Complexity, globalization and digitalization are just some of the elements at play in the risk landscape—and data is becoming a core part of understanding and navigating risk.
How do modern finance leaders view, navigate and manage enterprise risk with data? Dun & Bradstreet surveyed global finance leaders across industries and business types. Here are the top trends that emerged from the study:
1. The Enterprise Risk & Strategy Disconnect—Finance leaders are using data and managing risk programs, but over 65% of finance leaders say there’s missing link between risk and strategy.
2. The Risks of the Use and Misuse of Data—Up to 50% of the data used to manage modern risk is disconnected. Only 15% of leaders are confident about the quality of their data.
3. Risky Relationships—Only 20% of finance leaders say the data they use to manage risk is fully integrated and shared.
Download the study to learn how finance leaders are approaching data and enterprise risk management
Lax SSH security and management can lead to significant gaps in security controls. Cybercriminals target these gaps to gain full access to sensitive, regulated, and valuable systems and data.
Read the solution brief, Stop Unauthorized Privileged Access, to close these SSH security gaps and protect your business:
• Learn about the top SSH vulnerabilities
• Discover how to reduce risk of SSH key misuse
• Develop a strategy to manage and secure SSH keys
"GDPR, the General Data Protection Regulation has just been signed into law and enacts new rules and stiff penalties for any company who misuses or loses European Union (EU) citizens’ personal data. This sweeping legislation has expanded the definition of personal data and puts IT and testing departments on high alert to safeguard personal data, across development and testing environments. Test data management, the process of obtaining and distributing test data for development teams, takes on greater urgency as the GDPR deadline looms.
Solid test data management practices will be key to overcoming compliance roadblocks and avoiding huge fines associated with GDPR. Utilizing new ways in which test data can be generated, distributed and managed will be pivotal role to meeting this regulation.
In this webcast, Vanson Bourne and CA will present the results of their highly anticipated GDPR readiness survey of 200 corporations in North American and the UK. Join us to learn more about:
Published By: Quick Base
Published Date: Dec 18, 2017
Spreadsheets are good for number crunching – but many professionals use them to do things they were never meant for. The result? Long office hours, chasing down status updates, and compiling data manually. Learn the 5 signs of spreadsheet misuse and how to overcome them in this webcast.
Fear of data misuse has led to both general and industry-specific data-privacy regulations worldwide that many organizations now must meet, and it’s important to embrace their requirements. The role of data-holding organizations has increasingly shifted to being stewards of information, in particular in the United States and the European Union (EU). And failure to comply with regulations can mean not only reputational damage, but substantial fines and even jail time. Just meeting compliance mandates, though, may not help you actively spot and stop a data breach.
The right identity and access management solution can integrate with a healthcare provider’s EMR system to help keep sensitive medical data safe—and keep the organization compliant. It can provide valuable insights and visibility into accounts, access privileges and entitlements, across the wide range of users. By closing the gaps in identity protection, organizations can fight the threats of inadvertent misuse and intentional theft that may lead to security breaches.
Published By: Mimecast
Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well.
S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each.
In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Printers, scanners, mobile devices… It’s hard to imagine running a law office without them, but you should know they can expose your client data to theft or misuse. Learn why your office technology may not be as secure as you think.
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Data is the lifeblood of today’s digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits, stolen IP can destroy competitive advantage, and unnecessary privacy abuses can bring unwanted scrutiny and fines from regulators while damaging reputations. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model; position data security and privacy capabilities as competitive differentiators; and build a new kind of customer relationship.
Published By: Pointsec
Published Date: Aug 21, 2009
Critical data is best protected against misuse on business trips complete encryption of notebook hard disks. If 4,500 notebooks are involved, as is the case for the Zurich firm Swiss Re, precise selection criteria and exact planning for the international rollout are important.
DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
Our portfolio of live events, online and print publishing, business intelligence and professional development brands are centred on the complexities of technology convergence. Operating in 42 different countries, we have developed a unique global knowledge and networking platform, which is trusted by over 30,000 ICT, engineering and technology professionals.
Data Centre Dynamics Ltd.
102-108 Clifton Street
London EC2A 4HW