reputational risk

Results 26 - 31 of 31Sort Results By: Published Date | Title | Company Name

Insights from the 2012 Global Reputation Risk and IT Study

Published By: IBM     Published Date: Jan 25, 2013
At the beginning of 2012, IBM asked a group of executives from leading companies to share how they were approaching reputational risk management. View this infographic to see the surprising results.
Tags : 
risk management, reputational management, enterprise, threat prevention, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, compliance, disaster recovery, email security, encryption, hacker detection, internet security, intrusion detection, intrusion prevention
    
IBM

Reputational risk and IT in the banking industry

Published By: IBM     Published Date: Aug 06, 2014
Download to learn how security and business continuity can shape the reputation and value of your company.
Tags : 
    
IBM

Reputational Risk and IT in the Banking Industry

Published By: IBM     Published Date: Aug 06, 2014
Download to learn how security and business continuity can shape the reputation and value of your company.
Tags : 
ibm, banking, reputation, risk, security, it management
    
IBM

Bribery and Corruption Red Flags “How to Respond to Corruption Indicators”

Published By: NAVEX Global     Published Date: Mar 21, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Before examining some of the common red flags and the appropriate courses of action to take, reviewing the various guidelines and frameworks available for organisations to build adequate procedures to protect themselves against third party risks is advisable. These frameworks have assisted organisations in establishing a strong legal defence in the event that a bribe does occur. These measures are having ramifications across the globe and they inform many of the components of the best ABC programmes in place today.
Tags : 
    
NAVEX Global

Technology Industry Spotlight - Video Case Study

Published By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
    
Darktrace
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.