Business of Information Technology  >   Business Management  >   Risk Management  >  

Industrial Safety

RSS Feed   
Industrial Safety Reports
 
Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Careless talk: undermining your software vendor negotiations
sponsored by Livingstone Group
RESOURCE: Negotiating with vendors can be an intimidating process. As confidently as someone may start the conversation, it can end up feeling like the vendor leaves with the upper hand, and the organization ends up without the outcome they wanted. Open up this blog post to learn how to take back control of the conversation.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

Livingstone Group

Evaluating Data-centric Protection Solutions
sponsored by Comforte AG
EBOOK: Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

Comforte AG

Data Analytics in Healthcare: Opportunities & Challenges
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the promises of healthcare data analytics, the challenges faced by healthcare providers in digital transformation and what some cloud providers are doing to assuage the security concerns of cloud among healthcare service providers.
Posted: 24 Feb 2020 | Published: 25 Feb 2020

ComputerWeekly.com

How To Continuously Improve Risk Management Within Leading Cybersecurity Programs
sponsored by AT&T Cybersecurity
WHITE PAPER: In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Risk Management
AT&T Cybersecurity

The Changing Vendor Audit Landscape
sponsored by Livingstone Group
WEBCAST: As organizations adopt more cloud platforms with subscription-based licensing, the traditional landscape of software publisher audits and related risk is also rising. This webinar covers these changes and how to prepare through best practices. Tune in to learn about how to approach risk assessment, how to deal with audits and more.
Posted: 11 Feb 2021 | Premiered: Feb 11, 2021

Livingstone Group

Stronger collaboration platforms emerge as pandemic legacy
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: HR software had long been a relatively backward zone of enterprise software before the Covid-19 pandemic. It had been catching up, as organisations applied digital approaches drawn from customer experience to employee experience, encompassing the journey from recruitment, through working and learning, to moving up or moving on.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

Rapid Response
sponsored by GEP
WHITE PAPER: Disruptions to supply chains—like the current COVID-19 crisis and previous recessions—are not new, and yet, it can feel impossible to be fully prepared. Download this white paper to explore 3 actions you can take right now to help mitigate supply risks and disruptions.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

GEP

Using Tprm Best Practices To Improve M&A Outcomes
sponsored by The Santa Fe Group
WHITE PAPER: In mergers and acquisitions (M&A), managing risk has become a focal point. M&A firms are realizing that due diligence is needed to avoid value losses post-acquisition, and moreover, regulators are cracking down on M&A risk like never before. Dive into this white paper to learn how third party risk management best practices can help.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

The Santa Fe Group

Attacking And Defending A Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences