Business of Information Technology  >   Business Management  >   Risk Management  >  

Occupational Health

RSS Feed   
Occupational Health Reports
 
Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Penetration Testing Vendor Selection Checklist
sponsored by Synack
RESOURCE: In today’s IT environment, one of the biggest risks to a corporation’s valuation is a security breach. But how does a security team apply their budget in a way that ensures the applications, websites, and other assets are secure? What requirements are the most important? Use this comprehensive checklist to help you evaluate vendors.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Synack

Transforming Compliance
sponsored by riskconnect
RESOURCE: This e-book will help you transform compliance from a check-the-box function to a well-oiled machine that seamlessly integrates people, processes, and technology with data-driven visibility to champion the organization's future.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

TOPICS:  Risk Management

The Latest Trend in Network Cybersecurity: NDR
sponsored by Fidelis
WHITE PAPER: It is not enough to merely detect threats quickly – response must be just as swift. Network detection and response (NDR) has grabbed the attention of network professionals. It utilizes automation and proactive capabilities to detect threats and add them to the ‘playbook’ once they’re found. Glimpse at this white paper to learn more.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Fidelis

Cybersecurity Built for Your Business, Budget and Staff
sponsored by Panda Security
EBOOK: In the US, 42% of employees are working from home full-time. As a result, managing distributed workforces has become a priority for organizational leaders. Remote deployment and lack of centralization have both created security and compliance risks. To regain control, view this e-book about the top organizational challenges and their solutions.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Panda Security

The Role of Insider Threat Management Software Platforms
sponsored by Proofpoint
EBOOK: As workplace trends and cyberthreats evolve, so too should the methods used to mitigate risk and ensure user protection. This e-book takes a closer look at the growing risk of insider threats and explores the capabilities of the ObserveIT platform, Proofpoint’s insider threat management software platform.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Proofpoint

Accelerating Automation
sponsored by K2
DATA SHEET: Business process automation has become a top priority in recent years. However, as COVID-19 has challenged many business plans, many businesses have lost their automation footing. In this guide, learn how to get back on track with your business process automation strategy. Download the guide here for safekeeping.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

K2

TCO Study of WSUs and SCCM
sponsored by Automox
WHITE PAPER: Patch management plays a critical role in ensuring systems are operating properly and protected against attacks. However, like most technology functions, modern enhancements allow organizations to transition from on-premise systems to cloud-based SaaS offerings – but does the SaaS switch make fiscal sense? Read on to find out.
Posted: 24 Aug 2020 | Published: 24 Aug 2020


IT/OT convergence is necessary, but not so simple
sponsored by ComputerWeekly.com
EGUIDE: This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.
Posted: 13 Aug 2020 | Published: 14 Aug 2020

ComputerWeekly.com

Life After Lockdown: A Playbook for Crisis Recovery, Resiliency and Restarting Right
sponsored by riskconnect
RESOURCE: This e-book presents a simple, organized way to recover stronger, build resilience, and restart right to withstand whatever comes next.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

TOPICS:  Risk Management
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info