Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

White Paper | Presented by QlikTech

10 Ways to Transform Big Data into Big Value

Modern BI solutions can increase the value of Big Data exponentially, by lowering the barrier to entry with user friendly solutions. This allows more people within your organization - not just the data scientists - to access, analyze, and collaborate on your data.

White Paper | Presented by Bitsight

40 Questions You Have in Your Vendor Security Assessment

Our goal with this guide is to help you get started with the creation of your vendor security risk assessment. This is not intended to be an out-of-box security assessment solution, but rather, a guide to get you headed in the right direction. We'll explain the top three frameworks you should be examining, questions you may want to consider (and why you should potentially consider them) and what else to include in your VRM program.

White Paper | Presented by Bitsight

5 Ways Your Vendor Risk Management Program Leaves You In The Dark

Relationships with vendors are important (or even vital) for many organizations, but unfortunately, there's a trade-off - the more data you share, the more risk you acquire. Unfortunately, current risk assessment methods don't paint a complete picture, and they are often biased and insufficient when used alone. Within these pages, we're going to explore how VRM programs often leave you in the dark, and what you can do about it.

Case Study | Presented by Nuance

Bank Leumi transforms authentication with voice biometrics

The First Direct Bank of the Leumi Group, one of the largest banks in Israel, was challenged with the PIN and knowledge-based authentication process used in its contact centers. The verification questions took up to 30 seconds per call, frustrating customers and proving easily answered by imposters.

White Paper | Presented by Nuance

Biometric security boom

Download the "Biometric Security Boom" white paper to learn why leading organizations are turning to highly sophisticated and secure multi-modal biometric authentication technologies to provide customers with a dramatically better experience and realize major efficiency and security gains.

eGuide | Presented by Bitsight

Board-Level Reporting Survival Guide

This Survival Guide offers some advice on how to advance the CSO/CISO-board relationship, and provides some tips that CSO/ CISOs can use to make their seat at the table more secure-and more meaningful to the business.

eBook | Presented by Bitsight

Creating Efficiencies In Vendor Risk Management

Today, organizations are focused heavily on core competencies and keys to success. This - coupled with the rapid growth of software as a service (SaaS) - has led to increased outsourcing of certain business functions to vendors who can perform these functions better, faster, or cheaper. Therefore, there are more third-party relationships today than ever before - and this comes with a variety of benefits and consequences.

White Paper | Presented by Bitsight

Cybersecurity: The New Metrics

"How secure are we?" That's one of the most common questions asked by boards and senior managers. But security and technology leaders do not always have ready answers, says Jacob Olcott of BitSight Technologies. Are they even using the right security metrics?

White Paper | Presented by QlikTech

Discover More Value in Your IoT Data

In this white paper, delve into a 3-step journey from data to insights that can give your business the advantage it needs in a data-driven economy.

White Paper | Presented by Bitsight

Exploring Data Security in the Legal Sector & Beyond

BitSight's fourth Annual Industry Index compares the cybersecurity performance of the Legal sector to five other industries: Finance, Healthcare, Retail, Government, and Energy/Utilities. The study explores how the cybersecurity posture of the Legal sector has changed over time and, as a critical supplier to most industries, whether its security performance should raise concerns for vendor management and information security teams.

Load More