Risk ChangeWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Risk Change returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Security Monitoring
 •   Operational BI
 •   Managed Security Services
 •   Wireless Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Technology Planning and Analysis
 •   Treasury / Cash / Risk Management

Related Searches
 •   Costing Risk Change
 •   Hardware Risk Change
 •   License Risk Change
 •   Risk Change Public
 •   Risk Change Retail
 •   Risk Manager
 •   Risk Script
 •   Risk Sheets
 •   Time Risk Change
 •   Training Risk Change
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Managing Risk in an Active Directory Integrated Virtualized Environment by Dell Software

February 20, 2014 - (Free Research)
Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization. 
(WHITE PAPER) READ ABSTRACT |

Practical Steps to Achieve and Maintain NERC Compliance by Tripwire, Inc.

December 08, 2008 - (Free Research)
This paper describes seven practical steps information security professionals can take to integrate controls into IT production operations, to simultaneously achieve NERC compliance goals, and also IT operational and security goals. 
(WHITE PAPER) READ ABSTRACT |

Managing change in SAP: reducing cost and risk with DevOps by IBM

December 31, 2013 - (Free Research)
Consult this informative white paper to learn how to tackle the complexity of SAP change without breaking the bank by using a DevOps approach. By bringing development and operations teams closer together, you can achieve continuous innovation and improvement across the entire SAP lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Changing Nature Of Cyber Crime, Attackers, Counter Measures and New Models For Defense In Depth by ESET

December 03, 2009 - (Free Research)
The threat environment has changed drastically in recent years. Threats are more complicated and attackers are part of organized groups seeking profit rather than fame. In this Presentation Transcript, Charles Kolodgy of IDC highlights some attackers' successes, countermeasures in risk reduction, and a new model for defense-in-depth. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Risk Management and Product Delivery in Consumer Lending by ILOG, an IBM Company

September 2008 - (Free Research)
Amid the ongoing impact of the sub-prime meltdown and the ensuing credit crunch, lenders are facing a much tougher market than has been seen for some time. Business Rules Management Systems (BRMS) can enhance risk management, lending process streamlining and flexibility. 
(WHITE PAPER) READ ABSTRACT |

How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC

December 2010 - (Free Research)
Enterprise Risk Management is a practice that has been around for decades, tracing its roots all the way back to the early 1970s. It garnered much attention in the early 2000s when the New York Stock Exchange required all of its listed companies to mandate their Audit Committees to “discuss policies with respect to risk assessment and management.” 
(WHITE PAPER) READ ABSTRACT |

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network by nCircle

August 2010 - (Free Research)
This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact. 
(WHITE PAPER) READ ABSTRACT |

Change is the Enemy of Security and Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network by nCircle

March 2009 - (Free Research)
Read this white paper to learn 10 ways that enterprise environments typically change and what you can do to identify, analyze and manage these changes and their associated risks on an ongoing basis. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives by ISACA

December 2009 - (Free Research)
This paper clarifies what cloud computing is, identifies the services offered in the cloud, and also examines potential business benefits, risks, and assurance considerations. Read on to learn more about cloud computing from security, governance, and assuarance perspectives. 
(WHITE PAPER) READ ABSTRACT |

The Case for Risk-Based, Business-Aligned Internal Audit by RSA, The Security Division of EMC

December 2010 - (Free Research)
The world we operate in as business professionals is rapidly changing. Organizations are faced with the increasing complexities of global operations, the growing morass of regulatory demands, pressures to decrease cost and increase efficiency, and the prospect of dealing with a set of new and potentially catastrophic risks. 
(WHITE PAPER) READ ABSTRACT |

Configuration and Change Management for IT Compliance and Risk Management by Tripwire, Inc.

November 2007 - (Free Research)
This white paper discusses key issues surrounding configuration management and compliance, such as the IT department's need to lower costs, increase management flexibility and control, and increase responsiveness to business needs and requirements. 
(WHITE PAPER) READ ABSTRACT |

Four EHR Change Management Mistakes (And How to Avoid Them) by HP & Intel®

September 2011 - (Free Research)
The question is no longer if your healthcare practice will make the transition to EHR, but when.  Careful planning and effective change management can help keep missteps – and the stress and costs that come with them – to a minimum.  This white paper presents strategies for avoiding common EHR implementation problems. 
(WHITE PAPER) READ ABSTRACT |

Trusted Data Delivery - Help reduce operational costs and risk while improving accessibility of critical business data by IBM

July 2011 - (Free Research)
This white paper discusses how to reduce operational costs and risk while you improve the accessibility of critical business data. Don't put your business in a catch-up position - be the one in the forefront with the CDC advantage. 
(WHITE PAPER) READ ABSTRACT |

Configuration Auditing – The Next Critical Step in Compliance by nCircle

August 2010 - (Free Research)
In this paper learn what Configuration auditing entails verifying the configurations of all assets in the environment to make sure they have the correct settings. This includes auditing new assets, monitoring for changes and verifying that planned changes are carried out properly. 
(WHITE PAPER) READ ABSTRACT |

Solution Brief: The Top Four Business Risks of Social Media by BlueCoat

September 2011 - (Free Research)
Social networks are changing the way people interact, communicate, form opinions, and purchase. And businesses must support social media to drive their business. However, this medium can also pose new security risks. View now to explore the top four risks of social networking and discover various ways to protect against and mitigate these risks. 
(WHITE PAPER) READ ABSTRACT |

Improve IT Visibility, Avoid Change Failures by Hewlett-Packard Company

December 2012 - (Free Research)
This informative white paper introduces an IT service management (ITSM) tool that automates the mapping of applications, infrastructure components, and their dependencies, resulting in a simplified approach to change and configuration management. 
(WHITE PAPER) READ ABSTRACT |

Teradata Active Data Warehouse Private Cloud: Mitigate Risk and Meet Dynamic Business Needs by Teradata

July 2012 - (Free Research)
Check out this article now to learn about public v. private clouds and how they stack up when it comes to mitigating risk and meeting business needs. 
(WHITE PAPER) READ ABSTRACT |

Balancing Cost, Risk and Complexity in Your Disaster Recovery Strategy by CommVault Systems, Inc.

February 2014 - (Free Research)
This guide goes over the requirements for a suitable Disaster Recovery strategy and highlights the fact that traditional backup plans aren't capable of dealing with new technologies. 
(WHITE PAPER) READ ABSTRACT |

Security risks that can affect your industry by SearchSecurity.com

February 2012 - (Free Research)
As the threat landscape continues to evolve, the approaches to thwart them must also. But with emerging trends like social networking and the influx of mobile devices, ensuring adequate security is becoming more complex. In this expert resource, explore the security risks organizations face in today’s changing environment. 
(EGUIDE) READ ABSTRACT |

E-Guide: VM in the Cloud by SearchSecurity.com

January 2012 - (Free Research)
Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more. 
(EGUIDE) READ ABSTRACT |

Cloud Management: Overcoming today’s Top Risks by SearchSecurity.com

April 2012 - (Free Research)
Under a cloud paradigm, as services become more concentrated, risks follow suit, so it is important to understand and account for these changes and adjust security programs accordingly. View this e-guide to explore the top security risks in cloud computing today and how to overcome them. 
(EGUIDE) READ ABSTRACT |

Securing and Mitigating Risk in the Cloud by SearchSecurity.com

July 2013 - (Free Research)
Cloud computing offers a number of upsides, but also sparks concerns about securing and mitigating risk in the cloud. Learn more in Modern Infrastructure, CIO Edition. 
(EGUIDE) READ ABSTRACT |

Mom, Apple Pie, and the Office of Comptroller of the Currency by Iron Mountain

February 2014 - (Free Research)
Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes. 
(WHITE PAPER) READ ABSTRACT |

Energy Efficiency, Public Policy, Utilities and Data Center by Dell, Inc. and Intel®

July 2010 - (Free Research)
While CIOs are focusing on managing services offerings, managing data center risks and keeping total costs down, forces are at play that will require the CIO to pay significantly more attention to data center energy efficiency and resource consumption. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Counterparty Risk: Are We Leveraging Our Tools? by Sybase, an SAP company

February 2012 - (Free Research)
While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts