Enterprise Risk Management Reports

Risk management is the beating heart of your cyber strategy
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

False cents of security: The price of being compromised
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.
Posted: 08 Feb 2021 | Published: 03 Jun 2020

TechTarget ComputerWeekly.com

Cyber Security 2016 and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 08 Feb 2021 | Published: 18 Apr 2016

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 08 Feb 2021 | Published: 19 Nov 2019

TechTarget ComputerWeekly.com

Beyond Disaster Recovery: Becoming a Resilient Business
sponsored by IBM
WHITE PAPER: In this white paper, you'll learn how to determine risks, calculate impact, evaluate your current structure's response and test overall resiliency.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

IBM

Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE: This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009

Information Security Magazine

The Business Impact of EAM
sponsored by IBM
BOOK: The Business Impact of Enterprise Asset Management provides a straightforward, jargon-free look at the way Enterprise Asset Management is changing the world of business.
Posted: 13 Aug 2008 | Published: 01 Aug 2008

IBM

Practical Steps to Achieve and Maintain NERC Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper describes seven practical steps information security professionals can take to integrate controls into IT production operations, to simultaneously achieve NERC compliance goals, and also IT operational and security goals.
Posted: 31 Jul 2009 | Published: 08 Dec 2008

Tripwire, Inc.

Buckle Up (On the Road to IFRS) Straight Talk Book Series
sponsored by Deloitte
WHITE PAPER: The 11th book in our Straight Talk series helps executives understand the implications of IFRS and their role in addressing the associated changes. The publication also offers practical suggestions to help companies navigate through pressing issues and developing your own conversion road map.
Posted: 29 Jul 2009 | Published: 29 Jul 2009

Deloitte

eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by TechTarget Security
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009

TechTarget Security