Top White Papers and Webcasts

  • Available On-Demand   In this second session of our series on risk management, GRC expert Gerard Scheitlin reviews common risk measurement methodologies, along with a discussion of developing risk metrics and a risk appetite. The utilization of a data-driven approach to identifying and quantifying risk will be covered.   After watching this session, you will be familiar with:   • Utilizing common risk metric and quantification techniques • Developing a risk appetite and …

  • At the heart of every organization are its employees, the engine that drives growth, fueled by the data they create and store on their laptops, tablets, and mobile phones, as well as access through data center and cloud servers. It should come as no surprise to CISOs that 60 percent of corporate data is stored on employee endpoints. Cybercriminals are progressively targeting the valuable data contained on these enterprise endpoints. Read this eBook to discover how CISOs can secure the organization and minimize …