RSS feed Get our RSS feed

News by Topic

risk management practices

Results 26 - 32 of 32Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jan 09, 2015
Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation with a proactive, business-centric approach to BCM that highlights critical practices.
Tags : business continuity management, risk management, bcm plan, business solutions
     IBM
By: SAS     Published Date: Jun 10, 2016
Understanding security analytics can be a daunting job. It is more than just analyzing log files but it is less than a full-blown information security platform. In fact, according to Anton Chuvakin, research vice president for security and risk management at Gartner, it is not yet even a “market,” but rather still just a ”concept” that has yet to define best practices.
Tags : security, business metrics, best practices, business intelligence, enterprise applications, analytics, prevention
     SAS
By: SAS     Published Date: Aug 03, 2016
The financial crisis that began in 2007 highlighted the major shortcomings of the regulatory framework around minimum capital requirements and liquidity requirements. In response, the Basel Committee on Banking Supervision made substantial revisions to its guidelines - specifically, by including more demanding capital and liquidity requirements now commonly referred to as Basel III framework. National banking authorities around the world are adopting the new Basel III framework as a way to eliminate systemic liquidity risk and promote greater transparency of risk management practices.
Tags : optimization, finance, financial crisis, liquidity requirements, banking, framework, risk management, security
     SAS
By: IBM     Published Date: Jul 14, 2016
From its beginnings in the early 1990s to its present state, enterprise risk management (ERM) has experienced a significant transformation. Over the past three decades, ERM has evolved in response to a number of macroeconomic events, as well as multiple business and regulatory changes. We live in a new world that is now more volatile and uncertain than ever before. The speed of change and the velocity of risk have increased significantly. Download this white paper from ERM pioneer James Lam to learn how organizations can successfully evolve their ERM function. You'll explore the history of ERM and how events have shaped the current function in organizations, the next phase in its evolution of performance-based continuous ERM, and its seven key attributes.
Tags : risk management, best practices, evolution
     IBM
By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : (delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
     IBM
By: XpertHR     Published Date: Jun 13, 2018
It’s an employee job market these days. With the lowest unemployment rate in decades, HR professionals must be hyper-focused not just on attracting, but on retaining, top talent. The stakes are too high to risk losing key employees to competitors. Effective performance management and a strong culture are must haves to keep valuable talent from walking out the door. This whitepaper from XpertHR covers nine critical categories of best practices in retaining top talent. Download your copy today!
Tags : employee retention, reduce turnover, talent management, performance management, talent acquisition, company culture, career development, employee communication
     XpertHR
By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
     Tenable
Previous    1 2     Next   
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics