IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed   
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 350 Matches Previous Page  |  Next Page
A Computer Weekly buyer's guide to managing paper processes
sponsored by ComputerWeekly.com
EGUIDE: Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
Posted: 12 Jul 2021 | Published: 12 Jul 2021

ComputerWeekly.com

The Birds and the Bees: Having the Security Talk With Your Clients
sponsored by ConnectWise
WEBCAST: If you think talking to your clients about security is painful now, imagine having the talk AFTER an incident. Join David Powell, SVP Expansion Sales, and Wes Spencer, CISO, Perch, of ConnectWise, as they discuss how to make this talk as painless as possible.
Posted: 17 Mar 2021 | Premiered: Mar 17, 2021

ConnectWise

A New Roadmap For Third Party IoT Risk Management
sponsored by The Santa Fe Group
ANALYST REPORT: The soaring number of IoT devices that can provide access to sensitive organizational data will make IoT risk management a convoluted undertaking. Professionals familiar with IoT are optimistic of its benefits but skeptical on security. Leverage this Ponemon report to get a grasp of organizational readiness for thir party IoT and its risks.
Posted: 16 Mar 2021 | Published: 30 Jun 2020

The Santa Fe Group

Shared Assessments Building Best Practices
sponsored by The Santa Fe Group
RESOURCE: Enterprise risk management (ERM) structures have grown in number and maturity, but many of them do not account for emerging technologies such as AI, 5G and IoT. At this juncture, it’s important that board and C-suite members assume responsibility for these shifts. View this SFG resource to learn ERM best practices for new technologies.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

The Santa Fe Group

Adaptive Risk Management For Complex Supply Chains
sponsored by The Santa Fe Group
EBOOK: This paper discusses supply chain risk and the increased demands that complex supply chains place on outsourcers and providers. It also provides strategies and tactics for building and applying complex adaptive solutions to your own Third-Party Risk Management (TPRM) program. Download your copy today.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

The Santa Fe Group

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

Emerging Third Party Risks Threaten Operational Resilience In Financial Services
sponsored by Interos
WHITE PAPER: After years of outsourcing non-core functions, and using services provided by affiliates, financial institutions often find themselves dealing with complex—and risky—supply chains. In this white paper, learn about third-party risk management (TPRM) and how it can help FSIs address these challenges, and ultimately improve operational resilience.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Interos

Integrated Cybersecurity Delivers Efficiency and Effectiveness in a Challenging Environment
sponsored by Kaspersky
ANALYST REPORT: According to IDC research, the majority (75%) of organizations worldwide recognize that security team's time is wasted due to a lack of integration in their security environments. These teams would be wise to consider a multi-level, integrated approach with endpoint protection in mind. See this IDC white paper to examine such an approach.
Posted: 17 Feb 2021 | Published: 31 Jul 2020

Kaspersky

Cybersecurity Is Improving, But Is It Enough?
sponsored by eSentire
WHITE PAPER: Threat intelligence and security orchestration are leading the charge in increasingly flexible and dynamic IT environments. But what do IT leaders think? Leverage this 451 Research white paper to uncover critical survey data about modern cybersecurity trends and where attitudes are shifting as more and more companies adopt cloud.
Posted: 17 Feb 2021 | Published: 31 Oct 2019

eSentire

Best Practice ITAM Governance
sponsored by Livingstone Group
WHITE PAPER: IT asset management (ITAM) governance helps protect organizations against a variety of corporate risks and allows them to switch from being reactive to proactive in their risk mitigation. Open up this white paper to read up on everything ITAM governance, including the risks of poor ITAM governance, IT governance best practices and more.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Livingstone Group

Randori Recon How To Prioritize Like An Attacker
sponsored by Randori
EBOOK: With the rise of cloud computing, containerization, and serverless computing, maintaining a perfect inventory of your external assets and ensuring they are patched has become an overwhelming challenge. Read this e-book to discover Randori’s best practices for analyzing your attack surface in the most effective way.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Randori

The Complete Guide to Evaluating Attack Surface Management
sponsored by Randori
RESEARCH CONTENT: Attack surface management (ASM) is an emerging category of solutions which aims to help organizations understand and address risks related to the stark rise in remote devices connected to the internet – read this SANS report to learn more about the ASM market.
Posted: 16 Feb 2021 | Published: 31 Oct 2020

Randori

The Total Economic Impact™ Of ServiceNow Security Operations
sponsored by ServiceNow
ANALYST REPORT: With the growing complexity and volume of cyberattacks, organizations will become more vulnerable to security threats. You need security orchestration tools that can connect security and IT teams for faster and more efficient response to security incidents. Access this Forrester report to get the facts on ServiceNow’s Security Operations.
Posted: 12 Feb 2021 | Published: 30 Oct 2020

ServiceNow

Software & Cloud Lifecycle Management Transformation
sponsored by Livingstone Group
EBOOK: What does a software and cloud lifecycle management transition look like? Dive inside this quick blueprint to step through a software and cloud lifecycle management workshop of your own, revealing the lifecycle challenges your own organization might be grappling with — sometimes without even knowing — and pointing towards the answers of best fit.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Livingstone Group

Email Risk Assessment Report
sponsored by Koris365
ANALYST REPORT: Email security is much talked about right now, and it’s important that you’re up to date on the scale at which it’s under attack, the most popular types of malware bad actors are using and the vulnerability of email in general. Access the Email Risk Assessment Report to understand these trends and to pick up 7 recommendations on email safety.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Koris365

Market Guide for Insider Risk Management Solutions
sponsored by Proofpoint
RESEARCH CONTENT: Security and risk management leaders have observed an increase in demand for assessing and managing insider risk, including surveillance of high-risk workers and anomaly monitoring of critical applications and data. Use this Gartner Market Guide to understand and implement insider risk mitigation.
Posted: 11 Feb 2021 | Published: 29 Dec 2020

Proofpoint

The Changing Vendor Audit Landscape
sponsored by Livingstone Group
WEBCAST: As organizations adopt more cloud platforms with subscription-based licensing, the traditional landscape of software publisher audits and related risk is also rising. This webinar covers these changes and how to prepare through best practices. Tune in to learn about how to approach risk assessment, how to deal with audits and more.
Posted: 11 Feb 2021 | Premiered: Feb 11, 2021

Livingstone Group

ServiceNow Risk & Compliance: Advancing GRC, Risk & BCM
sponsored by ServiceNow
RESEARCH CONTENT: Download this Forrester Total Economic Impact Report for exclusive insight into the efficiencies and advancements in governance, risk and compliance (GRC), vendor risk management (VRM) and business continuity management (BCM) with ServiceNow Risk and Compliance – as well as an analysis of costs.
Posted: 10 Feb 2021 | Published: 31 Jan 2021

ServiceNow

Transforming risk Why digital transformation depends on integrated risk management
sponsored by ServiceNow
EBOOK: Embarking on a digital transformation without considering risk management is like doing a massive home remodel on top of a crumbling foundation – which is why IT and non-IT leaders are embracing integrated risk management (IRM) as part of their transformation. Read this e-book to learn more about IRM and it’s role in digital transformation.
Posted: 28 Jan 2021 | Published: 28 Jan 2021

ServiceNow

Essential Operational Resilience
sponsored by ServiceNow
WHITE PAPER: Operational resilience is defined as ‘the ability of an organization to continue to serve its customers, deliver products and services, and protect its workforce in the face of adverse operational events by anticipating, preventing, recovering from and adapting to such events.’ View this white paper to learn 4 steps to operational resilience.
Posted: 28 Jan 2021 | Published: 28 Jan 2021

ServiceNow

Magic Quadrant For IT Risk Management
sponsored by MetricStream
ANALYST REPORT: By 2025, 50% of businesses will depend on risk management solutions. As such, security and risk management leaders are hunting for such solutions based on cybersecurity initiatives, board risk oversight and digital compliance obligations. Use this Gartner Magic Quadrant to evaluate the strengths and cautions of various players in the space.
Posted: 21 Jan 2021 | Published: 11 Aug 2020

MetricStream

How to fight hackers & respond to ransomware
sponsored by Fidelis
EGUIDE: Cyberthreats aren’t going away any time soon. It’s vital that you take steps to ready your organization for any attack that comes your way. In this expert e-guide, explore 5 actionable deception-tech steps for fighting hackers as well as 9 steps for creating a ransomware incident response plan. Open now to put your best security foot forward.
Posted: 20 Jan 2021 | Published: 15 Jan 2021

Fidelis

Risktech 100 2021
sponsored by MetricStream
RESEARCH CONTENT: Changes in the risk and compliance landscape were accelerated last year, likely due to the spread of COVID-19 – So what will the technology trends, security threat types and emerging offerings in this landscape look like in 2021? Read this exclusive RiskTech 100 research report to find out.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

MetricStream

Global CISO Playbook for the New Normal
sponsored by Fidelis
EBOOK: It’s arguable that CISOs have the toughest job in the world right now. Growing cyber terrains, evolving threat landscapes and skill shortages are all placing more pressure on these professionals than ever before. Download this e-book to hear from the CISO of Fidelis Cybersecurity as he outlines strategies and best practices for cyber defense.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Fidelis

Dealing with VUCA
sponsored by InteliSecure
EGUIDE: Today’s IT and security leaders are responsible for dealing with VUCA – volatility, uncertainty, complexity, and ambiguity – and address data security risks in an ever-changing landscape. Read this InteliSecure e-guide to address the elements of VUCA and build agile data protection.
Posted: 30 Dec 2020 | Published: 30 Dec 2020

InteliSecure
1 - 25 of 350 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences