IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed   
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 362 Matches Previous Page  |  Next Page
How to Detect the 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Forgeries. Imposters. Counterfeit documents. You can't afford to let fake identities slip through the cracks and put your company—and your customers—at risk. Learn how to detect the 7 most common types of ID fraud, and how advanced identity verification technology can turn things around.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Onfido

A Guide to Digital Identity Verification: The Technology and Trends
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Onfido

What it Takes to be GDPR Compliant
sponsored by ServiceNow
WHITE PAPER: On May 25, 2018, GDPR compliance became mandatory. So, what impact does this regulation have on your business? How does it change the way you collect and store – and even define – personal data? In this e-book, ServiceNow offers insights they've gathered from working with their customers on GDPR compliance.
Posted: 13 Feb 2019 | Published: 30 Sep 2018

TOPICS: 
ServiceNow

A Guide to Digital Identity Verification
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Onfido

How to Combat Fraud in 3 Easy Steps
sponsored by Onfido
WHITE PAPER: Identity theft is the fastest growing crime in the US and accounts for half of all reported fraud in the UK, with 1 in 60 online transactions attempted globally being fraudulent. This white paper looks at 7 ways fraudsters are slipping through the net, what to watch out for and how to combat fraud in 3 simple steps.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Onfido

Seamless Security Integration During a Merger or Acquisition Process
sponsored by Dell SecureWorks
WHITE PAPER: In addition to the challenges of brokering and completing a merger or acquisition, the logistics of integrating two or more businesses and closing potential risk gaps can be staggering. In this white paper, learn how a cybersecurity firm can deliver crucial expertise to facilitate a seamless integration of each company's cybersecurity program.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
Dell SecureWorks

Accelerating Security Response
sponsored by ServiceNow
WHITE PAPER: Financial institutions have long been leaders in information security, spending a significant amount of their IT budgets on safeguarding their companies. While they have always been working on reducing threats, new challenges continue to emerge. In this white paper, learn about some of the new challenges financial institutions are facing.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
ServiceNow

3 Keys to Managing Vendor Risk in Financial Services
sponsored by ServiceNow
WHITE PAPER: With near-daily security breaches, every business should have risk management at the top of its to-do list. Many financial institutions don't recognize the need to look beyond their own systems. The solution to this is a vendor risk management process that allows organizations to prioritize each vendor based on the risk they pose to the business.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
ServiceNow

Four Steps to Developing a World-Class Security Program
sponsored by Dell SecureWorks
WHITE PAPER: A reactive security approach is all too common, even though the question is not if a company will suffer an incident but when. By adopting a proactive stance, organizations minimize the likelihood of suffering a breach. In this white paper, discover 4 steps to developing a world-class security program.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Dell SecureWorks

Evolving Your Security Architecture to Meet Current and Future Needs
sponsored by Dell SecureWorks
WHITE PAPER: The security of an organization is dependent on the quality of its enterprise information security architecture. A security architecture should be designed for the specific organization it's going to protect. In this white paper, learn how to define your security needs and reassess your security architecture as new threats develop.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Dell SecureWorks

Understanding Security Ratings
sponsored by Security Scorecard
WHITE PAPER: Security ratings grade your organization on how well it protects information. In a digital world, the importance of data and your company's protection of that data parallels your income and protection of financial assets. In this white paper, learn all things security ratings including what they are and why they are useful.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Security Scorecard

The Forrester New Wave™: Cybersecurity Risk Rating Solutions, Q4 2018
sponsored by Security Scorecard
RESEARCH CONTENT: According to Forrester's survey, only 14% of respondents are confident that they effectively track all of their third parties. Cybersecurity risk rating solutions can help by automating the collection and analysis of third-party risk data. In this report, Forrester identifies the 9 most significant cybersecurity risk rating solution providers.
Posted: 11 Feb 2019 | Published: 13 Nov 2018

TOPICS: 
Security Scorecard

2018 Incident Response Insights Report
sponsored by Dell SecureWorks
RESEARCH CONTENT: In Secureworks 2018 Security Leaders Survey, 43% of respondents said that regular threat hunting activities were part of their incident response program. Access this 29-page research report to uncover best practices and valuable lessons learned over the past year from real-world incidents.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Dell SecureWorks

Security Maturity: Mapping the Road to Resilience
sponsored by Dell SecureWorks
WHITE PAPER: Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Dell SecureWorks

State and Local Governments Chart Their Path Toward Improved Digital Security
sponsored by Dell EMC
RESOURCE: State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Dell EMC

The Complete Guide to Building Your Vendor Risk Management Program
sponsored by Security Scorecard
WHITE PAPER: Tackling the problem of vendor risk isn't made any easier by the fact that with technology solutions being added by the day, current vendor risk management (VRM) processes are not equipped to handle the growing demand of security risk assessments for new and existing third-parties. In this guide, learn how to improve your VRM program.
Posted: 08 Feb 2019 | Published: 31 Dec 2017

TOPICS: 
Security Scorecard

How Security Ratings Improve Risk Awareness While Delivering a Solid ROI
sponsored by Security Scorecard
WHITE PAPER: Combatting cybersecurity risk is a difficult challenge. Without visibility into internal and external risk, this battle becomes even harder. In this white paper, learn how security ratings offer critical insight into vulnerabilities presented both in your environment and the environment of third-parties.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Security Scorecard

How to Reach Cybersecurity Maturity in 5 Critical Steps
sponsored by Dell SecureWorks
WHITE PAPER: Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Dell SecureWorks

The Business Case for Investing in a Security Ratings Platform
sponsored by Security Scorecard
WHITE PAPER: Data breaches caused by third-party vendor relationships are on the rise. Unfortunately, most assessment techniques are point-in-time and only express a vendor's cyber health at a particular moment. In this white paper, learn how a security ratings platform can help companies to monitor changes in the health of their vendor ecosystems.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Security Scorecard

Market Guide for Data Masking
sponsored by Micro Focus
WHITE PAPER: Security and risk management leaders should use data masking to desensitize or protect sensitive data. Privacy regulations, such as the GDPR, in particular, continue to drive strong interest in this technology market. In this white paper, discover key findings from Gartner's research and review recommendations for all organizations.
Posted: 06 Feb 2019 | Published: 20 Jul 2018

TOPICS: 
Micro Focus

Security Challenges for State and Local Government IT Departments
sponsored by Dell EMC
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 06 Feb 2019 | Published: 06 Feb 2019

TOPICS: 
Dell EMC

Rethinking Data Security
sponsored by Forcepoint
WHITE PAPER: The traditional network security perimeter has dissolved, primarily because of the rise of mobile employees and the adoption of cloud services. The result of this is overwhelmed security teams. In this white paper, learn how Forcepoint's Dynamic Data Protection helps organizations solve the fundamental challenges of traditional DLP deployments.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
Forcepoint

Endpoint Security: 7 Things you Should Pay Attention to Now
sponsored by Freudenberg IT
WHITE PAPER: Outdated browsers, network protocol vulnerabilities, untrained users – these days, malware has lots of entry points. While hackers are becoming more professional, most companies are inadequately positioned when it comes to device security. In this white paper, learn 7 things you should pay attention to in order to secure your organization.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
Freudenberg IT

A Risk-Adaptive Approach to Dynamic Data Protection
sponsored by Forcepoint
VIDEO: Data protection can halt a security organization and productive work. Today, security teams are bogged down with alerts – but they don't have to be. Tune into this webinar to see how this data protection system uses human-centric behavior analytics to continuously determine the risk users pose, based on their actions.
Posted: 04 Feb 2019 | Premiered: 04 Feb 2019

TOPICS: 
Forcepoint

Integrated Security Analytics
sponsored by Forcepoint
WHITE PAPER: Security systems generate a large number of alerts, but only a small subset of them represent critical risks to high value business data. Noise makes the task of identifying genuine data theft risks challenging, even for well-resourced security operations teams. In this white paper, read about Forcepoint's integrated security analytics system.
Posted: 04 Feb 2019 | Published: 31 Dec 2017

TOPICS: 
Forcepoint
1 - 25 of 362 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement