risk management

Results 176 - 200 of 709Sort Results By: Published Date | Title | Company Name

Safe & Strong Social Media: Why Risk Management Must be a Priority for Your Brand

Published By: Spredfast     Published Date: Aug 24, 2018
It only takes one accidental Tweet to undo years of brand reputation. It's important to understand the opportunities and risks your brand faces on social, and what you can do about them. Download this whitepaper to learn more about the risks and gain advice and tips on how to protect your brand.
Tags : 
social media risk management, risks of social media, social media compliance, social media user management, social media security, social media management tools, social media monitoring, social media governance, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, social media management software, social media marketing tools, social media monitoring tools, social media management company
    
Spredfast

Managing the Risk of Post-Breach or “Resident” Attacks: A Ponemon Institute Study

Published By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once they’re inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate “stealth” attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : 
risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach, apt, targeted attacks, threat management, cyber crime, cyber risk, illusive networks
    
Illusive Networks

Construction Software ROI

Published By: Procore     Published Date: May 28, 2019
The successful construction companies of tomorrow will be those that have implemented the technology and processes to become more efficient at delivering client value. But choosing the right construction technology and making a compelling case for investment can be difficult. Download the eBook to demonstrate how construction software can be a significant driver of ROI across your business. Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore

How Construction Technology is Saving Time, Money, and Jobs

Published By: Procore     Published Date: May 28, 2019
The successful construction companies of tomorrow will be those that have critically reviewed how they manage their business and how they run their projects, making changes to their systems and processes to become more efficient at delivering client value. Download this eBook to learn exactly how construction technology can help your business remain competitive by: ? Increasing efficiency and productivity ? Reducing delays and costs ? Enabling better communication and collaboration ? Improving customer satisfaction ? Engaging an ever-evolving, tech savvy workforce Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading
Tags : 
    
Procore

Construction Project Management Software Buyer's Guide

Published By: Procore     Published Date: May 28, 2019
Looking for Construction Project Management Software? Ensure you don’t make an expensive mistake. Downloading this eBook will help you build a framework for evaluating and choosing the construction management software solution to fit your business. What you’ll learn: ? How to identify and define your needs ? The functionality you should assess ? Specific features to look for ? How to evaluate a software vendor Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their projects. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore

How Technology can Make Construction Businesses Stand Out

Published By: Procore     Published Date: Jul 08, 2019
Download the ebook to learn how construction technology is making UK & Ireland contractors more resilient and competitive. And follow the 7-step practical guide for kick-starting a digital construction strategy in your business, regardless of its size and complexity. Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore

Discussing Windows® XP Migration with Management-The Top 5 Threats to Business

Published By: Lenovo and Microsoft     Published Date: Aug 13, 2013
In the wake of major security, management, and interface limitations, Microsoft has decided to end support for Windows XP. This decision has important implications for corporate management as it presents a number of risk, security, operations, and compliance issues. This white paper looks at the top five issues that business management must be aware of and provides non-technical business justifications for driving a migration program forward.
Tags : 
windows xp, migration, managment, top 5 threats to business
    
Lenovo and Microsoft

Is there a better way to manage product development projects?

Published By: Dassault Systèmes     Published Date: Jul 21, 2017
There is a significant gap between how manufacturing companies value specific aspects of their project execution and how they judge their performance. Better education in project management methodologies and standalone software tools alone will limit a company’s ability to perform at its highest level. A study by Engineering.com found that a web-based Product Lifecycle Management (PLM) solution is the best way for a company to fully achieve its best practices. This white paper shares how a PLM solution with embedded project management can uniquely provide: • Full alignment between projects and the product portfolio • Coordination of a project’s schedule, resources and scope • Automatic real-time status updates of project tasks • Mitigation of project risks based upon real-time assessment of product development Benefit from the unique value provided by PLM systems with embedded project management.
Tags : 
manufacturing, project execution, product management education, software tools, web based, product lifecycle management, product portfolio, project schedule, status updates, project risks
    
Dassault Systèmes

2017 EMEA & APAC Culture & Compliance Programme Report

Published By: NAVEX Global     Published Date: Jul 17, 2017
Establishing a culture of integrity, ethics and respect is the number one priority for companies in 2017, according to a new report. In common with the 2015 report, getting an organisation's culture right is the main objective for compliance professionals in the year ahead, with 85 per cent of respondents saying it is one of their three main goals. However despite this, only 32 per cent of firms indicated that they are planning to undertake a culture or ethics assessment in the next twelve months. In addition, workplace behaviour was rated as the lowest area of risk receiving attention by stakeholders (29 per cent). Download the full report for additional stats on board level reporting, increasing compliance programme awareness and satisfaction with third party risk management.
Tags : 
measuring programme effectiveness, insufficient staff, managing regulations, lack of tools, budget issues, programme reporting
    
NAVEX Global

Definitive Guide to Third Party Risk Management

Published By: NAVEX Global     Published Date: Jul 17, 2017
Thirty percent of organisations expect to do more work through outside third parties in 2017. However, third parties are responsible for 75 percent of foreign bribery schemes, making these engagements rife with risks that can’t be ignored. A strong third-party risk management programme will help your organisation make smart choices when it comes to engaging with outside business partners. The Definitive Guide to Third-Party Risk Management gives you insight, advice and examples to help your organisation recognise and address third-party risk.
Tags : 
assessments, workflow, overseer, documentation, organisation, writing, review, feedback, updates, security
    
NAVEX Global

Tips for Streamlining Financial Processes

Published By: Infor     Published Date: Mar 03, 2017
It is the best of times and the worst of times for elite finance professionals in mid- to largesized organizations. With demands for more information, faster, going nowhere but up, and finance departments playing an increasingly strategic role in determining business direction, CFOs, Controllers and their staffs are finding themselves intellectually stimulated and exhausted in equal measure.
Tags : 
finance, cfo, finance process, data analysis, risk management
    
Infor

A Prescriptive Guide to Third Party Risk Management

Published By: NAVEX Global     Published Date: Mar 03, 2014
A four step third party risk assessment provides understanding on where to focus energy and develop a plan.
Tags : 
risk management, third party risk, due diligence, compliance, risk assessment
    
NAVEX Global

Global GRC Risks e-Book

Published By: NAVEX Global     Published Date: Mar 10, 2014
Your one-stop guide to manage the top ten global GRC risks
Tags : 
risk, grc risks, compliance, trends, global policy management
    
NAVEX Global

Big Data, Bad Data, Good Data - The Link Between Information Governance and Big Data Outcomes

Published By: IBM     Published Date: Jul 08, 2016
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : 
ibm, idc, big data, data, analytics, information governance, knowledge management, data management, data center
    
IBM

Addressing customer analytics with effective data matching

Published By: IBM     Published Date: Jan 27, 2017
High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-c entric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
    
IBM

Countering the Advanced Persistent Threat Challenge with Deep Discovery

Published By: Trend Micro     Published Date: Feb 01, 2013
This whitepaper will explore the anatomy of targeted attacks: the inner workings of the APT lifecycle. It will also provide an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks. Deep Discovery is at the heart of the Trend Micro Custom Defense solution against targeted attacks.
Tags : 
advanced persistent, threat challenge, custom defense solution, trend micro, risk management
    
Trend Micro

Are you fulfilling your responsibilities for cloud security?

Published By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
    
KPMG

Network Change and Configuration Management: Optimize Reliability, Minimize Risk and Reduce Costs

Published By: CA WA     Published Date: Aug 15, 2008
One of the most dramatic innovations in the infrastructure management marketplace in the last five years is the rise of Network Change and Configuration Management (NCCM) as a strategic requirement. This white paper will focus on the strong values that NCCM can bring to reliability, risk and cost management, as well as some of its powerful operational and lifecycle asset values. This report will also introduce the CA SPECTRUM Network Configuration Manager as a distinctive leadership offering.
Tags : 
configuration management, configuration, change management, change, network management, ca wa, computer associates, workload automation, networking, ip telephony, voice over ip
    
CA WA

Enterprise Storage Group White Paper: THE BIG DATA SECURITY ANALYTICS ERA IS HERE

Published By: EMC Corporation     Published Date: May 27, 2014
ESG Whitepaper: New security risks and old security challenges often overwhelm legacy security controls and analytical tools. This ESG white paper discusses why today's approach to security management—that depends on up-to-the-minute situational awareness and real-time security intelligence—means organizations are entering the era of big data security analytics.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
    
EMC Corporation

Selecting the Right Identity Governance Solution

Published By: SailPoint     Published Date: Feb 08, 2011
This guide is designed to help ensure a successful identity governance strategy can move your organization toward sustainable compliance, reduced risk, improved service levels and lower operational costs.
Tags : 
sailpoint, identity governance, compliance, risk management, access management, password management, reporting and analytics, identity management, business analytics, corporate governance
    
SailPoint

Top 10 Reasons to Strengthen Information Security with App and Desktop Virtualization

Published By: Citrix Systems     Published Date: Sep 17, 2015
Explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security.
Tags : 
information security, mobility, risk management, consumerization, security, business technology
    
Citrix Systems

InfoSec & Compliance Project Success Tips from Veteran IT Execs

Published By: Wisegate     Published Date: Nov 02, 2011
IT and security execs share practical advice on what it takes to lead a successful IT implementation and lessons learned from from the trenches.
Tags : 
governance, risk and compliance (grc), identity and access management (iam), it project management, it best practices, monitoring, network security, remote access, access control, compliance, identity management, internet security, intrusion detection, intrusion prevention, security management, single sign on, project management
    
Wisegate

Holistic Risk Management: Perspectives from IT professionals

Published By: IBM     Published Date: Jul 13, 2012
Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. But this has introduced new challenges and opportunities. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.
Tags : 
ibm, technology, risk management, professionals, business, security management, emerging threats, productivity, project management, service management, data center design and management, business technology
    
IBM

Key Trends Driving Global Resilience and Risk

Published By: IBM     Published Date: Jul 13, 2012
Learn how respondents, including nearly 400 senior executives from some of the world's largest enterprises, are incorporating holistic business resilience planning into their businesses through top-level findings and case studies. Download the research report here.
Tags : 
ibm, technology, risk management, global technology, technology, risk study, productivity, business technology
    
IBM

Reputational Risk and IT: Shaping The Reputation and Value of Your Company

Published By: IBM     Published Date: Oct 09, 2012
This whitepaper contains a study that investigates how organizations around the world are managing their reputations in today's digital era, where IT is an integral part of the organization and IT failures can result in reputational damage.
Tags : 
it risk management, security, it threats, corporate reputations, business technology
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.