risk management

Results 226 - 250 of 709Sort Results By: Published Date | Title | Company Name

Managing Software Exposure Report

Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In todayís highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ĎDevOps-styleí delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx

2018 Gartner Magic Quadrant for Metadata Management Solutions

Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
The growing need for data governance, risk and compliance, data analysis and data value still drives strategic requirements in metadata management and the growth of its solutions. Data and analytics leaders can use this vendor evaluation to find the most appropriate solution for their organization.
Tags : 
    
Group M_IBM Q2'19

2018 Global State of Priviledge Access Management

Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19

Getting Started with Vulnerability Mitigation

Published By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with ITís difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isnít done as well as it needs to be.
Tags : 
    
Kaseya

You Don't Have to Be Superman to be a CFO - But it Would Help!

Published By: TeamQuest     Published Date: Sep 04, 2014
You donít have to be a superhero to be a CFO, but it would help. The rapidly changing pace and dynamics of todayís business environment is placing fresh pressures on all director-level executives, but none more than the CFO who now has virtually equal responsibility for then success of the company as the CEO but without quite the same glory.
Tags : 
risk management, corporate management, operational partnerships
    
TeamQuest

A Prescriptive Guide to Third Party Risk Management

Published By: NAVEX Global     Published Date: May 13, 2014
A four step third party risk assessment provides understanding on where to focus energy and develop a plan.
Tags : 
third party risk, compliance, risk management
    
NAVEX Global

5 Key Questions for Assessing Integrated Third Party Due Diligence Systems

Published By: NAVEX Global     Published Date: Mar 18, 2015
In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions no business can afford to overlook when evaluating and selecting vendor risk management solutions.
Tags : 
compliance, software compliance
    
NAVEX Global

Signs You Need a New QA Platform

Published By: Tricentis     Published Date: Mar 13, 2018
Quality testing has a cross-functional, strategic impact on corporate risk management, revenue and reputation, but it often doesnít garner full appreciation for its role, often evidenced by a lack of investment in a best-in-class QA platform. Signs that an existing solution isnít sufficient include:
Tags : 
    
Tricentis

Disaster Recovery Planning for Today's Real World Outages

Published By: Commvault ABM Oct     Published Date: Jul 17, 2019
Automating disaster recovery and disaster recovery testing saves time and budget, plus reduces risk when there is an actual emergency. With weather events, ransomware, and other outages distruping your business, you need a modern disaster recovery solution that really works at time of disaster. Choosing the right disaster recovery solution can be the difference between keeping your business up and running or going dark during an emergency. Learn hoe the commvault platform for data management provides availability for your business against today's real world outages
Tags : 
    
Commvault ABM Oct

The Weitz Company Improves Access to Data with Commvault

Published By: Commvault ABM Oct     Published Date: Jul 17, 2019
Construction firm reduces costs, complexity, and risk by protecting information in the cloud and at remote sites through a single data management solution.
Tags : 
    
Commvault ABM Oct

Board Portal Buyer's Guide: Five Essential Qualities

Published By: Diligent     Published Date: Jul 10, 2017
You may already know what a board portal is. You Probably know that paper is heavy and hackers are a risk, and by now, you know there are multiple vendors that offer board portals. You may not realize that by making the right choice, a board can improve governance and efficiency while collaborating in a secure setting. With lots of vendors to choose from, here are the most important questions to ask during your search, divided into the five essential categories. For private, public, non profit and government boards alike, finding an app that excels across all five categories will lead to better electronic security and a more productive board.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
    
Diligent

Go beyond the boundaries of traditional archiving. (Download Report in German)

Published By: Mimecast ABM Q4     Published Date: Nov 22, 2017
Mimecast Cloud Archive has long set the industry standard for enterprise information archiving, helping to keep corporate knowledge available, protecting and preserving it while simplifying management and administration. By aggregating data across multiple platforms, organizations gain long-term business insights and create a secure, digital corporate memory while at the same time reducing costs and risks for legal and compliance teams. IT teams can reduce administrative overhead with streamlined management and simplified data recovery. Anytime, anywhere access to archive data improves employee productivity and efficient workflow efficiency. Customers can rest assured that their data is always-available, always-replicated and always-safe.
Tags : 
datenarchivierung, verantwortlich, eigentlich, organisation, it-mitarbeitern, wissensarbeiter, fuhrungsebene
    
Mimecast ABM Q4

Achieving Efficient Governance, Risk, and Compliance (GRC) Through Process & Automation

Published By: Epicor     Published Date: Apr 01, 2009
This white paper presents a low risk, high impact approach to gaining control of regulatory compliance. The procedures, tasks, and behaviors that bear upon compliance can be overwhelming.
Tags : 
epicor, grc, governance risk and compliance, supply chain visibility, erp solutions, expense management, data auditing, it management
    
Epicor

Email Retention and Archiving:Manage E-Records, Minimize Workplace Risks & Maximize Compliance

Published By: MessageLabs     Published Date: Oct 15, 2008
Failure to strategically manage email can be costly for any businesses. Learn about the risks of poor email management, and how to implement a comprehensive, best practices-based email retention policy.  Enforce your policy by implementing MessageLabs Managed Email Archiving Service to minimize email risks and maximize compliance with organizational, legal, and regulatory rules.  
Tags : 
messagelabs, email retention, archiving, risk, compliance, knowledge management, data management, data protection
    
MessageLabs

Bloomberg Report: Open Symbology and Market Identifiers Overview

Published By: Bloomberg     Published Date: Nov 29, 2010
An open symbology framework for financial instrument identifiers can automate and accelerate transaction processes while driving out costs and introducing higher levels of transparency for effective risk management. Bloomberg explores open symbology in the securities industry. *Whitepaper content is specific to Financial Industry Executives*.
Tags : 
bloomberg, open symbology, market identifiers, financial instruments, analytics, business intelligence
    
Bloomberg

Bloomberg Report Podcast: Open Symbology and Market Identifiers Overview

Published By: Bloomberg     Published Date: Dec 14, 2010
An open symbology framework for financial instrument identifiers can automate and accelerate transaction processes while driving out costs and introducing higher levels of transparency for effective risk management. Bloomberg explores open symbology in the securities industry. *Whitepaper content is specific to Financial Industry Executives*.
Tags : 
bloomberg, open symbology, market identifiers, financial instruments, analytics
    
Bloomberg

How Panera Bread reduces payroll cycle time and processing costs.

Published By: Workday     Published Date: Oct 11, 2018
Before Workday, Panera Breadís payroll processes were manual, inefficient, and error-prone, and payroll nightmares and compliance risks were a regular occurrence. Complex systems and costly integrations made it impossible for the company to keep up with its rapid growth or gain valuable insights into global labor expenses. See the infographic to learn why unifying HR, payroll, time tracking, and absence management in a single system allows Panera to use one consistent, flexible, and scalable system across the U.S. and Canada.
Tags : 
    
Workday

From Compliance to Competitive Advantage: Evolutionary Approach to Risk Management Transformation

Published By: Oracle     Published Date: Nov 06, 2012
An Evolutionary Approach to Risk Management Transformation Strategies
Tags : 
oracle, compliance, risk management, banking, enterprise-wide framework, business technology
    
Oracle

From Compliance to Competitive Advantage: Evolutionary Approach to Risk Management Transformation

Published By: Oracle     Published Date: Nov 06, 2012
An Evolutionary Approach to Risk Management Transformation Strategies
Tags : 
oracle, compliance, risk management, banking, enterprise-wide framework
    
Oracle

Code Red: Rescue Your Revenues with ZirMedís Coding, Compliancy and Reimbursement Management Tools

Published By: ZirMed     Published Date: Feb 05, 2013
This white paper examines the issues and risks surrounding compliance and reimbursement, and how a management tool can help you avoid them.
Tags : 
compliance, medicare, medicare, reimbursement, claims management, claims, coding
    
ZirMed

Toolkit: Benchmarking your Ethics and Compliance Hotline Data

Published By: NAVEX Global     Published Date: Sep 05, 2013
The data from your ethics and compliance helpline should be benchmarked against comparable organizations to assess program health and make improvements such as implementing policies, training employees, and conducting investigations. Learn everything you need to know about benchmarking your helpline data in our toolkit.
Tags : 
incident, hotline, helpline, ethics, compliance, whistleblower, data, analysis
    
NAVEX Global

Toolkit: 4 Keys to Managing Social Media Risk Management

Published By: NAVEX Global     Published Date: Sep 05, 2013
Explore four important facets of managing social media use by employees in your organization. Craft a best practice social media policy and navigate the legal landscape, train employees, address retaliation, and take a comprehensive approach. View examples of organizations that have successfully and creatively implemented social media guidelines.
Tags : 
social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra
    
NAVEX Global

Ten Information Risk Questions Every GC Should Ask the CIO

Published By: CEB     Published Date: May 19, 2014
This document helps general counsel identify potential information technology issues that may create legal or regulatory risks. General counsel should use the ten questions and our guidance on what to listen for in the CIO's response to pressure test the company's IT management and security controls.
Tags : 
ceb, cio, information risk, it management, security controls, general counsel, regulatory risks, security
    
CEB

Simplify GDPR Compliance for Email

Published By: Mimecast     Published Date: Jan 11, 2017
Organizations that work with the personal data of European Union residents need to overhaul business processes to avoid the risks of violating the General Data Protection Regulation, which takes effect in May 2018. Penalties for non-compliance could cost your organization upwards of Ä20 million or 4% of total annual worldwide revenue, whichever is higher. Mimecast provides numerous ways to help simplify GDPR compliance. Learn how Mimecast Targeted Threat Protection helps ward against impersonation attacks, weaponized attachments, and malicious URLs Ė offering a comprehensive front-line defense for the personal data entrusted to you when it is attacked via the email vector.
Tags : 
mimecast, security, gdpr compliance, gspr risk management
    
Mimecast

For Manufacturers of Self-Driving Cars, Managing Risk will not be Autonomous

Published By: Milliman     Published Date: Sep 07, 2016
Read this whitepaper to learn why manufacturers of autonomous vehicles should be making a Supplier Product Liability Autonomous Share (SPLASh) pool to manage risk.
Tags : 
autonomous vehicles, splash, risk management, auto market, original equipment manufacturers, insurance risk
    
Milliman
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.