it risk management

Results 26 - 50 of 467Sort Results By: Published Date | Title | Company Name
Published By: GE Healthcare     Published Date: Aug 27, 2015
The shift to value-based reimbursement (VBR) entails more financial risk for providers. Successful management of the transition to VBR can only be achieved when healthcare organizations are clinically and financially integrated to ensure tight care coordination and efficient resource utilization. That level of integration requires the aid of a robust IT infrastructure to support the enterprise. This whitepaper offers the opportunity to learn about new tools for healthcare providers to manage financial challenges associated with value-based reimbursement
Tags : 
centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing rcm, episodic payment, accountable care, icd-10, healthcare reform, shared savings, capitation, payment reform, risk based contracting, hospital consolidation, [mjm] claims denials, cost to collect, patient accounting, practice management
    
GE Healthcare
Published By: GE Healthcare     Published Date: Aug 27, 2015
This paper will explore some of the market dynamics driving the financial volatility in healthcare and will explore how advanced analytics, with the right IT backbone and organizational competencies, can help organizations successfully identify ways to manage revenue cycle profitability.
Tags : 
centricity business, financial management, analytics, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment, accountable care, icd-10, healthcare reform, shared savings, capitation, payment reform, risk based contracting, hospital consolidation, [mjm] claims, denials, cost to collect
    
GE Healthcare
Published By: Secureworks     Published Date: Nov 11, 2016
This paper sets out five major areas of focus for the practical CISO.
Tags : 
managed security services, ciso, security, risk management, security, threat and vulnerability management
    
Secureworks
Published By: Secureworks     Published Date: Nov 11, 2016
To ensure that “quasi-insiders” or third parties do not contribute to your enterprise’s attack vector, it’s imperative to develop a third-party governance process to mitigate risk. Read on to find out how.
Tags : 
managed security services, risk management, security, threat and vulnerability management, attacks, insider attacks, cyber security
    
Secureworks
Published By: Secureworks     Published Date: Nov 11, 2016
Sit back and relax while we pull back the curtains and reveal what happens, start to finish, when a threat is detected.
Tags : 
managed security services, threat detection, risk management, cyber security
    
Secureworks
Published By: Secureworks     Published Date: Dec 09, 2016
The included Framework for Inquiry is a non-prescriptive exercise that can help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.
Tags : 
cybersecurity, managed security services, security, threat and vulnerability management, risk management
    
Secureworks
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics, integrated mitigation
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
    
CA Technologies
Published By: Mimecast     Published Date: Oct 17, 2013
This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.
Tags : 
mimecast, unified email management, osterman research, business continuity, office 265 environments, email reliability, email downtime prevention, growth of office 365, extensive use of email, primary file transport, content management systems, reduced employee productivity, extended productivity loss, it disruption, security management risks, content management risks
    
Mimecast
Published By: Tenable     Published Date: Aug 07, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Tenable     Published Date: Aug 07, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Tenable     Published Date: Aug 15, 2018
"What’s your vulnerability assessment style? Are you scanning weekly, monthly or quarterly? And, what does your scanning habit reveal about the maturity of your organization’s vulnerability assessment practices, a critical part of cyber hygiene? These are the key questions Tenable Research set out to answer in our Cyber Defender Strategies Report. We discovered four common vulnerability assessment strategies in use today. These strategies tell us how mature an organization’s vulnerability discovery process is – and help us identify ways to improve. Download the report now to: - Learn what the four vulnerability assessment styles tell us about cyber risk maturity. - Compare your vulnerability assessment strategy to these four common scanning styles. - Find out what steps you can take today to improve your vulnerability assessment strategy – no matter where you are on the maturity scale."
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Schneider Electric     Published Date: Mar 28, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
Published By: Blueprint     Published Date: Mar 31, 2015
Banks, insurance companies, investment firms and other financial institutions operate in a competitive, fast-moving marketplace where “speed wins.” Small errors can cost millions of dollars, bruised reputations and even worse challenges from regulatory bodies. Missteps often end up on the front page of the Wall Street Journal. Developing effective IT solutions requires a comprehensive understanding of the industry’s priorities, regulatory requirements and unique business needs. Furthermore, it demands a development approach that allows you to deliver projects with an ever increasing need for speed within the context of a dizzying amount of organizational, regulatory and business change.
Tags : 
banks, financial services, agile, waterfall, finance, financial it, data management, cyber security, compliance, risk management
    
Blueprint
Published By: NetIQ     Published Date: Jun 12, 2012
This report outlines the future look of Forrester's solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, identity, identity-as-a-service, authentication, authorization, open web, iam, saml, oauth, openid, scim, spml, xacml
    
NetIQ
Published By: Venafi     Published Date: Jul 27, 2015
Read this important brief to learn how to maintain your cybersecurity and reduce risk.
Tags : 
sans, security controls, control requirements, cybersecurity, risk reduction, cryptographic devices, pki, data protection, encryption keys, vulnerability management
    
Venafi
Published By: Venafi     Published Date: Jul 27, 2015
Read this solution brief to learn how Security Operations teams can eliminate outages.
Tags : 
outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls, digital certificates, mobile application security, security management
    
Venafi
Published By: Aternity     Published Date: Feb 24, 2016
Governance, Risk Management, and Compliance (GRC) organizations are always concerned with violations of Acceptable Use Policies, the scenario of the workforce using a network, website, or system to perform inappropriate actions. But insider threats can also result from legitimate work activities that are being done for illegitimate purposes. Read how a leading insurance company leveraged an End User Experience Monitoring solution to identify employees harvesting customer data before leaving the company.
Tags : 
aternity, grc, risk management, compliance, end user experience, customer data, it management, knowledge management, enterprise applications
    
Aternity
Published By: CA Technologies     Published Date: Aug 22, 2017
As the United Kingdom and the rest of Europe prepare for Brexit (Britain’s exit from the European Union), information security experts are left wondering what this would mean to the security and risk management processes that have been put in place in the past and how they need to adjust to the emerging reality. This document discusses the impact of Brexit on privileged access management and what information security professionals may consider as immediate solutions to mitigate risks.
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com