Business of Information Technology  >   Business Management  >   Risk Management  >  

Industrial Safety

RSS Feed   
Industrial Safety Reports
 
Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Mobile Security Index 2020
sponsored by Verizon
WHITE PAPER: Mobile technology and the cloud are enabling and medium-sized businesses to grow and compete with larger enterprises more effectively. But unless they take further steps to secure their mobile devices, SMBs could face significant damage to their reputations and bottom lines before the competition even begins.This infographic explains in detail.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Verizon

5 Steps to Determine Residual Risk During the Assessment Process
sponsored by Coalfire
RESOURCE: Governance, risk and compliance-related residual risks are risk factors left over after an organization applies security controls to ensure compliance with laws and regulations. Data management gaps create this risk, but spotting it isn’t impossible. Open this article for 5 steps to identifying and offsetting residual risk during an assessment.
Posted: 03 Sep 2020 | Published: 28 May 2020

Coalfire

How is the Role and World of the CISO Changing?
sponsored by Kaspersky Lab
RESOURCE: As cybersecurity risks increase, the role of the CISO becomes more dynamic. 70% of current CISOs report that risk management is now a key part of their role. For more CISO trends, take a look at this survey conducted by 451 Research. Use it to understand what the role of today’s CISOs looks like as well as the top 5 skills to succeed in the role.
Posted: 09 Sep 2020 | Published: 09 Sep 2020

Kaspersky Lab

An Overview of Insider Threat Management
sponsored by Proofpoint
EBOOK: The average cost of an insider-caused cybersecurity incident has grown to $11.45 million – and these attacks are becoming more frequent, too. In this e-book, enhance your understanding of insider threats by looking at industry specific concerns, common use cases, the increasingly popular people-centric approach, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Proofpoint

Transforming Compliance
sponsored by riskconnect
RESOURCE: This e-book will help you transform compliance from a check-the-box function to a well-oiled machine that seamlessly integrates people, processes, and technology with data-driven visibility to champion the organization's future.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

TOPICS:  Risk Management

Cloud Insiders - Risk and Compliance in the Hybrid Cloud
sponsored by Xtravirt
WEBCAST: A hybrid cloud carries a heavy risk profile that extends throughout its infrastructure. Staying updated, implementing new features & monitoring security threats are critical processes. Not to mention the constant changes in regulations to look out for. Watch this webcast to learn more about risk & compliance in hybrid clouds.
Posted: 10 Aug 2020 | Premiered: Aug 10, 2020

Xtravirt

Penetration Testing Vendor Selection Checklist
sponsored by Synack
RESOURCE: In today’s IT environment, one of the biggest risks to a corporation’s valuation is a security breach. But how does a security team apply their budget in a way that ensures the applications, websites, and other assets are secure? What requirements are the most important? Use this comprehensive checklist to help you evaluate vendors.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Synack

Phishing Factories Exploit Trust to Attack Businesses
sponsored by Akamai Technologies
RESOURCE: As if it wasn’t enough to worry about attacks from independent threat actors, there is now an emerging underground economy of phishing ‘factories’ using more sophisticated social engineering tactics to gain trust among victims. Is your organization prepared? Read this article to discover alarming trends about phishing and how to increase awareness.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

Akamai Technologies

Charting a Course For Enterprise Risk Management
sponsored by riskconnect
RESOURCE: This e-book will explain what ERM is, why it's worthwhile, and how to begin managing risks and opportunities holistically.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

TOPICS:  Risk Management
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info