Risk Assessment Reports

Internal Controls Checklist for Corporate Data Protection and Compliance
sponsored by TechTarget Security
EGUIDE: In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
Posted: 11 May 2011 | Published: 09 May 2011

TechTarget Security

2010 Endpoint Risk Assessment: Internal Vulnerabilities
sponsored by Promisec
WHITE PAPER: This study will show you the most common security issues that were found and how they were dealt with by the various organizations.
Posted: 23 May 2011 | Published: 23 May 2011

Promisec

Methodology for Information Quality Management
sponsored by Harte-Hanks Trillium Software
WHITE PAPER: This paper discusses how Trillium Software extends that principle to ensure services are driven by data governance defining the criticality and use for the data, and establishing roles and responsibilities within the business and IT to achieve business goals and objectives.
Posted: 10 May 2011 | Published: 10 May 2011

Harte-Hanks Trillium Software

Presentation Transcript: Client-Side Security Issues - The Twilight Zone of Web Security
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript discusses the various types of JavaScript client-side issues that exist in today’s Web applications, their prevalence on the internet and how to locate and fix them.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

IBM

Handle with Care: Calculating and managing risk is tricky business
sponsored by TechTarget ComputerWeekly.com 
EZINE: In this inaugural issue of Information Security Europe, our cover story dives-deep into the difficult task of calculating and managing risk in the ever-changing European threat landscape.
Posted: 25 Mar 2011 | Published: 25 Mar 2011

TechTarget ComputerWeekly.com 

The Systems Engineering Balancing Act: Choosing an Optimum Development Approach
sponsored by IBM
WHITE PAPER: This thought leadership white paper proposes a combination of requirements-driven, model-driven and test-driven approaches as a mechanism for delivering systems development projects at a reduced cost and risk.
Posted: 23 Mar 2011 | Published: 23 Mar 2011

IBM

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives
sponsored by ISACA
WHITE PAPER: Globalization and recent economic pressures have resulted in increased requirements for the availability, scalability and efficiency of enterprise information technology (IT) solutions.
Posted: 23 Mar 2011 | Published: 23 Mar 2011

ISACA

E-Guide: Risk Management and Compliance Enforcement for the Financial Industry
sponsored by IBM
EGUIDE: This e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

Smart Decision Making in the Era of New Financial Challenges
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to learn why the Monte Carlo modeling method provides a beacon of financial sanity and reliability at time when consumer confidence is at an all-time low and managers face new levels of accountability and keen public scrutiny in their decision-making.
Posted: 22 Mar 2011 | Published: 02 Mar 2009

Oracle Corporation

Optimize Data Management for Smarter Banking and Financial Markets E-Book
sponsored by IBM
EBOOK: This e-book explains how smarter banks can anticipate customer needs and deliver innovative products faster, more consistently and more nimbly than the competition. They have full visibility of their risk position and customer needs. And they respond quickly to both challenges and opportunities. Read on to learn how to become a smarter bank.
Posted: 18 Mar 2011 | Published: 18 Mar 2011

IBM

IBM Smart Analytics System offerings powered by IBM System X Servers video
sponsored by IBM
VIDEO: This 8 minute video illustrates how customers can quickly turn data into insights to support analytics, reporting and BI needs with solutions built on IBM System x, IBM System Storage and IBM Software. 
Posted: 17 Mar 2011 | Premiered: 17 Mar 2011

IBM

Information Security Magazine: “Health Care Data Protection”
sponsored by Information Security Magazine
EGUIDE: This month’s Information Security Magazine Online cover story dissects the recent HIPAA revisions made by the HITECH Act.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

Information Security Magazine

E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by Safestone Technologies
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 08 Mar 2011 | Published: 08 Mar 2011

Safestone Technologies

March Issue of Information Security magazine: “Virtual Certainty: VMs introduce a new security dynamic”
sponsored by Information Security Magazine
EZINE: This month’s Information Security Magazine Online cover story explores the need for sound security and risk management strategies around virtualization technology.
Posted: 04 Mar 2011 | Published: 04 Mar 2011

Information Security Magazine

Presentation Transcript: Taming the Data Demons: Leveraging Information in the Age of Risk
sponsored by IBM
PRESENTATION TRANSCRIPT: Check out this presentation transcript from IBM as it discusses the advantages of implementing a holistic approach to data risk management, and provides both the “why” and “how” to begin putting a holistic data risk management program to work in businesses of all sizes.
Posted: 31 Jan 2011 | Published: 31 Jan 2011

IBM

Presentation Transcript: Protect Data and Client Trust - An End-to-End Approach to Protecting Your Client Applications and Organizations
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Protect Data and Client Trust: An End-to-End Approach to Protecting Your Client Applications and Organizations” outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

IBM

Strengthening Governance, Risk, and Compliance in the Banking Industry
sponsored by SAP America, Inc.
ANALYST REPORT: Learn the reasons why a holistic view of risk in your company is essential in times of financial turbulence - and how many companies are adding value through governance, risk, and compliance (GRC) initiatives. Read this report to learn more. (Economist Intelligence Unit, 2009)
Posted: 05 Jan 2011 | Published: 05 Jan 2011

SAP America, Inc.

Presentation Transcript: What’s New with Rational Application Security?
sponsored by IBM
PRESENTATION TRANSCRIPT: Every day, more and more business is conducted online creating new challenges for meeting web application security and compliance.  This presentation transcript explores an approach that will help your organization address today’s biggest threats.
Posted: 18 Dec 2010 | Published: 18 Dec 2010

IBM

E-Book: Standardizing Business Continuity
sponsored by IBM
EBOOK: Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
Posted: 15 Dec 2010 | Published: 15 Dec 2010

IBM

E-Guide: How Risk Management Standards Can Work For Enterprise IT
sponsored by ArcSight, an HP Company
EGUIDE: Every organisation should be able to articulate how IT threats can harm a business. In this e-guide, Forrester Research Analyst Chris McClean explains how a five-step risk management strategy can add value to the rest of the organisation.
Posted: 13 Dec 2010 | Published: 10 Dec 2010

ArcSight, an HP Company

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by ArcSight, an HP Company
EGUIDE: Insider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.
Posted: 13 Dec 2010 | Published: 10 Dec 2010

ArcSight, an HP Company

E-Book: Technical Guide on Application Security: Scanning Production Applications
sponsored by IBM
EBOOK: This e-book explores how many of the risks associated with scanning can be avoided with careful planning and by focusing your scans on exploring where and how a system is vulnerable to attack and not trying to simulate an actual attack. Continue reading to learn more about scanning production applications.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

IBM

E-Book: Technical Guide on Application Security: Secure Development
sponsored by IBM
EBOOK: When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

IBM

Presentation Transcript: Understanding Risk: An Opportunity for IT Managers
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Understanding Risk: An Opportunity for IT Managers” outlines the results of an IBM Global Risk Study that was commissioned to understand how IT managers are working to understand and mitigate risk.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

IBM

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security
sponsored by IBM
EGUIDE: Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.
Posted: 03 Nov 2010 | Published: 25 Oct 2010

IBM