Business of Information Technology  >   Business Management  >   Risk Management  >  

Industrial Safety

RSS Feed   
Industrial Safety Reports
 
Back to the office: Ensuring safe workspaces after COVID-19
sponsored by Citrix
WHITE PAPER: As the post-pandemic future becomes clearer, people will start to tentatively re-enter the world. For most, this includes going back into the office. In this resource, explore what organizations can do to ensure a safe return for employees, such as new safety measures, digital and physical workspaces and more.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

Citrix

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Airbus Cybersecurity Strengthens its Threat Intelligence with ThreatQuotient
sponsored by ThreatQuotient
CASE STUDY: How do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

ThreatQuotient

Risk Management as Revenue Driver: An Adaptive Approach
sponsored by LogicGate
RESOURCE: Recently, PwC interviewed 1,535 executives in risk functions from 76 countries and across 30 different industries. They used this information to serve as models in their successful approaches to risk. These “Adapters,” as they’re called, were effective in tackling innovation-related risks. Read this article to see why they stood out.
Posted: 07 Oct 2020 | Published: 19 Mar 2019

LogicGate

10 Ways to Improve Your Processes with Advanced Workflows
sponsored by HelpSystems
WEBCAST: Optimizing your file transfers can help make your life a little easier, eliminating the hours a week you spend creating, maintaining, and executing your workflows. This resource considers the 10 benefits of implementing an advanced workflow into your daily process.
Posted: 15 Oct 2020 | Premiered: Oct 15, 2020

HelpSystems

Risk Management Best Practices for Privileged Access Management (PAM)
sponsored by Quest
WHITE PAPER: Applying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Quest

Analyzing the Economic Benefits of Proofpoint Insider Threat Management
sponsored by Proofpoint
ANALYST REPORT: With cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this ESG report to learn about Insider Threat Management from Proofpoint.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Proofpoint

Attacking and Defending a Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Hacking Active Directory – From A Pen Tester
sponsored by Quest
WHITE PAPER: Active Directories (AD) provides authentication and protects credentials, information systems and intellectual property from unauthorized access – protecting your organization from financial and reputational harm. However, cybercriminals have found ways to exploit ADs – read this white paper to see the 8 most common AD-specific threats.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

Webinar 6 – MITRE ATT&CK as a Framework for Cloud Threat Investigation
sponsored by McAfee
WEBCAST: In the continuous hunt for elusive cyberthreats, the most vulnerable assets – in this case, the cloud – must be considered. As it stands, most organizations have a low number of experts dedicated to cloud threats, and so technology must pick up the slack. Watch this webcast to learn how the MITRE ATT&CK framework can help to mitigate cloud attacks.
Posted: 11 Nov 2020 | Premiered: Nov 11, 2020

McAfee
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info