RSS feed Get our RSS feed

News by Topic

risk management

Results 226 - 250 of 708Sort Results By: Published Date | Title | Company Name
By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In todayís highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ĎDevOps-styleí delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
     CheckMarx
By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
The growing need for data governance, risk and compliance, data analysis and data value still drives strategic requirements in metadata management and the growth of its solutions. Data and analytics leaders can use this vendor evaluation to find the most appropriate solution for their organization.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
     Group M_IBM Q2'19
By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with ITís difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isnít done as well as it needs to be.
Tags : 
     Kaseya
By: TeamQuest     Published Date: Sep 04, 2014
You donít have to be a superhero to be a CFO, but it would help. The rapidly changing pace and dynamics of todayís business environment is placing fresh pressures on all director-level executives, but none more than the CFO who now has virtually equal responsibility for then success of the company as the CEO but without quite the same glory.
Tags : risk management, corporate management, operational partnerships
     TeamQuest
By: NAVEX Global     Published Date: May 13, 2014
A four step third party risk assessment provides understanding on where to focus energy and develop a plan.
Tags : third party risk, compliance, risk management
     NAVEX Global
By: NAVEX Global     Published Date: Mar 18, 2015
In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions no business can afford to overlook when evaluating and selecting vendor risk management solutions.
Tags : 
     NAVEX Global
By: Tricentis     Published Date: Mar 13, 2018
Quality testing has a cross-functional, strategic impact on corporate risk management, revenue and reputation, but it often doesnít garner full appreciation for its role, often evidenced by a lack of investment in a best-in-class QA platform. Signs that an existing solution isnít sufficient include:
Tags : 
     Tricentis
By: Commvault ABM Oct     Published Date: Jul 17, 2019
Automating disaster recovery and disaster recovery testing saves time and budget, plus reduces risk when there is an actual emergency. With weather events, ransomware, and other outages distruping your business, you need a modern disaster recovery solution that really works at time of disaster. Choosing the right disaster recovery solution can be the difference between keeping your business up and running or going dark during an emergency. Learn hoe the commvault platform for data management provides availability for your business against today's real world outages
Tags : 
     Commvault ABM Oct
By: Commvault ABM Oct     Published Date: Jul 17, 2019
Construction firm reduces costs, complexity, and risk by protecting information in the cloud and at remote sites through a single data management solution.
Tags : 
     Commvault ABM Oct
By: Diligent     Published Date: Jul 10, 2017
You may already know what a board portal is. You Probably know that paper is heavy and hackers are a risk, and by now, you know there are multiple vendors that offer board portals. You may not realize that by making the right choice, a board can improve governance and efficiency while collaborating in a secure setting. With lots of vendors to choose from, here are the most important questions to ask during your search, divided into the five essential categories. For private, public, non profit and government boards alike, finding an app that excels across all five categories will lead to better electronic security and a more productive board.
Tags : data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
     Diligent
By: Mimecast ABM Q4     Published Date: Nov 22, 2017
Mimecast Cloud Archive has long set the industry standard for enterprise information archiving, helping to keep corporate knowledge available, protecting and preserving it while simplifying management and administration. By aggregating data across multiple platforms, organizations gain long-term business insights and create a secure, digital corporate memory while at the same time reducing costs and risks for legal and compliance teams. IT teams can reduce administrative overhead with streamlined management and simplified data recovery. Anytime, anywhere access to archive data improves employee productivity and efficient workflow efficiency. Customers can rest assured that their data is always-available, always-replicated and always-safe.
Tags : datenarchivierung, verantwortlich, eigentlich, organisation, it-mitarbeitern, wissensarbeiter, fuhrungsebene
     Mimecast ABM Q4
By: Epicor     Published Date: Apr 01, 2009
This white paper presents a low risk, high impact approach to gaining control of regulatory compliance. The procedures, tasks, and behaviors that bear upon compliance can be overwhelming.
Tags : epicor, grc, governance risk and compliance, supply chain visibility, erp solutions, expense management, data auditing
     Epicor
By: MessageLabs     Published Date: Oct 15, 2008
Failure to strategically manage email can be costly for any businesses. Learn about the risks of poor email management, and how to implement a comprehensive, best practices-based email retention policy.  Enforce your policy by implementing MessageLabs Managed Email Archiving Service to minimize email risks and maximize compliance with organizational, legal, and regulatory rules.  
Tags : messagelabs, email retention, archiving, risk, compliance
     MessageLabs
By: Bloomberg     Published Date: Nov 29, 2010
An open symbology framework for financial instrument identifiers can automate and accelerate transaction processes while driving out costs and introducing higher levels of transparency for effective risk management. Bloomberg explores open symbology in the securities industry. *Whitepaper content is specific to Financial Industry Executives*.
Tags : bloomberg, open symbology, market identifiers, financial instruments, analytics
     Bloomberg
By: Bloomberg     Published Date: Dec 14, 2010
An open symbology framework for financial instrument identifiers can automate and accelerate transaction processes while driving out costs and introducing higher levels of transparency for effective risk management. Bloomberg explores open symbology in the securities industry. *Whitepaper content is specific to Financial Industry Executives*.
Tags : bloomberg, open symbology, market identifiers, financial instruments, analytics
     Bloomberg
By: Workday     Published Date: Oct 11, 2018
Before Workday, Panera Breadís payroll processes were manual, inefficient, and error-prone, and payroll nightmares and compliance risks were a regular occurrence. Complex systems and costly integrations made it impossible for the company to keep up with its rapid growth or gain valuable insights into global labor expenses. See the infographic to learn why unifying HR, payroll, time tracking, and absence management in a single system allows Panera to use one consistent, flexible, and scalable system across the U.S. and Canada.
Tags : 
     Workday
By: Oracle     Published Date: Nov 06, 2012
An Evolutionary Approach to Risk Management Transformation Strategies
Tags : oracle, compliance, risk management, banking, enterprise-wide framework
     Oracle
By: Oracle     Published Date: Nov 06, 2012
An Evolutionary Approach to Risk Management Transformation Strategies
Tags : oracle, compliance, risk management, banking, enterprise-wide framework
     Oracle
By: ZirMed     Published Date: Feb 05, 2013
This white paper examines the issues and risks surrounding compliance and reimbursement, and how a management tool can help you avoid them.
Tags : compliance, medicare, medicare, reimbursement, claims management, claims, coding
     ZirMed
By: NAVEX Global     Published Date: Sep 05, 2013
The data from your ethics and compliance helpline should be benchmarked against comparable organizations to assess program health and make improvements such as implementing policies, training employees, and conducting investigations. Learn everything you need to know about benchmarking your helpline data in our toolkit.
Tags : incident, hotline, helpline, ethics, compliance, whistleblower, data, analysis
     NAVEX Global
By: NAVEX Global     Published Date: Sep 05, 2013
Explore four important facets of managing social media use by employees in your organization. Craft a best practice social media policy and navigate the legal landscape, train employees, address retaliation, and take a comprehensive approach. View examples of organizations that have successfully and creatively implemented social media guidelines.
Tags : social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra
     NAVEX Global
By: CEB     Published Date: May 19, 2014
This document helps general counsel identify potential information technology issues that may create legal or regulatory risks. General counsel should use the ten questions and our guidance on what to listen for in the CIO's response to pressure test the company's IT management and security controls.
Tags : ceb, cio, information risk, it management, security controls, general counsel, regulatory risks, security
     CEB
By: Mimecast     Published Date: Jan 11, 2017
Organizations that work with the personal data of European Union residents need to overhaul business processes to avoid the risks of violating the General Data Protection Regulation, which takes effect in May 2018. Penalties for non-compliance could cost your organization upwards of Ä20 million or 4% of total annual worldwide revenue, whichever is higher. Mimecast provides numerous ways to help simplify GDPR compliance. Learn how Mimecast Targeted Threat Protection helps ward against impersonation attacks, weaponized attachments, and malicious URLs Ė offering a comprehensive front-line defense for the personal data entrusted to you when it is attacked via the email vector.
Tags : mimecast, security, gdpr compliance, gspr risk management
     Mimecast
By: Milliman     Published Date: Sep 07, 2016
Read this whitepaper to learn why manufacturers of autonomous vehicles should be making a Supplier Product Liability Autonomous Share (SPLASh) pool to manage risk.
Tags : autonomous vehicles, splash, risk management, auto market, original equipment manufacturers, insurance risk
     Milliman
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics