risk assessment

Results 51 - 75 of 130Sort Results By: Published Date | Title | Company Name

Asses Your Disaster Recovery Readiness: How Adequate is Your Disaster Recovery Plan?

Published By: HP     Published Date: Mar 31, 2015
When was the last time you thought about your disaster recovery plan? Natural disasters, such as earthquakes, tsunamis, hurricanes, fires, or floods can occur anytime and disable your data center, with little to no warning. Hacker activities like a denial of service attack can also take down your systems unexpectedly. Then you have the more mundane risks such as human error and hardware or software failures. The only predictable thing to say about these risks is that at some point, on some scale, you’ll have to recover your data center from downtime. When it comes to disaster readiness, proactive planning is the key to success. Every business, regardless of size, needs to have a well-tested disaster recovery plan in place. Every minute your systems are down, the financial implications grow. Take the assessment to see where your disaster recovery plan ranks. Then learn about next steps and more information.
Tags : 
disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness, networking, security, it management, data management
    
HP

Applying technology to address complexity in the oil and gas industries

Published By: IBM     Published Date: Mar 10, 2015
IBM Rational solutions for the oil and gas industry combine process, requirements, architecture, models and test tools with an underlying platform that supports requirements management, risk analysis, conformance assessments and more.
Tags : 
ibm, oil industry, gas industry, requirements management, risk analysis, conformance assessments, knowledge management, business intelligence, business management, business process management, business technology
    
IBM

Making Risk Management More Effective with Security Ratings

Published By: BitSight Technologies     Published Date: Feb 03, 2015
Download "Making Risk Management More Effective with Security Ratings" to learn how BitSight is revolutionizing the way organizations manage security risk throughout their ecosystem.
Tags : 
risk management, security ratings, compliance mandates, executive reporting, security risk assessments, security, it management, knowledge management, best practices, business activity monitoring
    
BitSight Technologies

5 Best Practices for Defending the Enterprise

Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, network security, wireless security
    
Entrust Datacard

Independent Research Firm releases new Wave Leader Report for MSSP : North America, Q4 2014

Published By: SilverSky     Published Date: Dec 11, 2014
Forrester's 26-criteria evaluation of managed security service providers (MSSPs) included the 13 most significant vendors in the North American market that security and risk professionals can turn to for solving some of their most important security challenges. Forrester’s assessment evaluates MSS offerings based on current offering, market presence and strategy. SilverSky was named a “leader” in the report, with highest marks for delivery capabilities and services and its market presence in North America. Forrester states in the report that, “SilverSky capabilities rival those of larger companies."
Tags : 
mssps, managed security service, security challenges, security professionals, security, it management, knowledge management, enterprise applications
    
SilverSky

Principles for Improving Internal Audit’s Value Proposition

Published By: ARMA     Published Date: Nov 04, 2014
All organizations depend on information to manage day-to-day operations, comply with regulations, gauge financial performance, and monitor strategic initiatives. This critical information resides in the organization's business records. As internal auditors conduct their annual risk assessment, they should consider how well business records are managed and assess the degree to which the risks to this information are understood.
Tags : 
value proposition, financial performance, internal auditors, annual risk assessment, it management, knowledge management, best practices, business intelligence, business management
    
ARMA

Applying Technology to Address Complexity in the Oil and Gas Industries

Published By: IBM     Published Date: Oct 10, 2014
IBM Rational solutions for the oil and gas industry combine process, requirements, architecture, models and test tools with an underlying platform that supports requirements management, risk analysis, conformance assessments and more.
Tags : 
ibm, requirements management, risk analysis, conformance assessments, addressing complexity, manage requirements, manage compliance, it management, business management
    
IBM

Does Your Code of Conduct Program Hit the Mark? Ten Questions You Should be Asking yourself

Published By: Skillsoft     Published Date: Oct 03, 2014
To compete in today’s global marketplace, employees at every level of your organization need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions — even when no one is watching. Sixty-two percent of organizations cite risk management and assessment as a top-three concern when asked about elements of success. Many companies struggle to meet this challenge, but an effective compliance training program can foster a culture of workplace best-practices from the boardroom all the way to the shop floor. Here are 10 questions that you may find useful to consider when planning or reviewing your code of conduct program.
Tags : 
skillsoft, compliance, conduct program, compliance training program, workplace culture, risk
    
Skillsoft

Fireblade's Web Application Security Explained

Published By: Fireblade     Published Date: Aug 21, 2014
Fireblade has developed an innovative behavioral approach to website security. It inspects users’ behavior and interactions with and relays the aggregated information to a central cloud, where a continual, real-time risk assessment process uses big data to discern legitimate users from attackers and abusers. Download this whitepaper to learn about this new approach.
Tags : 
fireblade, web application security, cloud security, interactions, cloud computing, hackers, attackers, cyberattack, central security cloud, network security, hacker detection, intrusion detection, data protection
    
Fireblade

Harnessing the power of big data and analytics for insurance

Published By: IBM     Published Date: May 27, 2014
Big data and analytics help insurance companies identify the next best action for customers. With the right solutions, companies can extract, integrate and analyze a large volume and variety of data, from call-center notes and voice recordings to web chats, telematics and social media
Tags : 
ibm, big data, analytics, insurance, insurance industry, big data solutions, integration, risk assessment, policy rates, customer retention, claims data, transaction data
    
IBM

A Prescriptive Guide to Third Party Risk Management

Published By: NAVEX Global     Published Date: May 13, 2014
A four step third party risk assessment provides understanding on where to focus energy and develop a plan.
Tags : 
third party risk, compliance, risk management
    
NAVEX Global

Pediatric Practice Finds Peace of Mind and Improved Outcomes

Published By: Allscripts     Published Date: May 01, 2014
Virdee Medical, a busy private pediatric practice, traded paper charts for a hosted Allscripts solution in 2010. Now, with the improved efficiencies of Allscripts Professional in a hosted environment, Virdee Medical can focus more intently than ever on providing the highest quality patient care.
Tags : 
allscripts, virdee medical, ehr, practice management, electronic health record, time and investment, pediatric practice, allscripts professional, manual processes, meaningful use, risk management, risk assessment, software updates, secure data, automation, hosted solution, outsourced billing, access control, security management, business process automation
    
Allscripts

6 Best Practices To Understanding Risk in Your Business

Published By: HP Enterprise Services     Published Date: Mar 20, 2014
Learn the three basic elements for risk assessment and see how an understanding of these elements will allow you to better understand risk in your organization.
Tags : 
data breaches, protection, prevent data breaches, avoid costs, risk prevention, risk, security, data management
    
HP Enterprise Services

Is your web site creating sales tax risk? Answer three questions to learn.

Published By: Avalara     Published Date: Mar 19, 2014
Assess your e-commerce tax risk. Complete our one-minute assessment to learn: do you have an issue with sales tax? Fill out the form to get started with three simple questions about your web operations.
Tags : 
tax, ecommerce, sales tax, tax liability, internet sales tax, best practices, e-commerce, customer service, ebusiness, enterprise resource planning, marketing automation, sales & marketing software, business technology
    
Avalara

Integrating Compliance with Business Strategy: The Skillsoft Compliance Maturity Model

Published By: Skillsoft     Published Date: Mar 06, 2014
Compliance training is a necessity to reduce the liability and legal risks businesses face on a daily basis.
Tags : 
risk management, compliance, code of conduct, governance, risk assessment, safety, training, risk prevention, skillsoft, human resources, corporate counsel
    
Skillsoft

A Prescriptive Guide to: Third Party Risk Management

Published By: NAVEX Global     Published Date: Mar 04, 2014
Almost every company has some, many or all of the elements of an effective third party compliance program. The challenge is to identify what you have. This whitepaper can help you identify.
Tags : 
navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment, qualified third parties, qualifications, risk mitigation, monitoring and auditing, policy based management, security management, security policies, best practices
    
NAVEX Global

Six Lessons That Redefine Focused Compliance Training

Published By: NAVEX Global     Published Date: Mar 04, 2014
The following six lessons will help you assess the focus of your compliance training program and formulate a strategy to tackle your biggest training risks.
Tags : 
navex global, compliance training, compliance implementation, effective compliance, risks, hr issues, human resources, compliance mix, training programs, compliant culture, risk assessment, qualified third parties, best practices, business intelligence
    
NAVEX Global

A Prescriptive Guide to Third Party Risk Management

Published By: NAVEX Global     Published Date: Mar 03, 2014
A four step third party risk assessment provides understanding on where to focus energy and develop a plan.
Tags : 
risk management, third party risk, due diligence, compliance, risk assessment
    
NAVEX Global

4 Fundamental Steps to Creating an Effective Third Party Compliance Programs

Published By: NAVEX Global     Published Date: Nov 18, 2013
Download this whitepaper to learn the 4 fundamental steps to creating an effective third party compliance program like the elaborate, richly funded programs that are so prominent in the news.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance, third party compliance, risk assessment
    
NAVEX Global

Social Media Toolkit: 4 Keys to Managing Employee Social Media Usage

Published By: NAVEX Global     Published Date: Nov 18, 2013
Download this paper to explore the 4 areas that are key to managing social media use by employees in your organization.
Tags : 
social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra, retaliation, harassment, mobile training, risk assessment, data, culture assessment, program assessment
    
NAVEX Global

Toolkit: Benchmarking your Ethics and Compliance Hotline Data

Published By: NAVEX Global     Published Date: Sep 05, 2013
The data from your ethics and compliance helpline should be benchmarked against comparable organizations to assess program health and make improvements such as implementing policies, training employees, and conducting investigations. Learn everything you need to know about benchmarking your helpline data in our toolkit.
Tags : 
incident, hotline, helpline, ethics, compliance, whistleblower, data, analysis, benchmark, report, risk, assessment, board, investigation, training, policy, case, management
    
NAVEX Global

Toolkit: 4 Keys to Managing Social Media Risk Management

Published By: NAVEX Global     Published Date: Sep 05, 2013
Explore four important facets of managing social media use by employees in your organization. Craft a best practice social media policy and navigate the legal landscape, train employees, address retaliation, and take a comprehensive approach. View examples of organizations that have successfully and creatively implemented social media guidelines.
Tags : 
social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra, retaliation, harassment, mobile training, risk assessment, data, culture assessment, program assessment
    
NAVEX Global

2013 Anti-Bribery and Corruption Benchmarking Report

Published By: Kroll Advisory Solutions     Published Date: Aug 02, 2013
First launched in 2011, the Anti-Corruption Benchmarking Report aims to give compliance officers a comprehensive view of the "ABC" (anti-bribery and corruption) risks they have, the resources they have to fight them, and how those resources are implemented into compliance programs. The results give compliance officers a view into the anti-bribery and corruption threats they face and share resources for creating a risk-based compliance program. Download the report to learn more.
Tags : 
compliance, corruption, anti-bribery, risk assessment, compliance programs, compliance risk
    
Kroll Advisory Solutions

3TIER - Leader In Renewable Energy Information Uses EMC Isilon for Big Data Storage

Published By: EMC Corporation     Published Date: Jul 07, 2013
3TIER helps organizations understand and manage the risks associated with renewable energy projects. A pioneer in wind and solar generation risks analysis, 3TIER uses science and technology to frame the risk of weather-driven variability, anywhere on Earth. 3TIER's unique expertise is in combining the latest weather data with historical weather patterns, and using the expertise of 3TIER's meteorologists, engineers and data scientists to create a detailed independent assessment of the future renewable energy potential of any location.
Tags : 
renewable energy, customer profile, emc, risk management, best practices, storage, technology, security, it management, data management, business technology
    
EMC Corporation
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.