IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed   
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 569 Matches Previous Page  |  Next Page
A Risk-Adaptive Approach
sponsored by Forcepoint
ANALYST REPORT: Download this report to learn how applying a Continuous Adaptive Risk and Trust Assessment approach to your organization will allow you to meet the latest evolving adaptive security challenges.
Posted: 07 Sep 2018 | Published: 31 Dec 2017


Keeping Your Application Fleet Flying Risk Free
sponsored by Flexera Software
WHITE PAPER: Just like sending an airplane out for take-off without any preemptive maintenance checks, deploying applications without vulnerability scans poses a major risk for your organization. Download this whitepaper to learn how your organization can mitigate application risks and stay secure.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Flexera Software

Vulnerability Review 2018: Global Trends
sponsored by Flexera Software
RESEARCH CONTENT: Download this report for key figures and facts on vulnerabilities from a global information security perspective.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Flexera Software

Analytics: The Key to Identifying and Mitigating Third-Party Risk
sponsored by CyberGRX
WHITE PAPER: Discover how ecosystem analytics allows companies to understand sources and levels of potential risk along from third parties with contextual information and comparative screening.
Posted: 21 Aug 2018 | Published: 21 Aug 2018


Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal
sponsored by Tenable
WHITE PAPER: Find out what steps you can take today to improve your vulnerability assessment strategy – no matter where you are on the maturity scale
Posted: 20 Aug 2018 | Published: 08 Aug 2018


Managing User Risk: A Review of LogRhythm Cloud AI for User and Entity Behavior Analytics
sponsored by LogRhythm, Inc.
WHITE PAPER: SANS analyst and cybersecurity professional, Dave Shackleford, takes an in-depth look at user and entity behavior (UEBA) solutions that take advantage of machine learning intelligence capabilities.
Posted: 09 Aug 2018 | Published: 28 Feb 2018

LogRhythm, Inc.

Quantifying Business Risk to Optimize Data Security
sponsored by InteliSecure
EBOOK: Learn how to improve your company's data protection strategies, reduce security spending, and reevaluate your vulnerabilities with business risk and ROI assessments.
Posted: 06 Aug 2018 | Published: 06 Aug 2018


Your Guide to Integrated Risk Management Vendors
sponsored by ServiceNow
RESEARCH CONTENT: In this Gartner Magic Quadrant report for security and risk management leaders, get a breakdown of the current field of integrated risk management tools and find out which platforms offer the capabilities you need to secure your enterprise and improve compliance.
Posted: 30 Jul 2018 | Published: 16 Jul 2018


A Modern Approach to Securing Your Hybrid Cloud
sponsored by Dimension Data
RESOURCE: In this e-book, find out how you can deliver automated and elastic security to keep assets and data protected in a hybrid cloud environment.
Posted: 27 Jul 2018 | Published: 27 Jul 2018

Dimension Data

Top Trends Shaping IAM In 2018 Landscape: The Identity And Access Management Playbook
sponsored by OneLogin
ANALYST REPORT: In this Forrester report, explore several trends that will have an impact of IAM budgets, skills, priorities, architectural decisions, the vendor landscape, and deployment options.
Posted: 26 Jul 2018 | Published: 09 Jan 2018


Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: Although cybersecurity risk is now top of mind, measuring and managing security risk levels continues to be a difficult task for organizations today. Explore ways your business could benefit from a new approach to managing your third party risks, security performance, and more.
Posted: 23 Jul 2018 | Published: 23 Jul 2018


What Works in Third-Party Risk Assessment: Using BitSight for Continuous Monitoring
sponsored by BitSight
CASE STUDY: This Q&A session uncovers how KPMG was able to continuously monitor their third-party vendors and enhance their risk assessment measures. Read on to find out more.
Posted: 19 Jul 2018 | Published: 19 Jul 2018


Worldwide Cloud Security Gateways Vendor Assessment
sponsored by McAfee, Inc.
RESEARCH CONTENT: As enterprises lose control over the different architectural components of the cloud, more uncertainty is introduced into the environment, and organizations must rethink their security programs. Learn about the key characteristics for a cloud security platform, from this IDC vendor assessment.
Posted: 02 Jul 2018 | Published: 29 Dec 2017

McAfee, Inc.

Inadequate Penetration Testing Puts Sensitive Data in the Crosshairs
sponsored by InteliSecure
WHITE PAPER: In this white paper, find out why some organizations see penetration testing as a box to check in order to meet compliance requirements and why they must dispel this myth if they want value from the testing.
Posted: 02 Jul 2018 | Published: 02 Jul 2018


A Force Multiplier for Third-Party Cyber Risk Management
sponsored by CyberGRX
CASE STUDY: Take an in-depth look at how Blackstone, one of the world's leading investment firms, was able to access 5X more 3rd party vendors than before and reduce resources by 50%.
Posted: 25 Jun 2018 | Published: 25 Jun 2018


The Chief Risk Officer and the Dreadful, Horrid, Inefficient, Very Bad Day
sponsored by Smarsh
RESOURCE: Learn how you can handle operational, market, compliance and reputation concerns, and why it is important to get a good handle on your company's electronic communications data.
Posted: 09 May 2018 | Published: 09 May 2018


Optimize Information Management for Improved Information Security, Governance and Compliance
sponsored by Hyland
WHITE PAPER: Smart information management starts with common-sense practices and tools your organization may already own. Download this white paper to learn how your organization can reduce risk, protect information, and follow industry best practices to attain and maintain regulatory compliance.
Posted: 31 Aug 2018 | Published: 31 Aug 2018


Making Intelligent Decisions about Identities and their Access
sponsored by IBM
EBRIEF: Explore this e-brief to learn how identity governance and management can help your enterprise maintain strong control over user access to applications and carefully monitor how access entitlements align with business roles and responsibilities.
Posted: 03 Aug 2018 | Published: 31 Oct 2016


Podcast: The Internet Never Forgets: How to Reduce Your Organization's Attack Surface and Cyber Risk with Digital Risk Reconnaissance
sponsored by IntSights
PODCAST: Join guest speakers, Nick Hayes, Forrester's Senior Security and Risk Analyst, along with Alon Arvatz, Chief Product Officer and Co-Founder of IntSights, for a discussion on the importance of Digital Risk Protection for enterprise security, compliance and risk teams.
Posted: 02 Aug 2018 | Premiered: Jul 30, 2018


The Internet Never Forgets: How to Reduce Your Organization's Attack Surface and Cyber Risk with Digital Risk Reconnaissance
sponsored by IntSights
WEBCAST: Join guest speakers, Nick Hayes, Forrester's Senior Security and Risk Analyst, along with Alon Arvatz, Chief Product Officer and Co-Founder of IntSights, for a discussion on the importance of Digital Risk Protection for enterprise security, compliance and risk teams.
Posted: 01 Aug 2018 | Premiered: Jul 30, 2018


Getting Started with Vulnerability Mitigation
sponsored by Kaseya
RESOURCE: Find out which applications are most vulnerable to your enterprise and modernize your software and vulnerability management strategy today.
Posted: 26 Jul 2018 | Published: 26 Jul 2018


The Forrester Wave: Risk-Based Authentication
sponsored by IBM
RESEARCH CONTENT: Find out how risk-based authentication (RBA) providers such as CA Technologies, IBM, ThreatMatrix, and more, compare to each other to help your organization make the right choice, with security and risk in mind.
Posted: 26 Jul 2018 | Published: 17 Jul 2017


Facing Third Party Risk Realities
sponsored by RiskRecon
VIDEO: Learn how you can help manage and control third-party security risks within your enterprise.
Posted: 11 Jul 2018 | Premiered: 25 Jan 2017


Third-Party Cyber Risk: 8 Key Considerations
sponsored by RiskRecon
WHITE PAPER: Learn how to incorporate continuous monitoring into your third-party risk program, why security risk matters, and how to prioritize those risks.
Posted: 11 Jul 2018 | Published: 11 Jul 2018


Identity Analytics: A More Comprehensive Defense in the Battle to Reduce Risk and Enhance Security
sponsored by One Identity
RESOURCE: This resource focuses on "entitlement bloats" that may be putting your organization at risk for undetectable bad actors and threats. Learn how to reduce your attack surface by eliminating unnecessary or dormant entitlements before someone can abuse or exploit them.
Posted: 11 May 2018 | Published: 29 Dec 2017

One Identity
1 - 25 of 569 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement