Business of Information Technology  >   Business Management  >   Risk Management  >   Public Health Emergencies  >  

Severe Acute Respiratory Syndrome

RSS Feed   
Severe Acute Respiratory Syndrome Reports
 
Preparing the Enterprise for a Pandemic
sponsored by Avaya Inc.
WHITE PAPER: This article suggests that enterprises need to look externally as much as internally to understand the impact a pandemic might have, and to prepare an appropriate response.
Posted: 09 Jun 2008 | Published: 01 Sep 2006

Avaya Inc.

The Role of AI and Analytics in Enabling Successful Digital Transformation of the Cable/Telco Sector
sponsored by Vitria Technology, Inc.
WHITE PAPER: Download this Q&A to learn about AI and IoT use cases in the cable and telecommunications sector, as well as how these technologies have—and will continue to—shape digital transformation.
Posted: 05 Sep 2018 | Published: 05 Sep 2018

Vitria Technology, Inc.

Busting Threat Intelligence Myths: A Guide for Security Pros
sponsored by Recorded Future
WHITE PAPER: There are many misconceptions about what threat intelligence is, leading many security pros to believe that threat intelligence doesn't have an advantage to bring into their particular role. Explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Recorded Future

PRA's 4 Key Principles of Model Risk Management
sponsored by SAS
WHITE PAPER: Done poorly, Model Risk Management (MRM) compliance can add on millions in direct and indirect costs for banks. Download this white paper for guidance on setting up an MRM operating model that is both compliant and low costing.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

SAS

Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal
sponsored by Tenable
WHITE PAPER: Find out what steps you can take today to improve your vulnerability assessment strategy – no matter where you are on the maturity scale
Posted: 20 Aug 2018 | Published: 08 Aug 2018

Tenable

Protecting Against Third-Party Breaches Requires Continuous Monitoring
sponsored by BitSight
RESOURCE: With growing numbers of data breaches being traced to third parties with lax security processes, organizations are implementing "always-on" vendor risk management programs. Read on for insights on continuous monitoring and third-party risks.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

BitSight

Mitigate Business and Security Risk with Splunk
sponsored by Splunk
WHITE PAPER: Learn how your organization can better understand the gaps and vulnerabilities in your environment in order to reduce risk to your business through risk mitigation.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Splunk

Defend your Digital Business from Cyberattacks
sponsored by LogRhythm, Inc.
ANALYST REPORT: Download this Forrester Executive Overview to explore the Zero Trust Model, how it can accelerate digital business, and how you can start defending your customers.
Posted: 09 Nov 2018 | Published: 09 Nov 2018

LogRhythm, Inc.

How Visibility of the Attack Surface Minimizes Risk
sponsored by Skybox Security
RESOURCE: Attackers are being stealthy when they steal data, often targeting areas where visibility lacks. In this SANS resource discover the importance of visibility for minimizing security risk and enhancing security management.
Posted: 09 Aug 2018 | Published: 31 Jul 2018

Skybox Security

Planning Models and Business Intelligence
sponsored by Cornerstone
WHITE PAPER: Download this white paper for a detailed overview of BI tools and planning models, and how an appreciation of their differences can help you design a flexible plan for performance management.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Cornerstone
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement