IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed   
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 442 Matches Previous Page  |  Next Page
How to Elevate Your Threat Intelligence Program
sponsored by DomainTools
WEBCAST: According to the SANS 2020 Cyber Threat Intelligence Survey, 82% of organizations find value in threat intelligence, however, only 4% of respondents had processes in place to measure effectiveness. So, how do you demonstrate and quantify the value of your threat intelligence program? View this Forrester-sponsored webcast to learn the answer.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

DomainTools

Evaluating and Measuring DDoS Risk During the COVID-19 Era
sponsored by Akamai Technologies
WEBCAST: Distributed denial-of-service (DDoS) attacks range from small and sophisticated to large and bandwidth-busting. Unplanned outages are costly, requiring fast and effective DDoS mitigation. Join Dennis Birchard, Akamai’s Lead Principal Cloud Security Architect, to learn about DDoS trends, mitigation strategies and more.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

Akamai Technologies

How to Identify Threats Faster and Increase Productivity
sponsored by DomainTools
WEBCAST: With the rapid-fire speed of alerts and multitasking required in infosecurity, security operation center (SOC) professionals often must determine the potential outcomes of events with limited context. How can your teams reduce operational risk and be more productive? Watch this webinar to learn how to address this challenge and others.
Posted: 24 Nov 2020 | Premiered: Nov 24, 2020

DomainTools

Success Patterns for Supply Chain Security
sponsored by Panorays
WHITE PAPER: Threats targeting supply chains are on the rise, impacting businesses across all 3 elements of the confidentiality, integrity and availability (CIA) triad. The following SANS whitepaper further explores these challenges and highlights the key components of an effective supply chain security program – read on to get started.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Panorays

NWN SecureX Online Workshop
sponsored by NWN Corporation
VIDEO: Today’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.
Posted: 24 Nov 2020 | Premiered: 24 Nov 2020

NWN Corporation

Finding the Disconnect: Security Perceptions and Behaviors of Today’s Enterprise Employees
sponsored by Dtex
EBOOK: As the modern enterprise acknowledges cyber risks as critical business risks, the nature of enterprise security discussions is quickly moving from the technical and operational to the strategic. This has created a new reality in which security decisions can turn a user into a trusted ally... or a liability. Read this guide to learn more.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

IT Risk Management: Comparing Top Vendors & Offerings
sponsored by ServiceNow
RESEARCH CONTENT: Gartner predicts that by 2025, 50% of global midmarket and large enterprises will depend on risk management tools to address risks in their organizations. This Magic Quadrant report highlights and evaluates the most prominent risk management vendors and offerings in today’s market – read on to unlock the full report.
Posted: 23 Nov 2020 | Published: 11 Aug 2020

ServiceNow

Rethinking Insider Risk in the Gig Economy
sponsored by Proofpoint
EBOOK: By 2027, gig workers may account for half of the total U.S. workforce. It’s a major shift that comes with profound security implications. Some 87% of companies have suffered an incident with a third-party supplier that disrupted their operations, according to Deloitte. View this e-book to learn how to mitigate insider risk in the new work reality.
Posted: 18 Nov 2020 | Published: 30 Oct 2020

Proofpoint

How to Level Up Your Vendor Management
sponsored by Aptible
WHITE PAPER: Every company needs vendors, yet vendors increase your vulnerability to security threats. Many of the largest data breaches in the past decade or so have happened because of vulnerabilities from 3rd party vendors. Therefore, you must establish robust processes on both sides of vendor management. View this guide to learn more.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

Aptible

Integrated Risk Management on ServiceNow
sponsored by ServiceNow
WEBCAST: Deloitte, a leader in risk management consulting, has collaborated with ServiceNow, a leader in GRC platform technology, to develop accelerators which streamline and automate risk management. These solutions will provide you with the tools needed to better manage different types of risk, allowing you to focus on running your business.
Posted: 13 Nov 2020 | Premiered: Nov 13, 2020

ServiceNow

Business Continuity Management: Planning, Disaster Recovery & Crisis Response
sponsored by ServiceNow
PRODUCT OVERVIEW: Business continuity management (BCM) tools are an effective way for organizations to ensure crisis preparation and disaster recover plans are in place prior to an unforeseen disruption. This solution brief highlights the key features and capabilities of ServiceNow’s BCM tool – read on for more information.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

ServiceNow

Webinar 6 – MITRE ATT&CK as a Framework for Cloud Threat Investigation
sponsored by McAfee
WEBCAST: In the continuous hunt for elusive cyberthreats, the most vulnerable assets – in this case, the cloud – must be considered. As it stands, most organizations have a low number of experts dedicated to cloud threats, and so technology must pick up the slack. Watch this webcast to learn how the MITRE ATT&CK framework can help to mitigate cloud attacks.
Posted: 11 Nov 2020 | Premiered: Nov 11, 2020

McAfee

Beyond Digital Risk— Addressing Operational Risk
sponsored by ServiceNow
WHITE PAPER: Operational risk management keeps companies ahead in their markets and fortifies their foundations, even on shifting ground. But due to its complexity, operational risk management often gets lost in the mix of other risk management strategies. Read this white paper to learn how you can connect risk across the enterprise.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Covid-19 Lessons Learned—Business Continuity Management
sponsored by ServiceNow
WHITE PAPER: Regardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Case Study: Medical Devices & Securing the Healthcare Industry
sponsored by Rezilion
CASE STUDY: The healthcare industry has been a prime target of cyberattacks for several years, however COVID-19 brought most of these issues into the public eye. This case study highlights where the vulnerabilities lie and provides an overview of how Rezilion is working with healthcare device companies to prioritize and mitigate these risks.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Rezilion

Market Guide For Crisis/Emergency Management Solutions
sponsored by ServiceNow
RESEARCH CONTENT: The 2020 pandemic has led security and IT leaders to reevaluate their current crisis/emergency management (C/EM) programs and consider making alterations based on what they’ve learned from COVID-19. This Gartner Market Guide provides an overview of top C/EM tools, required capabilities and strategic recommendations – read on to get started.
Posted: 10 Nov 2020 | Published: 21 Aug 2020

ServiceNow

Refining risk resolution for the new normal
sponsored by ServiceNow
WEBCAST: If the COVID crisis has taught us anything it’s that adaptability is necessary for success. In this session, you will learn how enhancements to Advanced Risk Assessment will get you information more quickly, so you can get ahead of risks.
Posted: 05 Nov 2020 | Premiered: Nov 5, 2020

ServiceNow

Refining risk resolution for the new normal
sponsored by ServiceNow
VIDEO: If the COVID crisis has taught us anything it’s that adaptability is necessary for success. In this session, you will learn how enhancements to Advanced Risk Assessment will get you information more quickly, so you can get ahead of risks.
Posted: 02 Nov 2020 | Premiered: 02 Nov 2020

ServiceNow

Secure: Now 2020 - Are Your Cyber Defenses Fully-Geared for the Digital Era?
sponsored by Lumen
WEBCAST: Bad actors and threats are evolving faster than organizations can react, and although security & risk management (SRM) leaders know they need to continually evolve upgrade their cyber defenses, businesses still fall victim to cybercrimes. Watch this webinar by Lumen subject matter experts to learn why you may need to do more for cybersecurity.
Posted: 28 Oct 2020 | Premiered: Sep 10, 2020

Lumen

Risk Management Best Practices for Privileged Access Management (PAM)
sponsored by Quest
WHITE PAPER: Applying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Quest

2020 SMB Cyberthreat Landscape
sponsored by Acronis
RESOURCE: Contrary to a popular misconception, SMBs are targeted at the same rate (and by the same means) as larger enterprises. However, SMBs typically lack the resources of a larger enterprise – making attacks potentially more damaging. Read this infographic to learn more about the SMB cyberthreat landscape.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Acronis

The Future-Ready SOC: Using XDR to Achieve Unified Visibility and Control
sponsored by VMware International Unlimited Company
WHITE PAPER: The technological and procedural silos that exist between IT and security operations center (SOC) team members have impeded an enterprise’s ability to effectively mitigate risk. Turn the tide – read this white paper to examine how extended detection & response (XDR) can help.
Posted: 27 Oct 2020 | Published: 30 Sep 2020

VMware International Unlimited Company

Hitachi ID Bravura Discover
sponsored by Hitachi ID
DATA SHEET: In the age of ransomware attack, your organization needs to proactively control identity and privileged access security, and it needs risk insight while maintaining scalability. View this Hitatchi ID Bravura Discover data sheet to learn about an approach to IAM and PAM that strives to identify hidden risks and scale with growing threats.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

A Comprehensive Approach to File Security and Compliance
sponsored by Fasoo
PRODUCT OVERVIEW: Digital transformations are exposing significant gaps in most organization’s file security and compliance capabilities. In this solution brief, explore some of these gaps and discover Fasoo’s comprehensive approach to file security and compliance – designed to eliminate the need for point solutions by unifying efforts under one platform.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Fasoo

Hacking Active Directory – From A Pen Tester
sponsored by Quest
WHITE PAPER: Active Directories (AD) provides authentication and protects credentials, information systems and intellectual property from unauthorized access – protecting your organization from financial and reputational harm. However, cybercriminals have found ways to exploit ADs – read this white paper to see the 8 most common AD-specific threats.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest
1 - 25 of 442 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info