3 Steps to Manage Technology Spend and Risk
By: ServiceNow View more from ServiceNow >>
Download this next:
7 risk mitigation strategies to protect business operations
By: TechTarget ComputerWeekly.com
Type: Infographic
Without risks to manage and threats to mitigate, life in business would be a lot easier. Internal risks, external risks and threats can disrupt or destroy the four critical elements that most enterprises need to operate: people, processes, technology and facilities. Each of the four elements can have vulnerabilities.
As part of an enterprise risk management program, risk mitigation strategies must not only identify risks and threats, such as organizational risks, but also stress the importance of identifying vulnerabilities that could open the door to risk events. In this infographic, we put together the seven most widely used risk mitigation strategies to help business keep their data safe.
These are also closely related to: "3 Steps to Manage Technology Spend and Risk"
-
Insuring the uninsurable: Is cyber insurance worth its salt?
By: TechTarget ComputerWeekly.com
Type: Research Content
Cyber insurance is one of the fastest growing areas of risk cover in the insurance industry as businesses increasingly turn to specialist insurance in an attempt to cover a portion of their enterprise risk.
Cyber risk is notoriously difficult to quantify and businesses face an arduous choice in deciding which risks to manage themselves and which risks to transfer to the insurance market.
This article dips a toe into this emerging risk area and outlines some steps businesses can take to make better informed risk mitigation decisions.
-
Infographic: Top 12 risk management skills
By: TechTarget ComputerWeekly.com
Type: Infographic
Risk management is a must for anyone who aspires to be a leader or manager. There is risk to be addressed at all business levels, and if a leader is unable to manage risk, their upward mobility will disappear.
Being a capable risk manager requires awareness and knowledge to uncover potential risks and present them to people best suited to solve the problem. A risk manager doesn't necessarily have to make the fix -- they just need to bring it to the person who can.
Find more content like what you just read:
-
Traditional vs. enterprise risk management: How do they differ?
By: TechTarget ComputerWeekly.com
Type: eGuide
Businesses understand they cannot exist in a risk-free environment. How to manage the risks they face depends on many variables, including the industry the business is in and its size. In this e-guide, we compare traditional risk management and enterprise risk management and outline the important differences between the two.
-
Explore the latest insights on managing technology risks
By: Riskonnect
Type: eBook
As technology permeates every aspect of business, organizations face growing risks from cybercrime, compliance demands, and internal threats. This ebook explores a comprehensive technology risk management strategy to anticipate, manage, and respond to these risks and protect your digital assets. Read the full ebook to learn more.
-
A CISO's guide to reducing risk and complexity across IT
By: Cloudflare
Type: White Paper
As cybersecurity risks expand, CISOs need a unified approach to evaluate, exchange, and enforce risk posture across users, apps, and data. Learn how to simplify risk management and optimize security investments in this e-book.
-
Going Beyond the SBOM: Bringing Control to Third-Party Software Risk
By: Reversinglabs
Type: White Paper
Going Beyond the SBOM highlights the limitations of traditional SBOMs and vendor risk assessments in identifying and mitigating software supply chain risks. Further outlining how security and risk professionals can manage third-party software security risk on their own terms.
-
Going Beyond the SBOM: Bringing Control to Third-Party Software Risk
By: ReversingLabs
Type: White Paper
SBOMs alone are insufficient to protect against the evolving threat landscape. “Going Beyond the SBOM” highlights the limitations of traditional SBOMs and vendor risk assessments in identifying and mitigating software supply chain risks. Read on to manage third-party software security risk on your own terms.
-
12 top enterprise risk management trends in 2023
By: TechTarget ComputerWeekly.com
Type: eGuide
Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.
-
Insights on building risk and resiliency into supply chain models
By: Coupa
Type: White Paper
This white paper explores building risk and resiliency into supply chain models to mitigate disruption impacts. Readers will learn about risk analysis, selecting responses, and faster recovery post-disruption. Discover how supply chain modeling can help achieve a more resilient supply chain by reading the full white paper.
-
World Economic Forum Global Risks Report 2018
By: TechTarget ComputerWeekly.com
Type: Research Content
The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.
-
Digital.ai Intelligence – Change Risk Prediction
By: Digital.ai
Type: Product Overview
Predict and mitigate change failure risks in your application environment. Learn how Digital.ai Intelligence - Change Risk Prediction can help you make data-driven decisions, accelerate agility, and reduce costs associated with production incidents. Read the full product brief.
-
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
By: TechTarget ComputerWeekly.com
Type: Resource
Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
-
Top 10 ways to anticipate, eliminate, and defeat cyberthreats like a boss
By: ServiceNow
Type: eBook
With 90% of organisations saying digital transformation introduces new risks, what if you could enable agility in technology innovation safely and confidently? Discover how easy it is to drastically improve your risk and security hygiene in this guide.
-
Crucial Digital Transformation Risks and How to Mitigate Them
By: Corsica Technologies
Type: Blog
Digital transformation offers significant benefits, but also carries risks. Learn the top 9 digital transformation risks and how to mitigate them in this blog post.
-
Rethinking security: Preparing for the 2025 threat landscape
By: CultureAI
Type: Infographic
As the cyber threat landscape evolves, organizations must rethink security strategies with Human Risk Management (HRM) as a pivotal solution. Explore how employee-focused vulnerabilities and undetectable threats are driving the need for proactive risk management approaches in this insightful infographic.
-
Safety certification: Have you planned for these cost and schedule risks?
By: Wind River
Type: Webcast
This webinar examines the factors that influence a certifiable solution program schedule and details what you can do to mitigate common risks to achieve an on-time and on-budget development effort.
-
Embrace change management with AI
By: Digital.ai
Type: Video
The circumstances of the modern business world force today’s organizations to embrace constant change. This video introduces Digital.ai’s Change Risk Prediction (CRP) product, which uses predictive AI to help organizations account for and deal with risk as they manage change. Watch the brief video now to learn more about CRP.
-
Understanding Data Security Posture Management: Myths vs. Realities
By: Zscaler
Type: White Paper
This white paper debunks common myths about data security posture management (DSPM) and explains how DSPM complements other security solutions to comprehensively protect sensitive data across cloud environments. Read the full white paper to learn how DSPM can enhance your overall data security strategy.
-
CISO's AI Journey Checklist
By: CBTS
Type: Infographic
This infographic provides a guide for CISOs on securely integrating AI into their organizations. It covers critical steps such as assessing AI risks, understanding data requirements, approving AI services, and fostering a culture of ethical AI use. Download the infographic to learn how to strengthen your organization's cybersecurity with AI.
-
A Computer Weekly buyer's guide to compliance, risk and governance
By: TechTarget ComputerWeekly.com
Type: eGuide
Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
-
Risk management is the beating heart of your cyber strategy
By: TechTarget ComputerWeekly.com
Type: eBook
In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.
-
Security leader's guide to AI-powered app governance
By: Palo Alto Networks
Type: White Paper
This whitepaper explores establishing a governance framework for AI-powered applications. It covers the AI landscape, security implications, and risks like data poisoning and model bias. Readers will learn to gain visibility into AI models, implement control policies, and maintain compliance. Read the full white paper for AI governance practices.
-
Financial Services Brief: Compliance Landscape
By: Splunk
Type: White Paper
In the Financial Services Compliance Outcome Brief, discover how real-time monitoring, proactive risk assessment and automated audits can help financial services organizations remain compliant, mitigate risks and safeguard their reputation while adapting to increasing regulatory complexity.
-
Secure remote access: More vital than ever thanks to Covid-19
By: TechTarget ComputerWeekly.com
Type: eGuide
We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
-
A How-To Guide: Identity Security & Mitigating Risk
By: SailPoint Technologies
Type: White Paper
As work environments shift to the cloud, identity security is critical to mitigate cyber threats. Discover how to automate access controls, leverage AI to detect risks, and streamline risk prevention in this in-depth e-book. Read the full guide to build a stronger, more resilient defense.
-
Top IT security priorities: Addressing risk management and compliance
By: Dell Software
Type: eGuide
In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.
-
Explore how AI can enhance change and release management
By: Digital.ai
Type: White Paper
This whitepaper explores how AI and machine learning can enhance change and release management. Learn how predictive modeling, risk visualization, and incident prediction can make change management more agile and remove bottlenecks. Read the full whitepaper to discover the benefits of AI-powered change management.
-
Software Supply Chain Security for Dummies
By: Reversinglabs
Type: eBook
Understand the why, the how — and what actions your organization should take — in the new era of security. Get this guide to learn about the landscape of supply chain risks & threats, 10 tips for a successful SSCS program and how to hunt for threats in your supply chain.
-
How to reduce risk and improve your security posture with CTEM
By: XM Cyber
Type: White Paper
Increasingly, The Continuous Threat Exposure Management (CTEM) Framework by Gartner is being seen as an impactful way to address the full range of challenges that put organizations at risk. Read this white paper now to discover the 5 stages of CTEM and find out how you can change the way your business handles cyber risk.
-
Eliminate your API vulnerabilities with Cequence Unified API Protection
By: Cequence
Type: Data Sheet
Today’s security teams simply lack the visibility and defense capabilities they need to protect the ever-growing risk from APIs and other application connections. Check out this data sheet to see how the Cequence Unified API Protection solution can reinforce the vulnerabilities that may undermine your organization.
-
How to mitigate the impact of IT downtime and boost resilience
By: NCC Group
Type: Blog
This blog post is designed to help readers understand the hidden costs of IT downtime and how to mitigate the risks. By reading, you will learn effective business continuity strategies, including software escrow solutions, to ensure operational resilience and minimize disruptions. Access the full blog post now to learn more.
-
Debunking the Complexity of Risk Quantification
By:
Type: Replay
You're well aware of how crucial it is to bring consistency to risk management strategies. Qualitative and semi quantitative heat maps are limited in their ability to describe risk in a faithful way that is understood by both risk owners and executives. That's where a quantitative approach to risk management comes in. It offers a reliable way to measure risk, providing you and your executive team with concrete analysis and insights to make well-informed decisions, ultimately boosting the overall performance of your business. Now, don't be fooled into thinking that risk quantification is solely for mature organizations, cyber-centric risks, or niche parts of your risk management program. Think again! The objective of your risk management program is to understand the risk landscape, make sense of risks for use in decision support. An enterprise approach to risk quantification delivers on the promise of the risk management program. We invite you to join Archer and OCEG for this webinar, “Debunking the Complexity of Quantitative Risk,” to: • Discover how foundational risk management principles lend themselves to risk quantification. • Gain an understanding of the benefits and impact of adopting risk quantification for your enterprise risk management program. • Learn strategies to overcome challenges associated with implementing quantitative risk management.
-
The Cloud Influence on GRC
By: TechTarget Security
Type: eBook
Cloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.
-
CW ANZ, July 2020: Expert Advice on Security
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
-
Responsible innovation with generative AI
By: Amazon Web Services
Type: White Paper
Download this whitepaper to uncover the top three risks associated with building generative AI products and how software companies can mitigate them.
-
Responsible innovation with generative AI
By: AWS
Type: eGuide
Download this whitepaper to uncover the top three risks associated with building generative AI products and how software companies can mitigate them.
-
Enhanced controls & shared duty for cloud app
By: NCC Group
Type: Analyst Report
This report benchmarks industry progress in stressed exit plans and operational resilience. Key findings reveal diverse on-premise vs. cloud strategies, supplier cooperation challenges, and risk ownership inconsistencies. Download to learn more about third-party risk management.
-
Understanding the risks of the software supply chain
By: Contrast Security
Type: White Paper
The software supply chain is increasingly vulnerable to security risks like malicious code and licensing issues. Learn how to address these challenges and secure your applications by reading this Contrast Security white paper.
-
Time to Adapt: The Future of Human Risk Management Webinar
By: CultureAI
Type: Webcast
Join Forrester's VP, Principal Analyst, Jinan Budge, and CultureAI Founder & CEO, James Moore, as they explore how quantifying and managing human risk is pivotal to the future of security.
-
Why improve cloud vulnerability management with Prisma Cloud?
By: Palo Alto Networks
Type: eBook
Effective vulnerability management is crucial for cloud security, but traditional tools often lack the necessary context. This e-book explores how leading organizations use Prisma Cloud to gain visibility, prioritize risks, and remediate vulnerabilities across their cloud environments. Read the full e-book to learn more.
-
Software Escrow for Dummies: Your 50-page guide
By: NCC Group
Type: eBook
Software escrow is a critical tool to mitigate risks from vendor failure or disruption. This e-book explains how escrow works, the benefits, and how to choose the right escrow agreement and verification level for your needs. Read the full e-book to learn how to protect your software investments.
-
2025 Threat Landscape Predictions and the Role of Human Risk Management
By: CultureAI
Type: White Paper
As the cyber threat landscape evolves, employees have become the new security perimeter. Explore the top 2025 threats, including undetectable attacks and the decline of traditional training. Learn how Human Risk Management can protect your workforce. Read the full research content.
-
Secure texting: The next great healthcare communications frontier
By: AVST
Type: eGuide
In this expert e-guide, learn why the first step to secure communications technology (like texting) is convincing leaders and clinicians to recognize the risks to health data.
-
Enterprise Risk Management: Pragmatic risk quantification for the enterprise
By:
Type: Replay
The objective of quantified risk is to make better business decisions for the enterprise. Join Steve Schlarman, Integrated Risk Management Strategist at Archer IRM as he discusses Enterprise Risk Management and the pragmatic risk quantification approaches that organisations can take. Every business decision your organisation undertakes has some element of risk, be that a product launch or an acquisition. However, a recent survey of executive teams found that they are dissatisfied with current approaches to evaluating risk. The assessment of risk cannot be taken lightly, risk quantification represents a new, very effective, approach to measuring risk. Join our webinar to find out more.
-
Measurement as a Foundation for Communicating Risk
By: LogicGate
Type: Video
Properly measuring risk is the most important ingredient in effectively communicating risk, and communicating risk leads to a richer risk culture at your organization. Hear OKTA’s Director of Security Risk Management, Anthony Riley, discuss best practices for measuring and communicating risk.
-
Five Key Capabilities to Secure Against Endpoint Risk
By: CrowdStrike
Type: White Paper
Legacy endpoint security solutions don’t just miss modern threats — they slow down security operations, drain resources, and increase overall risk. In this eBook, uncover five key capabilities for a modern endpoint security approach and see how improved detection capabilities protect against all types of threats.
-
The CISO Survival Guide to Third-Party Software Risk Management (TPSRM)
By: Reversinglabs
Type: eBook
The rise of software supply chain attacks targeting third-party software providers and rising regulatory pressure has spurred cybersecurity and risk leaders to pay special attention to commercial software and the gaps it presents across the software supply chain. Read this 18-page guide for risk management guidance.
-
Quantifying Cloud Risk
By:
Type: Video
Business executives are unlikely to ever really understand risk statements like “High risk”, “Medium risk” and “Low risk”. As a result, they sometimes discount higher risk situations as “infosec conservatism.” Risk quantification can be a powerful tool to help them better understand and appropriately prioritize infosec risk scenarios. In this session, Jack will walk participants through an analysis of a specific cloud service leveraging the Factor Analysis of Information Risk (FAIR) framework. The analysis results will be described in business terms that any executive would understand. This session will demonstrate a pragmatic approach to quantifying cloud-related risk.
-
Quantifying Cloud Risk
By:
Type: Video
Business executives are unlikely to ever really understand risk statements like “High risk”, “Medium risk” and “Low risk”. As a result, they sometimes discount higher risk situations as “infosec conservatism.” Risk quantification can be a powerful tool to help them better understand and appropriately prioritize infosec risk scenarios. In this session, Jack will walk participants through an analysis of a specific cloud service leveraging the Factor Analysis of Information Risk (FAIR) framework. The analysis results will be described in business terms that any executive would understand. This session will demonstrate a pragmatic approach to quantifying cloud-related risk.