IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed   
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 459 Matches Previous Page  |  Next Page
Deconstructing the Risk of Public Cloud: 5 Use Cases
sponsored by Fortinet, Inc.
WHITE PAPER: Organizations have embraced public cloud platforms of all kinds in a big way, but the result is increased security complexity. In this white paper, discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.
Posted: 15 Aug 2019 | Published: 16 May 2019

Fortinet, Inc.

Fortinet 2019 Operational Technology Security Trends Report
sponsored by Fortinet, Inc.
ANALYST REPORT: Fortinet's 2019 OT Security Trends Report analyzes data from FortiGuard Labs to glean insights about the state of security for supervisory control and data acquisition (SCADA) and other industrial control systems (ICS). Download the report to discover key findings.
Posted: 14 Aug 2019 | Published: 08 May 2019

Fortinet, Inc.

State of Operational Technology and Cybersecurity Report
sponsored by Fortinet, Inc.
ANALYST REPORT: Recently, IT-based technologies have been integrated with operational technology networks to create new efficiencies and competitive advantages. However, this increases the digital attack surface and the risk of intrusion. In this research report, explore key findings from a survey of plant operations and manufacturing leaders.
Posted: 14 Aug 2019 | Published: 15 Mar 2019

Fortinet, Inc.

Enterprise Governance, Risk, and Compliance for PeopleSoft
sponsored by Appsian
WHITE PAPER: In this white paper, discover the fundamental parameters necessary to develop an effective security strategy to manage modern threat vectors and navigate complex compliance regulations. Also, explore GRC challenges unique to PeopleSoft and how Appsian Security Platform can enhance security to meet today's compliance requirements.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

GDPR & PeopleSoft: Essentials for Compliance
sponsored by Appsian
WHITE PAPER: Your PeopleSoft applications are the core of your business. Critical PII are housed on hundreds of pages – making them a significant factor in your GDPR compliance strategy. In this white paper, learn about the challenges organizations face when establishing GDPR compliance in PeopleSoft applications.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

CISO and Cybersecurity: A Report on Current Priorities and Challenges
sponsored by Fortinet, Inc.
ANALYST REPORT: The CISO and Cybersecurity Report from Fortinet takes a snapshot of how CISOs are approaching cybersecurity, and how their organizations view the CISO. In this report, explore key takeaways from a survey of CISOs at large enterprises.
Posted: 13 Aug 2019 | Published: 27 Jul 2019

Fortinet, Inc.

How to Boost Your Breach Defense: A 3-Part Plan
sponsored by Micro Focus
RESOURCE: Even the strongest, most protected networks can be brought to their knees with just 1 minor misstep. Thus, the cyber defender has to protect against all attack vectors. In this blog, learn how you can help secure your organization by adopting a 3-part security model consisting of security in depth, DevSecOps, and security validation.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Micro Focus

Top Research For CIOs: Security
sponsored by MASERGY
ANALYST REPORT: Security no longer lives exclusively in the IT department. In this Forrest report, CIOs can gain insight into the trends and key issues in the security landscape. Also, explore opportunities for improving how security is managed regardless of whether you own the security function.
Posted: 09 Aug 2019 | Published: 15 Mar 2019

MASERGY

Independent Study Pinpoints Significant SCADA/ICS Security Risks
sponsored by Fortinet, Inc.
ANALYST REPORT: Many organizations beyond electric and water utilities have deployed SCADA/ICS as they look to automate their data collection and their equipment. However, the technologies have become high-value targets for hackers. In this research report, explore common SCADA and ICS threats and find recommendations for mitigating the risks they pose.
Posted: 09 Aug 2019 | Published: 16 Apr 2019

Fortinet, Inc.

Security, Risk and Governance Breach Defense: Anatomy of a Breach
sponsored by Micro Focus
WEBCAST: The odds of experiencing a data breach are 1 in 4. And as seen from breaches including Equifax, Yahoo and Uber, the effects are costly. But how can organizations keep secure? There needs to be a plan. In this webcast, Rob MacDonald discusses how organizations can use the NIST Framework to strengthen their defenses against a breach.
Posted: 08 Aug 2019 | Premiered: Aug 8, 2019

Micro Focus

7 Steps to Secure Your Supply Chain
sponsored by RackTop Systems
RESOURCE: Supply chain security requires a multifaceted approach to protecting the checkpoints, assets and infrastructures involved with the production of a product. In this resource, explore 7 steps to securing your supply chain.
Posted: 08 Aug 2019 | Published: 08 Aug 2019

RackTop Systems

Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
sponsored by Forcepoint
WEBCAST: Some approaches to information security simply won't deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy. In this webcast, Doug Landoll discusses how to take a risk-first approach to addressing information security.
Posted: 07 Aug 2019 | Premiered: Aug 7, 2019

Forcepoint

Industrial Controls System Vulnerabilities
sponsored by Dragos
ANALYST REPORT: In this report, explore key findings from the Dragos Intelligence team's analysis of ICS-specific vulnerabilities. Also discover the impacts, risk and mitigation options for defenders.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

Dragos

Keeping Fraud Detection Software Aligned With the Latest Threats
sponsored by SAS
WHITE PAPER: Fraud and financial crimes weren't considered serious issues until the 1980s. Since then, they have become commonplace. As fraud changes and evolves, organizations must keep anti-fraud software current to detect new and emerging threats. In this white paper, learn how SAS Visual Investigator can help organizations do this.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

SAS

Balancing Fraud Detection and the Customer Experience
sponsored by SAS
WHITE PAPER: Digital channels are a must-have in the financial industry as customers flock to the businesses that can offer speed and convenience. But there's a dark side. The relative anonymity of digital channels opens up new doors for fraud. In this white paper, learn how organizations can verify a true identity and identify high-risk behavior in real time.
Posted: 07 Aug 2019 | Published: 31 Mar 2019

SAS

Rethinking Data Security with a Risk-adaptive Approach
sponsored by Forcepoint
WHITE PAPER: In this white paper, learn how by using dynamic data protection, organizations can solve the fundamental challenges of traditional data loss prevention deployments and more effectively protect sensitive information, including regulated data sources and PII.
Posted: 06 Aug 2019 | Published: 30 Apr 2019

Forcepoint

Conversational Geek Office 365 Risk Mitigation
sponsored by Mimecast
EBOOK: If you are moving to or already using Office 365 then it's essential for you to formulate a plan toward a risk-free cyber resilience experience. Download this e-book to learn about the security, data assurance and continuity gaps that exist in Office 365 and how Mimecast can help reduce risk and add resilience.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

Mimecast

Employing a Risk Adaptive Model to Detect and Prevent Threats From Within
sponsored by Forcepoint
WEBCAST: Striking a balance between maximizing productivity and minimizing risk requires a security program that can identify and respond to the insider threat. In this webcast Forcepoint Senior Security Strategist Homayun Yaqub, discusses the foundations that underpin an effective program. Watch now to learn more.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019

Forcepoint

Optiv's Managed Security Services Mitigate Risk for Multi-Brand National Retailer
sponsored by Optiv
CASE STUDY: A leading multi-brand national retailer needed to maintain evolving security demands. Learn how Optiv's Managed Security Services (MSS) was able to provide them critical 24x7x365 remote access and infrastructure needed to maximize costs and resources.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

Optiv

Are You Taking a Risk-Adaptive Approach to Dynamic Data Protection?
sponsored by Forcepoint
WEBCAST: In this webcast, Bharath Vasudevan from Forcepoint discusses how taking a risk-adaptive approach combined with behavioral analytics can enable your security to fluctuate based on the threat environment. The webcast will also explore how Forcepoint's solution, Dynamic Data Protection, delivers risk-adaptive protection.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019

Forcepoint

Closing the People, Processes and Technology Gap: How Innovation Can Strengthen Your Cybersecurity Program
sponsored by Optiv
RESOURCE: A robust security model is built on 3 pillars—people, processes and technology. Unfortunately, a failure to innovate could negatively affect your ability to excel at all 3. In this blog, explore these 3 pillars and discover 5 steps to solving the people, process and technologies equation.
Posted: 05 Aug 2019 | Published: 24 Jul 2019

Optiv

CyberArk for Dummies: Privileged Access Security
sponsored by CyberArk Software, Inc
EBOOK: The key to most companies' crown jewels is through privileged access, whether a privileged account, credential, or secret. So if protecting privileged access is so critical, why aren't companies doing more to guard against these types of attacks? In this e-book, learn everything you need to know about protecting privileged access.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

CyberArk Software, Inc

ICS Activity Groups and the Threat Landscape
sponsored by Dragos
WHITE PAPER: Throughout 2018, the amount of activity targeting industrial control systems (ICS) increased substantially. Also in 2018, ICS security risk grew even absent any destructive attacks. In this white paper, explore threat activity groups targeting ICS and details about their activity, methodologies, victimologies, and future concerns.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

Dragos

Be the Disrupter, Not the Disrupted
sponsored by Micro Focus & DXC Technology
RESOURCE: On the journey to digitally transform your business, don't forget the essentials: enterprise security and risk management. After all, disrupting the status quo with better business outcomes requires not falling prey to disruptions from cyberthreats. In this infographic, learn the top challenges in cyberthreat defense and how you can overcome them.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Micro Focus & DXC Technology

Adapting to the New Reality of Evolving Cloud Threats
sponsored by Symantec
ANALYST REPORT: The heterogeneity of the modern enterprise environment, spanning both on-premises and diverse cloud platforms, has added a broader set of vulnerabilities and strike vectors. In this Cloud Security Threat Report, explore best practices for building an effective cloud security strategy to help address these challenges.
Posted: 01 Aug 2019 | Published: 30 Jun 2019

Symantec
1 - 25 of 459 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement