Framework Companies Risk ManagementWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Framework Companies Risk Management returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Security Policies
 •   Treasury / Cash / Risk Management
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Network Security
 •   Storage Security

Related Searches
 •   Files Framework
 •   Framework Companies Conference
 •   Framework Companies Risk Procedures
 •   Framework Demonstrations
 •   Framework Webinars
 •   Maintenance Framework Companies Risk
 •   Outsource Framework Companies
 •   Reports Framework
 •   Study Framework
 •   Terminal Framework Companies
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC

December 01, 2010 - (Free Research)
Enterprise Risk Management is a practice that has been around for decades, tracing its roots all the way back to the early 1970s. It garnered much attention in the early 2000s when the New York Stock Exchange required all of its listed companies to mandate their Audit Committees to “discuss policies with respect to risk assessment and management.” 
(WHITE PAPER) READ ABSTRACT |

The Cloud Risk Framework by ComputerWeekly.com

June 01, 2012 - (Free Research)
This unique cloud framework is designed to help organisations assess the financial risks of moving to the cloud. 
(ESSENTIAL GUIDE) READ ABSTRACT |

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation by IBM

June 2008 - (Free Research)
This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed. 
(WHITE PAPER)

Business-Driven Identity and Access Management: Why This New Approach Matters by Aveksa

August 2012 - (Free Research)
This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource. 
(WHITE PAPER) READ ABSTRACT |

SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation by BWise

October 2010 - (Free Research)
This E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization. 
(EGUIDE) READ ABSTRACT |

eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies by SearchSecurity.com

December 2008 - (Free Research)
Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense. 
(EBOOK) READ ABSTRACT |

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance by Varonis

September 2008 - (Free Research)
This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002. 
(WHITE PAPER) READ ABSTRACT |

Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC

December 2010 - (Free Research)
As a result of the financial crisis beginning in 2008, companies are faced with an ongoing dilemma: reduce costs now while maintaining an appropriate risk management structure and preparing for the impending increase in regulatory demands. 
(WHITE PAPER) READ ABSTRACT |

Impact Brief: Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC

August 2010 - (Free Research)
Faced with some of the greatest challenges in history, companies are focusing on cutting costs and more stringent fiscal management. Regardless of industry, organizations are reassessing investment budgets, reducing staff and implementing other measures to reduce operational expenses across all business disciplines. 
(WHITE PAPER) READ ABSTRACT |

Running a Successful Enterprise 2.0 Pilot by NewsGator

May 2010 - (Free Research)
NewsGator has years of experience running effective social computing solution pilots. Running a successful pilot not only boosts the value you can derive from your solution, it also prepares you for a successful companywide launch. This whitepaper will provide a framework for a successful pilot, give best practice tips and tricks, and more! 
(WHITE PAPER) READ ABSTRACT |

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams by Qualys, Inc.

March 2009 - (Free Research)
This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance. 
(WHITE PAPER) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures by Sybase, an SAP company

June 2011 - (Free Research)
Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk! 
(WHITE PAPER) READ ABSTRACT |

The Banking Industry Architecture Network and TOGAF by ComputerWeekly.com

February 2012 - (Free Research)
This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Reduce the Cost and Complexity of Multi-sourced IT Environments by Hewlett-Packard Company

May 2012 - (Free Research)
Public, private and hybrid cloud services have made it increasingly difficult for IT organizations to govern and manage IT services— at the same time that businesses are demanding greater agility and faster delivery from IT. View this webcast to learn how to rein in this supplier sprawl to improve service quality and reduce costs and risks. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Improve PeopleSoft Quality by Leveraging a Quality Assurance Center of Excellence Model by HP and FocusFrame

February 2009 - (Free Research)
Read this webcast transcript and learn how to leverage industry-leading quality management software and best practices to reduce test cycle time, decrease project risk, and increase the quality of your PeopleSoft applications. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

eBook: Compliance for the Midmarket: Governance, Risk and Technology by SearchCIO.com

June 2009 - (Free Research)
Read this E-book to learn about how you can take a proactive approach to regulatory compliance. Rather than waste time and resources tackling one regulation at a time, find out how companies are looking at the big picture and forming security strategies based on their needs. Sponsored By: Imperva and StoredIQ 
(EBOOK) READ ABSTRACT |

7 Key Reasons to Implement an Identity Aware Network by Applied Identity

March 2008 - (Free Research)
This paper provides you with insight into the seven key reasons why internal networks are migrating towards an identity and role based infrastructure to provide a more effective and cost efficient method for securing critical business assets. 
(WHITE PAPER) READ ABSTRACT |

Measuring Community Health with Indicee Analytics by Indicee

March 2014 - (Free Research)
The e-book provides examples of what to measure to ensure healthy, engaged communities, and how to measure it using analytics. Also included is a re-cap of the location for the full framework. 
(EBOOK) READ ABSTRACT |

Business Analytics: Helping You Put an Informed Foot Forward by SAS

July 2010 - (Free Research)
What exactly is business analytics and how can it help? Business analytics is, simply put, the application of analytical techniques to resolve business issues. It provides organizations with a framework for decision making, helping organizations solve complex business problems and more. 
(WHITE PAPER) READ ABSTRACT |

Ethical Hacking and Risk Assessments by Global Knowledge

December 2008 - (Free Research)
Attend this webcast to learn about risk assessment process and tools used by ethical hackers. 
(WEBCAST) READ ABSTRACT |

The Agile Project Manager by VersionOne Inc.

June 2009 - (Free Research)
This white paper will explore the impact agile development methodologies are having on the Project Management community, what new skills are required, and what the Project Manager can do to ease the transition. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 24 April 2012: Are CIOs earning credibility in the boardoom? by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly examines research that suggests CEOs want to invest in IT more than ever, but still see CIOs as technical experts and not business people. We review SQL Server 2012 and ask if Microsoft's database software is catching its competitors as well as concluding our Buyer's Guide to data security. 
(EZINE)

Holistic risk management: Perspectives for IT professionals by IBM

October 2012 - (Free Research)
Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives. 
(WHITE PAPER) READ ABSTRACT |

jQuery on Rails (The Real Ones) by The Ajax Experience

January 2009 - (Free Research)
The talk examines how to develop and enterprise solution for leveraging a diverse server-side framework portfolio and deliver a consistent experience to end users. 
(PODCAST) READ ABSTRACT |

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts