systems generate a large number of alerts, but only a small subset of them represent critical risks to high value business data. Noise makes the task of identifying genuine data theft risks challenging, even for well-resourced security operations teams. In this white paper, read about Forcepoint's integrated security analytics system.
Posted: 04 Feb 2019 | Published: 31 Dec 2017


A Risk-Adaptive Approach
sponsored by Forcepoint
ANALYST REPORT: Download this report to learn how applying a Continuous Adaptive Risk and Trust Assessment approach to your organization will allow you to meet the latest evolving adaptive security challenges.
Posted: 07 Sep 2018 | Published: 31 Dec 2017


How to Combat Fraud in 3 Easy Steps
sponsored by Onfido
WHITE PAPER: Identity theft is the fastest growing crime in the US and accounts for half of all reported fraud in the UK, with 1 in 60 online transactions attempted globally being fraudulent. This white paper looks at 7 ways fraudsters are slipping through the net, what to watch out for and how to combat fraud in 3 simple steps.
Posted: 13 Feb 2019 | Published: 13 Feb 2019


How Metadata and NetFlow Analysis Supports the Kill Chain Framework
sponsored by Plixer
RESOURCE: Metadata and NetFlow analysis is sometimes overlooked as a method to reduce risk, falling behind more well-known technologies such as firewalls, intrusion prevention systems and SIEM platforms. Download this resource to see how metadata and NetFlow analysis can help identify breaches and reduce risk.
Posted: 06 Jun 2018 | Published: 24 Aug 2017


Bay Federal Credit Union: How SOC-as-a-Service Has Helped Add Business Value
sponsored by Arctic Wolf
CASE STUDY: In this case study, Bay Federal Credit Union switched from using a managed security service provider (MSSP) to a SOC-as-a-Service. When looking for someone to monitor their systems, they looked at various MDR alternatives before deciding to use AWN CyberSOC Services. The credit union saw exceptional results in a short amount of time.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

2018 Cyberthreat Defense Report
sponsored by Gigamon
RESEARCH CONTENT: 77% of organizations have been victimized by at least 1 successful cyberattack, according to a survey of over 1,200 IT security pros conducted by CyberEdge Group.
Posted: 29 Jun 2018 | Published: 29 Jun 2018


9 Misconceptions About Third-Party Risk Management
sponsored by BitSight
WHITE PAPER: Download this resource for 9 dangerous misconceptions about third-party risk management that you need to know.
Posted: 31 Oct 2018 | Published: 31 Oct 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement