CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

risk management

Results 626 - 650 of 708Sort Results By: Published Date | Title | Company Name
Published By: Blue Lane     Published Date: Oct 01, 2007
The healthcare industry has benefited from the breakneck pace of digitization - spanning everything from payments to patient records to X-ray film - but it has also been increasingly exposed to greater risk. Efforts to increase healthcare provider productivity via increased digitization and system interconnectivity have to be counterbalanced against the growing concerns for patient privacy and a backdrop of increasing liability.
Tags : 
healthcare, health care, patient privacy, privacy, patch management, patch, patch server, hipaa
    
Blue Lane
Published By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : 
security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability
    
GFI
Published By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : 
risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit
    
Perimeter
Published By: Perimeter     Published Date: Jul 17, 2007
Click here and get a head start on these Hackers by learning how they are turning their attention to new ways to deliver viruses, crash unsuspecting users’ computers, and steal social security numbers, passwords, bank account numbers, etc.
Tags : 
vulnerability, hacker, hacker detection, hacker prevention, ips, intrusion prevention, intrusion detection, ids
    
Perimeter
Published By: Interactive Intelligence     Published Date: Feb 26, 2013
In today's regulations and risk management, business has become increasingly complex, and penalties are growing. Managing risk must therefore include monitoring the actions of your entire organization and more. Read on to learn more about compliance.
Tags : 
quality management, regulatory compliance, risk management, complex risk, monitoring actions, data management, business technology
    
Interactive Intelligence
Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security
    
Technolytics
Published By: Deep Software     Published Date: Nov 14, 2007
With so much of today's commerce being conducted electronically, providing staff with internet access has become a business necessity. The improper use of e-mail and instant messengers can lead to extremely expensive lawsuits, and the proliferation of mobile devices has made it considerably easier for errant employees to steal sensitive information. This white paper will detail the risks to which organizations that do not monitor their employees are exposed and explain the right way for organizations to go about monitoring.
Tags : 
security, security management, access control, identity management, data protection, email security, iam, authentication
    
Deep Software
Published By: NetSupport     Published Date: Nov 14, 2007
A majority of organizations do not have efficient ways of keeping track of their IT assets. That opens them up to dangers like system downtime from improperly implemented upgrades, potential licensing violations, poor customer service, overpaying on license fees and improper usage of software and the Internet by employees.
Tags : 
itam, asset management, spend management, cost savings, cost control, risk management, it management, software compliance
    
NetSupport
Published By: Aconex     Published Date: Jun 18, 2008
In the construction industry, as in business generally, risk management involves identifying risks, assessing them and then developing strategies to manage them. Organizations that manage risk well enjoy financial savings, greater productivity and service quality, improved success rates of new projects and better decision making. It is clear that, in today's complex business environment, risk factors are wide reaching, and are intrinsically linked to achieving organizational objectives.
Tags : 
risk management, collaboration, web collaboration, web-based collaboration, aconex
    
Aconex
Published By: CA ITAM     Published Date: Sep 09, 2008
This white paper discusses how to make the leap from basic asset tracking to a more robust asset management program that can improve decision-making and service levels, reduce costs and mitigate risks. The focus is the CA IT Asset Management solution's ability to accelerate your IT Asset Management program's maturity by providing asset ownership information (the complement to discovery information).
Tags : 
    
CA ITAM
Published By: Enhancement Software     Published Date: Jan 30, 2009
This white paper is intended to explore the process of secure and efficient paper‐based document marking and printing using Microsoft® Word. At the same time it will explore the savings that can be realized by implementing an automated practice that reduces risk of unintended use.
Tags : 
enhancement software, stampit, automated document marking, document integrity, corporate accountability, compliance, risk management, roi
    
Enhancement Software
Published By: Subrago     Published Date: Apr 30, 2009
The key objective of this white paper is to highlight the key issues and discuss processes and controls required to build a high performing IT support organization.
Tags : 
it support, subrago, it costs, customer transaction, high performing it support, it dependency, tolerance level, production services
    
Subrago
Published By: Citrix Online     Published Date: Apr 06, 2009
Today, stakeholders and projects pepper the globe. Successfully navigating the project lifecycle - from risk management and estimating to managing scope and facilitating knowledge transfer - now requires a different recipe.
Tags : 
citrix, project management, project lifecycle, risk management, managing scope, risk, collaboration, projects
    
Citrix Online
Published By: Project Perfect     Published Date: Jan 28, 2010
This white paper suggests project management methods and practices can move from a static, unidirectional framework, to a dynamics, multidirectional framework.
Tags : 
risk management, development risks, operational risks, enterprise architecture, eric tse, project management
    
Project Perfect
Published By: Project Perfect     Published Date: Jan 28, 2010
This paper highlights and consolidates interesting risk management topics for enterprise information systems from enterprise architect and system integration perspectives.
Tags : 
dynamics, role dyanmics, project dymanics, eric tse, project management
    
Project Perfect
Published By: Symantec.cloud     Published Date: Sep 01, 2010
Part 1 describes the threat landscape as seen by SMBs, and describes the security controls that belong in Stage 1.
Tags : 
messagelabs us, it security, smb, risk management, protection, malware, anti-spam, anti-virus
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Nov 29, 2010
Read the latest research & uncover the legal risks to your business from employee use of email & internet.
Tags : 
messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality, remote worker, risk management, human resources services
    
Symantec.cloud
Published By: PC Mall     Published Date: Mar 02, 2011
Download this HP white paper to learn how to reduce the financial impact and maintain acceptable levels of productivity during an unplanned disaster.
Tags : 
pc mall, disaster recovery, it risks, business continuity, outage, risk management
    
PC Mall
Published By: CSRSI - The Payment Advisors     Published Date: Aug 05, 2010
Most merchants don't know how to read their merchant statements. With a little knowledge, merchants can learn how to reduce their processing costs by reducing costly errors by staff, and correct errors by processors.
Tags : 
merchant processing, merchant statement, chargebacks, downgrades, fraud, pci compliance, csrsi
    
CSRSI - The Payment Advisors
Published By: SAS     Published Date: Aug 03, 2016
The concept and practice of stress testing has been around for many years. While traditional stress testing methodologies are still valid for firmwide scenario analysis and stress testing, special techniques and attentions are needed to successfully achieve the goal of firmwide capital adequacy in forwardlooking stress scenarios. During the 2007 financial crisis, many financial institutions were not sufficiently prepared for the ensuing liquidity crunch and capital drains. Perhaps if banks had worked through different economic scenarios prior to the crisis, they would have been in a better position to weather the storm. Inadequate preparation for crisis can lead to systemic risk and severe economic and political turmoil.
Tags : 
best practices, risk management, security, analytics, business technology
    
SAS
Published By: SAS     Published Date: Aug 03, 2016
The financial crisis that began in 2007 highlighted the major shortcomings of the regulatory framework around minimum capital requirements and liquidity requirements. In response, the Basel Committee on Banking Supervision made substantial revisions to its guidelines - specifically, by including more demanding capital and liquidity requirements now commonly referred to as Basel III framework. National banking authorities around the world are adopting the new Basel III framework as a way to eliminate systemic liquidity risk and promote greater transparency of risk management practices.
Tags : 
optimization, finance, financial crisis, liquidity requirements, banking, framework, risk management, security
    
SAS
Published By: SAS     Published Date: Aug 04, 2016
Banks have been using credit scoring models for over five decades, so managing the life cycle of models is nothing new. Most have had some kind of process in place to ensure the models they develop are robust, validated and monitored from a performance perspective and that decision makers have confidence in them. In recent times, however - partly in response to the credit crisis in 2008 - the discipline of model risk management (MRM) has become more formalized and rigorous, driving the need for enterprise-level model information management systems. The regulatory scrutiny being applied to them is intensifying and spreading globally, with US and European regulators leading the charge. For example, whereas regulators were previously more interested in the numbers they were provided, now more regulators want to have a core understanding of the models banks used to generate these numbers.
Tags : 
best practices, risk management, finance, security, info systems
    
SAS
Published By: CS Risk Management & Compliance Ltd     Published Date: Oct 15, 2010
This white paper gives some tips on how to manage data privacy and to prevent data breaches
Tags : 
data protection, dpa, security, it security, ico, data protection act
    
CS Risk Management & Compliance Ltd
Published By: Principia     Published Date: Nov 08, 2010
Survey results detail best practices investors believe must be adopted in structured finance investment and how well they perform today
Tags : 
structured finance, basel ii, abs, mbs, cdo, software, financial regulation, risk management
    
Principia
Published By: Lumension     Published Date: Nov 19, 2010
Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term. Here are four steps to cure your patch management headache.
Tags : 
lumension security, patch management, vulnerability management, risk mitigation, best practices, operating system, patch deployment, application security
    
Lumension
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search