risk management practices

Results 1 - 25 of 32Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 12, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now
Tags : 
    
KPMG
Published By: XpertHR     Published Date: Jun 13, 2018
It’s an employee job market these days. With the lowest unemployment rate in decades, HR professionals must be hyper-focused not just on attracting, but on retaining, top talent. The stakes are too high to risk losing key employees to competitors. Effective performance management and a strong culture are must haves to keep valuable talent from walking out the door. This whitepaper from XpertHR covers nine critical categories of best practices in retaining top talent. Download your copy today!
Tags : 
employee retention, reduce turnover, talent management, performance management, talent acquisition, company culture, career development, employee communication
    
XpertHR
Published By: NAVEX Global     Published Date: Apr 20, 2018
An effective third-party risk management programme is in the interest of all organisations—regardless of size, industry, and number of third party providers. This report will help you benchmark your third-party risk management programme and its performance against trends in the market and best practices. What you'll learn: The top issues and challenges organisations are facing with their third-party risk management programmes How organisations are using outside providers to help with third party due diligence The inconsistency of top concerns year over year and what this might indicate How to leverage the findings in this benchmark report to increase programme effectiveness in your own organisation
Tags : 
    
NAVEX Global
Published By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
    
Tenable
Published By: DocuSign UK     Published Date: Nov 16, 2017
"Industry experts predict that successful businesses will soon become 100% digital for all transactions. The key challenge is how to “go digital” in the right ways. For most companies, it will be an incremental journey. TodaysGeneralCounsel.com suggests that organisations should focus on a broad enterprise-wide information governance strategy developed by IT, legal, records and business stakeholders. Doing so improves governance, risk management and compliance programs. This best practices paper outlines seven important ways that legal teams can make meaningful progress in their digital transformations." .
Tags : 
legal, professionals, digital, practices, docusign, esignature
    
DocuSign UK
Published By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : 
(delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
    
IBM
Published By: SAS     Published Date: Aug 03, 2016
The financial crisis that began in 2007 highlighted the major shortcomings of the regulatory framework around minimum capital requirements and liquidity requirements. In response, the Basel Committee on Banking Supervision made substantial revisions to its guidelines - specifically, by including more demanding capital and liquidity requirements now commonly referred to as Basel III framework. National banking authorities around the world are adopting the new Basel III framework as a way to eliminate systemic liquidity risk and promote greater transparency of risk management practices.
Tags : 
optimization, finance, financial crisis, liquidity requirements, banking, framework, risk management
    
SAS
Published By: IBM     Published Date: Jul 15, 2016
Read Tolly's assessment of web application protection, federation capabilities, risk-based access features and overall performance of IBM Security Access Manager.
Tags : 
ibm, security, security access manager, federation capabilities, risk management, best practices, technology
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
From its beginnings in the early 1990s to its present state, enterprise risk management (ERM) has experienced a significant transformation. Over the past three decades, ERM has evolved in response to a number of macroeconomic events, as well as multiple business and regulatory changes. We live in a new world that is now more volatile and uncertain than ever before. The speed of change and the velocity of risk have increased significantly. Download this white paper from ERM pioneer James Lam to learn how organizations can successfully evolve their ERM function. You'll explore the history of ERM and how events have shaped the current function in organizations, the next phase in its evolution of performance-based continuous ERM, and its seven key attributes.
Tags : 
risk management, best practices, evolution
    
IBM
Published By: BitSight Technologies     Published Date: Jul 07, 2016
Download this white paper to learn: - Why vendor risk management is becoming a standard business practice - About the challenges organizations face in building formalized vendor risk programs - How to move beyond "point-in-time" tools and begin continuously monitoring your vendors.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity
    
BitSight Technologies
Published By: SAS     Published Date: Jun 10, 2016
Understanding security analytics can be a daunting job. It is more than just analyzing log files but it is less than a full-blown information security platform. In fact, according to Anton Chuvakin, research vice president for security and risk management at Gartner, it is not yet even a “market,” but rather still just a ”concept” that has yet to define best practices.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications, analytics, prevention
    
SAS
Published By: BitSight Technologies     Published Date: May 26, 2016
Does your organization have sensitive data stored across the globe? Learn how understanding the global cyber threat landscape can help evaluate the potential risks of doing business in certain nations in this report.
Tags : 
bitsight, data security, risk management, cybersecurity, vrm practices, risk management
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: May 26, 2016
With this guide, you’ll never have to wonder about that again. You’ll learn: - How to nail down your presentation goals and style. - How to select metrics your board will care about. - Things to keep in mind before and after a board presentation.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Mar 02, 2016
Cybersecurity in the financial services industry is rapidly evolving. Do you know how to stay ahead of the curve? The financial sector has been a pioneer for vendor risk management (VRM) best practices for a long time. Yes cybersecurity practices are continuing to evolve, and regulatory bodies are focusing more on third-party risk. Are you prepared for these changes? We'll dive further into this topic in this white paper and exploe: - How the threat landscape has been changing - and what can you do about it. - Some challenges the financial industries face in taking on VRM. - Four proactive tips for better VRM practices that you can put into place today. Download this free white paper now to better understand the changes to cybersecurity in the financial industry and what you can do about it.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, financial sector
    
BitSight Technologies
Published By: TriNet     Published Date: Jul 28, 2015
Identifies the foundational risks that can distract executives from focusing on and achieving their business' goals, and offers recommendations for eliminating those risks altogether.
Tags : 
foundational risks, risk elimination, selection process, compensation practices, performance management system, harassment prevention, best practices, entrepreneurship management
    
TriNet
Published By: IBM     Published Date: Jan 09, 2015
Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation with a proactive, business-centric approach to BCM that highlights critical practices.
Tags : 
business continuity management, risk management, bcm plan, business solutions
    
IBM
Published By: Firehost     Published Date: Jan 07, 2015
This Webinar covers all of the details you will need to know about PCI DSS 3.0.
Tags : 
pci dss 3.0, data security program, risk management practices, pci
    
Firehost
Published By: IBM     Published Date: Nov 19, 2014
Risk Management: OpenPages GRC Platform: Hypatia Research Group - The Convergence of Enterprise Governance, Risk & Compliance Software Solutions: Best Practices, Benchmarks & Vendor Galaxy Evaluations
Tags : 
ibm, enterprise governance, risk, compliance software, software solutions, hypatia research, grc, grc software
    
IBM
Published By: Skillsoft     Published Date: Oct 03, 2014
To compete in today’s global marketplace, employees at every level of your organization need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions — even when no one is watching. Sixty-two percent of organizations cite risk management and assessment as a top-three concern when asked about elements of success. Many companies struggle to meet this challenge, but an effective compliance training program can foster a culture of workplace best-practices from the boardroom all the way to the shop floor. Here are 10 questions that you may find useful to consider when planning or reviewing your code of conduct program.
Tags : 
skillsoft, compliance, conduct program, compliance training program, workplace culture, risk
    
Skillsoft
Published By: Lumension     Published Date: Feb 07, 2014
In this best practice guide, we are going to take a deep dive into a best practice process for patch and vulnerability management, developed by Lumension over thousands of customer engagements.
Tags : 
lumension, agent maintenance, value and risk, patch management, microsoft’s patch tuesday, it tasks, remediation process, endpoint management and security suite
    
Lumension
Published By: NAVEX Global     Published Date: Nov 18, 2013
Download this paper to explore the 4 areas that are key to managing social media use by employees in your organization.
Tags : 
social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra
    
NAVEX Global
Published By: NAVEX Global     Published Date: Sep 05, 2013
Explore four important facets of managing social media use by employees in your organization. Craft a best practice social media policy and navigate the legal landscape, train employees, address retaliation, and take a comprehensive approach. View examples of organizations that have successfully and creatively implemented social media guidelines.
Tags : 
social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra
    
NAVEX Global
Published By: EMC Corporation     Published Date: Jul 07, 2013
3TIER helps organizations understand and manage the risks associated with renewable energy projects. A pioneer in wind and solar generation risks analysis, 3TIER uses science and technology to frame the risk of weather-driven variability, anywhere on Earth. 3TIER's unique expertise is in combining the latest weather data with historical weather patterns, and using the expertise of 3TIER's meteorologists, engineers and data scientists to create a detailed independent assessment of the future renewable energy potential of any location.
Tags : 
renewable energy, customer profile, emc, risk management, best practices, storage, technology
    
EMC Corporation
Published By: IBM     Published Date: Jun 25, 2013
The global credit crunch that began in 2007 threw the financial industry into turmoil and highlighted the need for financial firms to improve their risk management practices. Today, the credit crisis is far from over. Markets remain volatile, and financial firms face waves of regulatory requirements intended to safeguard the solvency of individual firms and the stability of economies worldwide. These reforms will dramatically affect firms — burdening the profitability and growth of some, and the very survival of others.
Tags : 
risk management, financial industry, profitability, smarter risk management practices
    
IBM
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.