Business of Information Technology  >   Business Management  >  

Loss Management

RSS Feed   
Loss Management Reports
 
Episode 2: The Attack
sponsored by Proofpoint
WEBCAST: This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how attackers use social engineering techniques to execute voice phishing (vishing) attacks.
Posted: 07 Jun 2019 | Premiered: Jun 7, 2019

Proofpoint

Best Practices in Transaction Monitoring Scenario Threshold Tuning and Model Verification
sponsored by SAS
WHITE PAPER: How can your bank lower the cost of compliance? In this white paper, discover the analytic techniques responsible for reducing the costs of compliance within AML banking programs, and explore how implementing a process of periodic model verification, threshold tuning, and validation, can optimize your banks AML compliance standards.
Posted: 18 Mar 2019 | Published: 31 Dec 2017

SAS

CyberArk PAS Assessment Tool
sponsored by CyberArk Software, Inc
PRODUCT OVERVIEW: The commonality in most data breaches and cyberattacks is the exploitation of privileged accounts, credentials and access keys. In this solution brief, learn how CyberArk's Privileged Access Security Assessment Tool can help you evaluate your current privileged access security risk and vulnerabilities.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

CyberArk Software, Inc

The Future of Model Risk Management for Financial Services Firms
sponsored by SAS
WHITE PAPER: In this white paper, discover how model risk management (MRM) groups are helping banks keep up with evolving regulations, and uncover the 5 essential features of successful MRM. To plan for the future of MRM, download this white paper today, and learn more about the technology fueling your MRM journey.
Posted: 19 Mar 2019 | Published: 31 Dec 2016

SAS

SAS Model Risk Management
sponsored by SAS
WHITE PAPER: The regulatory scrutiny being applied to model risk management is intensifying. As a result, banks need to maintain an inventory of models. In this white paper, learn how SAS Model Risk Management can help reduce the manual effort required to appropriately inventory, manage, document, communicate, monitor changes and audit firm-wide models.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

SAS

Shipping Fast
sponsored by Trend Micro, Inc.
WEBCAST: In the security world, you don't normally hear people talking about moving fast. However, a modern and resilient security strategy is just as fast as the rest of your business. In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses the benefits of reducing the number of security tools your team uses.
Posted: 05 Apr 2019 | Premiered: Apr 5, 2019

Trend Micro, Inc.

Verizon Risk Report
sponsored by Verizon
RESOURCE: Find out how you can measure your risk and security posture with comprehensive visibility and daily updates that address gaps and maximize ROI through actionable data.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

Verizon

Gauge your Data Security and Privacy Maturity
sponsored by Akamai Technologies
ANALYST REPORT: Download this Forrester assessment so you can gauge where your firm is on its data security and privacy journey and discover which core competencies you need to strengthen or develop.
Posted: 07 May 2019 | Published: 07 May 2019

Akamai Technologies

Avoid the Breach With Effective Application Security Testing
sponsored by HackerOne
WEBCAST: Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

Laying the Foundation for GDPR Compliance
sponsored by SentryOne LLC
WHITE PAPER: The GDPR is in effect but, many businesses are still struggling with how to properly implement protections across systems and processes. This white paper discusses the 4 key rights that European citizens have under GDPR, and what businesses need to do to ensure they are GDPR compliant.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

SentryOne LLC
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement