Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed   
Managing Risk Reports
 
Threats of Surveillance Tools: Spyware and Stalkerware
sponsored by RSA Conference
PODCAST: Digital monitoring of workers, children and spouses is more commonplace than ever. But what happens when the line between monitoring and spying becomes blurred? Tune in to this RSAC podcast as two security experts share the work they’ve been doing to help protect victims and their personal data from unwanted surveillance.
Posted: 21 Jan 2020 | Premiered: Dec 16, 2019

RSA Conference

Secureworks Security Maturity Model
sponsored by Dell SecureWorks
WEBCAST: The Secureworks Security Maturity Model is designed to help organizations evaluate and understand their current security maturity in order to develop strategies and target areas for improvement. Want to learn more? View this webcast today.
Posted: 06 Mar 2020 | Premiered: Mar 6, 2020

Dell SecureWorks

Your Vulnerability Management Process Isn't Working
sponsored by Vulcan
RESOURCE: When it comes to vulnerability discover and remediation, it’s easy to get caught up in the details. Every now and then it’s important for CISOs to take a step back and make sure you’re not missing the security forest for the vulnerability trees. This article focuses on three common, but costly, mistakes that IT and security leaders should avoid.
Posted: 19 May 2020 | Published: 21 Mar 2019

Vulcan

Pulsant Delivers Complete Peace of Mind to Scottish Building Society
sponsored by Pulsant
CASE STUDY: The Scotland Building Society needed risk and revenue loss mitigation capabilities and a secure location for its production servers. Access this case study to view the disaster recovery solution that SBS implemented and the results that it led to, which included a resilient, highly secure data center.
Posted: 28 Feb 2020 | Published: 28 Feb 2020


Machine Learning Applications for Banking Fraud Detection
sponsored by Dataiku
EGUIDE: AI-based systems can augment regulatory alert systems and improve analysts’ workflow by reducing noise without discarding results. Access this paper to view the 3 types of anomalies to look out for, understand examples of how banks use fraud and anomaly detection, and learn how to build a basic, machine learning-based fraud detection system.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Dataiku

Essential Elements of a Penetration Test
sponsored by Synack
WHITE PAPER: A recent study from the White House indicated that cyberattacks cost the economy between $57 and $109 billion. In order to avoid the financial, legal and reputational damage of an attack, organizations are looking to penetration tests. In this white paper, discover why penetration tests are so critical and the emergence of crowdsource testing.
Posted: 27 May 2020 | Published: 27 May 2020

Synack

InfoSec Risk Management in Healthcare Environments a Primer to Assessing Technical Risk
sponsored by CI Security
WHITE PAPER: In some healthcare organizations, risk assessment and risk management as it relates to cybersecurity are a bit of a mystery. In this white paper, learn how to assess your IT security risks.
Posted: 18 Mar 2020 | Published: 18 Mar 2020

CI Security

Third-Party Risk to the Nth Degree
sponsored by eSentire
WHITE PAPER: Third-party vendor ecosystems are not a new area of cyber risk, yet the subject still fails to be a top priority for many organizations. In this white paper, explore quantitative and contextual measures by which your organization can compare current practices and investments to help mitigate third-party cyber risk.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

eSentire

Cyber Risk Spotlight Report: 11 Metrics to Watch
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: According to Gartner, it takes hackers on average fewer than 8 days to exploit a vulnerability. In this report, dive into the key metrics every security team needs to better secure their operations and help prevent cyberattacks.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Arctic Wolf Networks, Inc.

Lessons and Best Practices from CIO's Experience
sponsored by BlackBerry
RESOURCE: "IT and cyber operations needed to leverage all possible organizational communications modes to get the word out to the entire enterprise to ignore the incoming email and delete it, direct specific action potentially warn our partners about the situation.
Posted: 15 Apr 2020 | Published: 15 Apr 2020

BlackBerry
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info