Business of Information Technology  >   Business Management  >   Risk Management  >  

Occupational Health

RSS Feed   
Occupational Health Reports
 
Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Audit Your Demand Generation Success: Part 3
sponsored by TechTarget
WHITE PAPER: Download this demand generation guide to understand the 4 stages of demand generation and the KPIs that go with them.
Posted: 25 Nov 2019 | Published: 25 Nov 2019

TechTarget

Billion Dollar Blindness
sponsored by TechTarget
WEBCAST: Access this webcast to learn how using the latest intent data and AI-driven technologies can transform their productivity and yields from a market, an ICP, or a set of named ABM accounts.
Posted: 26 Feb 2020 | Premiered: Feb 19, 2020

TechTarget

Top 3 Security Risks for your SD-WAN Implementation
sponsored by BT
WEBCAST: The visibility, control and agility that an SD-WAN can deliver to a global organization makes it very attractive, but it can come with significantly higher risks. In this webcast, Kevin Brown, Adrian Comley and Peter Sader discuss the top 3 security risks you need to consider to make sure your SD-WAN implementation is secure.
Posted: 25 Mar 2020 | Premiered: Mar 25, 2020

BT

4 Ways SailPoint Predictive Identity Puts You in Control
sponsored by SailPoint Technologies
WHITE PAPER: As digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

RPA and Low-Code BPA: An omnichannel approach to process transformation
sponsored by Mendix
WHITE PAPER: More businesses are recognizing the benefits and operational advantages of low-code development and businesses process automation in IT. Download this whitepaper to take advantage of the 3 RPA methods included.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Mendix

Achieving Compliance and Reducing Risk
sponsored by Comforte AG
VIDEO: Mercury Processing Services International needed a solution that would properly meet key requirements of GDPR and PCI DSS, as well as add another layer of protection that renders data useless to potential hackers. In this video, see how comforte’s enterprise data protection platform helped Mercury fulfill their data security requirements.
Posted: 13 Dec 2019 | Premiered: 13 Dec 2019

Comforte AG

Managed Vulnerability Assessment
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: In this buyer’s guide, discover how vulnerability assessment and management can give you the visibility you need to prioritize security tasks.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Arctic Wolf Networks, Inc.

Machine Learning Applications for Banking Fraud Detection
sponsored by Dataiku
EGUIDE: AI-based systems can augment regulatory alert systems and improve analysts’ workflow by reducing noise without discarding results. Access this paper to view the 3 types of anomalies to look out for, understand examples of how banks use fraud and anomaly detection, and learn how to build a basic, machine learning-based fraud detection system.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Dataiku

InfoSec Risk Management in Healthcare Environments a Primer to Assessing Technical Risk
sponsored by CI Security
WHITE PAPER: In some healthcare organizations, risk assessment and risk management as it relates to cybersecurity are a bit of a mystery. In this white paper, learn how to assess your IT security risks.
Posted: 18 Mar 2020 | Published: 18 Mar 2020

CI Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info