IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed   
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 548 Matches Previous Page  |  Next Page
GDPR Compliance Cheat Sheet
sponsored by Docauthority
RESOURCE: Explore ways these 5 simple steps can achieve effective compliance for your enterprise and assist with GDPR compliance changes.
Posted: 19 Jul 2018 | Published: 19 Jul 2018

Docauthority

What Works in Third-Party Risk Assessment: Using BitSight for Continuous Monitoring
sponsored by BitSight
CASE STUDY: This Q&A session about third-party risk assessment uncovers how company, KPMG, was able to monitor their third-party vendors and enhance their security measures. Read on to find out more.
Posted: 19 Jul 2018 | Published: 19 Jul 2018

BitSight

Facing Third Party Risk Realities
sponsored by RiskRecon
VIDEO: Learn how you can help manage and control third-party security risks within your enterprise.
Posted: 11 Jul 2018 | Premiered: 25 Jan 2017

RiskRecon

Third-Party Cyber Risk: 8 Key Considerations
sponsored by RiskRecon
WHITE PAPER: Learn how to incorporate continuous monitoring into your third-party risk program, why security risk matters, and how to prioritize those risks.
Posted: 11 Jul 2018 | Published: 11 Jul 2018

RiskRecon

Worldwide Cloud Security Gateways Vendor Assessment
sponsored by McAfee, Inc.
RESEARCH CONTENT: As enterprises lose control over the different architectural components of the cloud, more uncertainty is introduced into the environment, and organizations must rethink their security programs. Learn about the key characteristics for a cloud security platform, from this IDC vendor assessment.
Posted: 02 Jul 2018 | Published: 29 Dec 2017

McAfee, Inc.

Inadequate Penetration Testing Puts Sensitive Data in the Crosshairs
sponsored by InteliSecure
WHITE PAPER: In this white paper, find out why some organizations see penetration testing as a box to check in order to meet compliance requirements and why they must dispel this myth if they want value from the testing.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

InteliSecure

A Force Multiplier for Third-Party Cyber Risk Management
sponsored by CyberGRX
CASE STUDY: Take an in-depth look at how Blackstone, one of the world's leading investment firms, was able to access 5X more 3rd party vendors than before and reduce resources by 50%.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

CyberGRX

The Chief Risk Officer and the Dreadful, Horrid, Inefficient, Very Bad Day
sponsored by Smarsh
RESOURCE: Learn how you can handle operational, market, compliance and reputation concerns, and why it is important to get a good handle on your company's electronic communications data.
Posted: 09 May 2018 | Published: 09 May 2018

Smarsh

The Enterprise Journey to the Hybrid Cloud
sponsored by Cavirin
RESOURCE: Explore the steps required to build a world-class hybrid cloud infrastructure and why you must take into account the risks of having all these systems and applications accessing and manipulating data.
Posted: 09 May 2018 | Published: 09 May 2018

Cavirin

Stop Chasing the Wrong Vulnerabilities - An Introduction to Threat-Centric Vulnerability Management
sponsored by Skybox Security
RESOURCE: Learn about threat-centric vulnerability management (TCVM) as a new approach to reduce the risk of attack on your organization, and how TCVM uses the context of your network to accurately determine risk.
Posted: 02 May 2018 | Published: 02 May 2018

Skybox Security

Disaster recovery and business continuity: Essential guide
sponsored by IBM
EGUIDE: Download this e-guide to create a solid DR and BC plan and protect your organisation from negative events.
Posted: 01 May 2018 | Published: 01 May 2018

IBM

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com

Vendor Assessment: Print and Document Security
sponsored by HP
RESEARCH CONTENT: This IDC market report assesses HP as a print and document security services provider and their ability to prevent data and device-level security breaches.
Posted: 07 Mar 2018 | Published: 31 Oct 2017

HP

Real-Time Threat Prevention lets Managed IT Services Provider Vology Thrive
sponsored by Juniper Networks
CASE STUDY: An IT consulting company, Vology sought to protect corporate headquarters and branch offices from advanced threats in email messages and websites. In this case study, discover how Vology turned to an advanced threat protection tool that constantly analyzes email and web files to detect advanced persistent threats
Posted: 12 Feb 2018 | Published: 31 May 2017

Juniper Networks

Demystifying IT Risk to Achieve Greater Security & Compliance
sponsored by Lynx Technology Partners
WHITE PAPER: Discover 4 steps to help you create effective risk management so that you can get a better picture of the threats facing your organization and improve your defense against them.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Lynx Technology Partners

Service Visibility: Clear Road Ahead
sponsored by ServiceNow
EBOOK: How can efficiently mapping IT infrastructure to business critical services increase service visibility and improve your service delivery? This e-book reveals how service visibility can help you quickly spot the IT issues that threaten your business services.
Posted: 29 Jan 2018 | Published: 31 Aug 2016

ServiceNow

Service Outages Assessment Tool
sponsored by ServiceNow
RESOURCE: To better understand your IT service health and your risk for service outages, take a few minutes to complete this Service Outage Health Check scorecard. You'll get insights on risk factors that can cause service outages, disrupt your business, and ultimately impact ļ¬nancial performance.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

ServiceNow

Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

ComputerWeekly.com

Effectively Monitor, Prioritize, and Automate Response to Third-Party Risk
sponsored by ServiceNow
WHITE PAPER: While assessing vendor risk on a regular basis is critical, it can often be an extremely time-consuming and error-prone exercise involving spreadsheets, email, and rudimentary risk management tools. Learn how to build a more advanced vendor risk management program.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

ServiceNow

Strengthen Your Ransomware Strategy
sponsored by AdvizeX Technologies
WEBCAST: Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.
Posted: 31 Jul 2017 | Premiered: Jul 17, 2017

AdvizeX Technologies

Identity Analytics: A More Comprehensive Defense in the Battle to Reduce Risk and Enhance Security
sponsored by One Identity
RESOURCE: This resource focuses on "entitlement bloats" that may be putting your organization at risk for undetectable bad actors and threats. Learn how to reduce your attack surface by eliminating unnecessary or dormant entitlements before someone can abuse or exploit them.
Posted: 11 May 2018 | Published: 29 Dec 2017

One Identity

Innovation and Technology for GRC
sponsored by Navex Global
RESOURCE: A comprehensive governance, risk and compliance program enables enterprise leaders to mitigate risks, reduce compliance breaches, and improve business performance. This roundtable resource provides detail into governance, risk and compliance programs through insight from 6 experts in the field, who answer 11 relevant questions.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

Navex Global

Definitive Guide to Compliance Program Assessment
sponsored by Navex Global
WHITE PAPER: A strong ethics and compliance program improves organizational culture, protects corporate reputation and enhances employee engagement. This compliance guide offers organizations assistance in evaluating and improving their ethics and compliance programs through industry evidence and insights.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

Navex Global

Anti-Bribery and Corruption Risk Assessment Checklist
sponsored by Navex Global
WHITE PAPER: This Anti-Bribery and Corruption Risk Assessment Checklist outlines how to implement an effective anti-bribery compliance program using a methodology of protecting, detecting and correcting to manage core program components.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Navex Global

Cyber security solutions from IBM
sponsored by IBM
WHITE PAPER: Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection.
Posted: 28 Aug 2017 | Published: 20 Jul 2012

IBM
1 - 25 of 548 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement