Business of Information Technology  >   Business Management  >  

Loss Management

RSS Feed   
Loss Management Reports
 
Privacy and Data Protection Webinar
sponsored by Micro Focus & PwC
WEBCAST: There is a lot more data at risk today than there has been in the past. This explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it. In this webcast, learn about challenges in privacy and data protection and how to meet these challenges head on.
Posted: 08 Mar 2019 | Premiered: Mar 8, 2019

Micro Focus & PwC

Power of the Threat Detection Trinity
sponsored by Micro Focus
WHITE PAPER: Today, SOCs face mounting challenges as the advanced threat landscape continues to evolve. Compounding the challenge of advanced threats is the explosion of data and lack of skilled security personnel. In this white paper, learn how you can best combine real-time correlation, insider threat analysis and hunting to protect against cyberthreats.
Posted: 04 Feb 2019 | Published: 31 Jan 2019

Micro Focus

Securing the Critical Industrial Infrastructure
sponsored by Splunk Services UK Ltd
WHITE PAPER: Awareness of the impact of a breach in the ICS (Industrial Control Systems) and OT (operational technology) environment has risen considerably. Threats to ICS could have severe impacts on the business and reputation of an organization. In this white paper, learn how cyberattacks are affecting both IT and OT networks, including the risks involved.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Splunk Services UK Ltd

The Proven Path to Take Command of Risk
sponsored by RSA
VIDEO: Some risk management processes today include, outdated reporting, information silos, and limited risk visibility, etc. which can actually lead to more risk in the business. That's why many organizations could benefit from switching to an integrated risk management strategy. Download this video to learn more.
Posted: 19 Mar 2019 | Premiered: 19 Mar 2019

RSA

Reduce Third-Party Risk Management Costs with CyberGRX
sponsored by CyberGRX
RESOURCE: Learn how your organization can utilize a program that streamlines and catalyzes the third-party risk process by sharing one dynamic assessment with many enterprises that can reduce both risk and cost.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

CyberGRX

Security Orchestration, Automation and Response (SOAR) Buyer's Guide
sponsored by Swimlane
WHITE PAPER: In today's complex computing environments, it can be hard to determine what actual security coverage is in place. Finding skilled security analysts is an increasingly difficult task. Each year as threats grow, CISOs must do more with less. A SOAR solution can help simplify, automate and document the incident response process.
Posted: 18 Dec 2018 | Published: 18 Dec 2018

Swimlane

6 Keys to Credit Risk Modeling for the Digital Age
sponsored by SAS
WHITE PAPER: With this white paper, explore the 6 pillars of an effective and proactive credit risk modeling and decision system, and learn how to get bottom-line benefits with an end-to-end, fully integrated approach to risk management.
Posted: 14 Mar 2019 | Published: 31 Dec 2018

SAS

The Beginner's Guide to Mitigating Phishing Attacks
sponsored by DomainTools
WEBCAST: Phishings attacks are a common form of fraud that is most commonly done by disguising malicious links to distribute malware. In this webcast, Corin Imani, Senior Security Advisor at DomianTools discusses real world examples, the steps to executing a phishing attack and ways to remediate a phishing attack.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019

DomainTools

7 SIEM Trends to Watch in 2019
sponsored by Splunk
WHITE PAPER: In recent years, SIEM solutions have become more of an information platform, with enterprise demands for better security driving much of the SIEM market. In this white paper, explore 7 SIEM trends to watch in 2019.
Posted: 19 Mar 2019 | Published: 19 Mar 2019

Splunk

Threat Intelligence Executive Report
sponsored by Dell SecureWorks
RESEARCH CONTENT: In the last year, the number of sophisticated attacks has increased and threat actors have demonstrated greater adaptability. However, implementing security best practices could limit the impact of many intrusions. In this research report, learn about key developments in the cybercrime threat landscape.
Posted: 04 Feb 2019 | Published: 31 Dec 2018

Dell SecureWorks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement