Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed   
IT Risk Management Reports
 
Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organizations can take to build a people-centric defense.
Posted: 21 Jun 2019 | Published: 31 Jan 2019

Proofpoint

What is an Ounce of Cybersecurity Prevention Worth?
sponsored by Verizon
RESOURCE: Data breaches and their costs are a major risk to your business. But they are a risk that can be mitigated. Understanding theft tactics based on the experiences of others is critically important. In this resource, explore tactics to help prevent data breaches and security holes in your organization.
Posted: 23 May 2019 | Published: 11 Feb 2019

Verizon

Back to the Basics: What is Cyber Risk and How Can We Measure It?
sponsored by CyberGRX
RESOURCE: Cyber-risk is a hot topic these days, but, it is often misunderstood or conflated with other cybersecurity and privacy concerns. This resource offers a definition of cyber-risk and outlines a model of measuring cyber-risk.
Posted: 28 Feb 2019 | Published: 21 Feb 2019

CyberGRX

How Targeted Cyberattack Simulations Differ from Penetration Tests & Vulnerability Scanning
sponsored by Cymulate
WHITE PAPER: Organizations of all shapes and sizes are fighting a war against threat actors. Currently, organizations use vulnerability scans and penetration tests to verify that their data is protected. However, a targeted attack simulation may be a better test for your organization. Download this white paper to learn more about targeted attack simulations.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

Cymulate

3 Tenets of Security Protection for State and Local Government and Education (SLED)
sponsored by Dell EMC
RESOURCE: Security is the utmost priority for IT decision-makers in government and education. Government agencies, schools and citizens are frequent, highly visible targets for cybercriminals, and their systems contain personal data. In this resource, explore important factors to consider when incorporating security into IT modernization initiatives.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Dell EMC

Best Practices for Stopping Risk in its Tracks
sponsored by Smarsh
EBOOK: How can firms improve their supervision workflows to better reveal risk? In this guide, examine some strategies for staying on top of the rapidly evolving communications landscape, and the new vectors for risk it offers.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

Smarsh

The Zenefits Bug Bounty Story
sponsored by HackerOne
CASE STUDY: Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

Best Practices in Transaction Monitoring Scenario Threshold Tuning and Model Verification
sponsored by SAS
WHITE PAPER: How can your bank lower the cost of compliance? In this white paper, discover the analytic techniques responsible for reducing the costs of compliance within AML banking programs, and explore how implementing a process of periodic model verification, threshold tuning, and validation, can optimize your banks AML compliance standards.
Posted: 18 Mar 2019 | Published: 31 Dec 2017

SAS

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT

Industry Cyber-Exposure Report
sponsored by Rapid7
RESEARCH CONTENT: Rapid7's recently conducted a cybersecurity test to measure exposure and resiliency in the United Kingdom. They measured the Internet-facing security profiles of the FTSE 2501 plus a handful of non-FTSE 250 members. Explore the results in this report.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Rapid7
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement