Business of Information Technology  >   Business Management  >   Risk Management  >  

Industrial Safety

RSS Feed   
Industrial Safety Reports
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007


Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Security Predictions for 2018
sponsored by TrendMicro
WHITE PAPER: Ransomware and digital extortion are predicted to be cybercriminals go-to methods of attack in 2018. This resource offers security predictions for 2018 and what your organization should look out for to remain protected.
Posted: 20 Mar 2018 | Published: 20 Mar 2018


Automate Third-Party Risk Management to Address New Regulatory Requirements
sponsored by BitSight
WHITE PAPER: Evolving financial regulations and increased outsourcing require stronger management of third- and fourth-party cybersecurity risk. Access this resource to learn how automating third-party risk management can help banks and financial institutions address new regulatory requirements.
Posted: 09 Apr 2018 | Published: 09 Apr 2018


Modern-Day Security Tales
sponsored by Cisco Umbrella
RESOURCE CENTER: How quickly is your organization able to combat security challenges? Explore this resource to uncover how to cut through your security challenges and implement effective protection in minutes, rather than months.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

Cisco Umbrella

What Security People Want: Making DevSecOps Happen with Containers
sponsored by Aqua Security
WEBCAST: Securing containerized apps is necessary for protecting your organization. Explore this webcast to gain insight into securing applications and making DevSecOps happen with containers.
Posted: 09 Mar 2018 | Premiered: Mar 9, 2018

Aqua Security

Residency Services for Data Protection
sponsored by Dell EMC and IntelĀ®
RESOURCE: Developing a comprehensive data protection strategy is a key priority for organizations looking to manage explosive data growth. Access this resource to uncover how to optimize your data protection technology.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

Dell EMC and IntelĀ®

Zero Trust Identity and Access Management Webinar
sponsored by Centrify Corporation
WEBCAST: How does your enterprise plan to improve identity security? Tune into this on-demand webinar to uncover how a zero trust concepts can be applied to enhance IAM.
Posted: 18 Apr 2018 | Premiered: Apr 18, 2018

Centrify Corporation

How to Create a Scalable & Sustainable Vendor Risk Management Program
sponsored by BitSight
WHITE PAPER: Massive cyberattacks are routinely attributed to vendors with substandard security practices. This resource offers a detailed 6-step guide for creating a sustainable and scalable vendor risk management program from the ground up.
Posted: 09 Apr 2018 | Published: 09 Apr 2018


GDPR and the Future
sponsored by DXC
WHITE PAPER: GDPR will give businesses across sectors and geographies plenty to think about, but at heart it comes down to trust. Take a look at this resource to learn about how GDPR is impacting the future of organization's security strategies.
Posted: 12 Apr 2018 | Published: 12 Apr 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement