Assessing Risk White Papers

(View All Report Types)
Risk Management: Protect and Maximize Stakeholder Value
sponsored by Oracle Corporation
WHITE PAPER: This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.
Posted: 01 Oct 2010 | Published: 02 Feb 2009

Oracle Corporation

IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: This helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
Posted: 03 Jul 2014 | Published: 31 Jan 2013

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

The CISOs Guide to Measuring IT Security
sponsored by Lumension
WHITE PAPER: In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Lumension

Supporting information technology risk management
sponsored by IBM
WHITE PAPER: Access the resource to discover the 5 stages of an effective IT risk mitigation program, the 5 components of efficiently managing IT risks and 5 questions to ponder when assessing risk solutions.
Posted: 04 May 2012 | Published: 01 Oct 2011

IBM

An insurance firm eases regulatory compliance while reducing risk
sponsored by IBM
WHITE PAPER: Learn how an insurance firm worked with IBM to ease its regulatory compliance while reducing risk.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

IBM

Establishing a Formal Cyber Intelligence Capability
sponsored by Verisign, Inc.
WHITE PAPER: While the benefits of advanced intelligence are substantial, achieving the capability requires a careful planning and consideration. In this paper, uncover best practices and a proven process for establishing a formal cyber intelligence capability as well as explore key considerations.
Posted: 03 May 2012 | Published: 03 May 2012

Verisign, Inc.

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

Risk Management for Cloud Computing
sponsored by TechTarget CIO
WHITE PAPER: This expert resource provides in-depth insight and risk management advice for IT leaders looking to benefit from the cloud. Read now for 20 questions that should be asked of every cloud provider, as well as well as advice for creating harmony between compliance and information security functions, and much more.
Posted: 21 Feb 2013 | Published: 21 Feb 2013

TechTarget CIO

ZeuS: A Persistent Criminal Enterprise
sponsored by Trend Micro
WHITE PAPER: This research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more.
Posted: 11 May 2010 | Published: 24 Mar 2010

Trend Micro