Business of Information Technology  >   Business Management  >   Risk Management  >  

Occupational Health

RSS Feed   
Occupational Health Reports
 
Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

How to Secure the Human Link
sponsored by Mimecast
ANALYST REPORT: Security and risk management leaders must provide security awareness training to ensure employees protect the enterprises' data and intellectual property. But, finding the best way to do this can be difficult. In this Gartner research report, explore 3 best practices to develop and maintain a cybersecure workforce.
Posted: 31 Jul 2019 | Published: 02 May 2018

Mimecast

Hype Cycle for Privacy, 2019
sponsored by TITUS
ANALYST REPORT: Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.
Posted: 11 Sep 2019 | Published: 11 Jul 2019

TITUS

The Latest Trends in Data Cataloging for BI
sponsored by Alation
WEBCAST: In this webinar, watch Dresner Advisory Service and Alation discuss the latest trends in data cataloging for BI. Learn about the latest findings from Dresner Advisory Services' second annual Data Catalog Market Study, and discover why 90% of respondents believe that data governance is critical to business success.
Posted: 30 Aug 2019 | Premiered: Jul 18, 2018

Alation

5 Steps to Minimize Your Exposure to Ransomware Attacks
sponsored by Centrify Corporation
WEBCAST: According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

The Practical Executive's Guide to Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. Download this whitepaper for insightful guidance on implementing DLP.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Forcepoint

TPCRM 101: A Guide for Beginners
sponsored by CyberGRX
WHITE PAPER: As organizations increasingly rely on third parties, their ecosystems become more vulnerable to third-party cyber risk. Implementing an effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem. In this white paper, learn everything you need to know about a TPCRM program.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX

The Benefits of Addressing Ethical Question in AI
sponsored by Capgemini
WHITE PAPER: In this white paper, discover the first steps to proactively addressing ethics in AI and learn how getting ethics right in AI can benefit your organization.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Capgemini

The Human Factor 2019 Report
sponsored by Proofpoint
ANALYST REPORT: Malware-free attacks like business email compromise (BEC) and credential phishing continue to rapidly gain momentum as threat actors consistently attack individuals and business processes rather than specific systems and software. In The Human Factor 2019 Report, examine 4 key components of the attacks businesses and individuals face every day.
Posted: 12 Sep 2019 | Published: 31 Aug 2019

Proofpoint

Balancing Fraud Detection and the Customer Experience
sponsored by SAS
WHITE PAPER: Digital channels are a must-have in the financial industry as customers flock to the businesses that can offer speed and convenience. But there's a dark side. The relative anonymity of digital channels opens up new doors for fraud. In this white paper, learn how organizations can verify a true identity and identify high-risk behavior in real time.
Posted: 07 Aug 2019 | Published: 31 Mar 2019

SAS
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement