risk

Results 1 - 25 of 2514Sort Results By: Published Date | Title | Company Name
Published By: ADMIS     Published Date: Nov 21, 2014
This Hedger's Self Study Guide provides a detailed introduction to agricultural futures and options markets from a risk management perspective. The 76 page book includes market concepts, terminology and strategies for both the buy and sell side of the market. Self-study quizzes are interspersed throughout the publication as a means of monitoring your market knowledge and progress. If you're new to futures and options on futures, the first four chapters will give you a solid foundation. Chapters 5 and 6 include futures and options strategies, both from a buying and selling hedger's perspective. It's a valuable tool for any trader - sign up and get yours today!
Tags : 
    
ADMIS
Published By: RJO Futures     Published Date: Mar 01, 2012
This complimentary guide from RJO Futures includes fundamental steps in the process to managing risk within your trading plan. Features information on understanding the market plus leverage, money management, strategies and more.
Tags : 
    
RJO Futures
Published By: RJO Futures     Published Date: Oct 17, 2012
The basics of Risk Management 10 Do's and Don'ts of Trading Futures An introduction to Futures Trading
Tags : 
    
RJO Futures
Published By: Highground Trading     Published Date: Jul 17, 2014
With nearly 3 billion contracts worth approximately $1 quadrillion in notional value traded in 2012, CME Group is the world’s leading and most diverse derivatives exchange. Building on the heritage of CME, CBOT and NYMEX, CME Group serves the risk management needs of customers around the globe. As an international marketplace, CME Group brings buyers and sellers together – whether trading on the CME Globex electronic trading platform or on trading floors in Chicago and New York, or clearing OTC transactions through CME ClearPort.
Tags : 
    
Highground Trading
Published By: Highground Trading     Published Date: Jul 17, 2014
With nearly 3 billion contracts worth approximately $1 quadrillion in notional value traded in 2012, CME Group is the world’s leading and most diverse derivatives exchange. Building on the heritage of CME, CBOT and NYMEX, CME Group serves the risk management needs of customers around the globe. As an international marketplace, CME Group brings buyers and sellers together – whether trading on the CME Globex electronic trading platform or on trading floors in Chicago and New York, or clearing OTC transactions through CME ClearPort.
Tags : 
    
Highground Trading
Published By: Dur-A-Flex     Published Date: May 14, 2018
Previous best practices for cleaning healthcare facilities centered on sanitizing frequently touched objects, such as bed rails or call buttons, because these objects were believed to be major sources of contagion. However, this new study finds that floors are the largest potential source of pathogens after reviewing five participating Cleveland-area hospitals. Specifically, the following findings are highlighted in the study: • Patient room floors in five hospitals were found to be contaminated with healthcare-associated pathogens. • High-touch objects often came to be in direct contact with the floor. • Touching objects on the floor frequently resulted in transfer of pathogens to hands. • Floors in hospital rooms are overlooked as a source for pathogen dissemination, with potentially dangerous results.
Tags : 
    
Dur-A-Flex
Published By: Concur ENT     Published Date: May 11, 2018
VAT rules can be complex, HMRC – a gauntlet. In this eBook, we demystify some of the facts around compliance, tax and expense management. The British economy has gone from boom to bust. The recession followed by a long period of austerity and caution has altered spending behaviours while the government has increasingly cracked down on tax evasion and fraud. HMRC has become more focused on assisting businesses of all sizes to comply with their policies and implement good governance when it comes to finances. Nevertheless, the reality can sometimes be confusing and the penalties for getting it wrong – severe. Many businesses outsource their tax management to experts or muddle through, running the risk of non-compliance. There’s a real need for unambiguous, helpful advice about expenses, VAT and HMRC compliance. We’ve created this guide to help shine some light on the processes, practices and behaviours around tax and expenses based on some of the frequently asked questions we receive. Wh
Tags : 
    
Concur ENT
Published By: Workday     Published Date: Mar 02, 2018
Running your government agency on aging technology? It’s a costly risk you don’t need to take. Read this GovLoop guide to learn how updating your technology foundation to the cloud can help your agency improve productivity, efficiencies, and services.
Tags : 
government, govloop. technology
    
Workday
Published By: Lookout     Published Date: Mar 28, 2018
Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
    
Lookout
Published By: Panaya     Published Date: May 31, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: › Strategiaclly align feature releases and backlogs with your overall business strategy › Identify and prioritize dev and test activities with visibility into project waves and portfolios › Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks › Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Published By: Sage     Published Date: May 14, 2018
Compliance is one of the top challenges facing any payroll and HR department. It’s up to you to ensure that all personnel business practices follow current laws and that you are keeping proper records to document your company’s compliance. While an efficient payroll system can help to enhance employee moral and boost your reputation, mistakes in record-keeping and compliance can result in punitive penalties– even lawsuits. Of course, no business wants to expose itself to such financial and reputational risk. However, keeping up to date with payroll legislation can be a complex task. It’s reported that as many as one in three small businesses are penalised for incorrect payroll. To protect your company from costly fines and even litigation, you need to stay informed about employment laws, reporting rules, and changing workforce compliance issues. In this guide, we look at the challenges and the payroll solutions that will help your payroll department meet its compliance requirements wit
Tags : 
    
Sage
Published By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development
    
Black Duck Software
Published By: MobileIron     Published Date: Feb 26, 2018
During the third quarter of 2017, July 1 - September 30, several types of mobile risks and threats were detected around the world. The risks and threats are categorized as follows (and often referred to as mobile threat “DNA”
Tags : 
    
MobileIron
Published By: Mimecast     Published Date: May 31, 2018
Not all email security systems perform the same. Lots of false negatives get through. That’s what Mimecast found in its new email security risk assessment (ESRA), an inspection of email security systems to uncover the number, type and severity of threats getting into organizations. - TOTAL CAUGHT SPAM: 14,277,163 - TOTAL CAUGHT DANGEROUS FILE TYPES: 9,992 - TOTAL CAUGHT MALWARE ATTACHMENTS: 12,502 Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems miss.
Tags : 
    
Mimecast
Published By: Genesys     Published Date: Feb 22, 2018
Customer expectations have changed. Self-service options on the channels of their choice are a given. And when self-service is not enough, they want live agents who can step up and make it a seamless transition. Take a new approach to customer engagement today—or your customers won’t be back tomorrow.
Tags : 
frost & sullivan, contact center, omnichannel solution, customer engagement
    
Genesys
Published By: IBM     Published Date: May 09, 2018
Does the future of digital trust lie in artificial intelligence (AI)? Join the conversation between Valerie Bradford, product marketing manager at IBM Security, and Andras Cser, vice president and principal analyst serving security and risk professionals at Forrester, to discover how AI is changing the landscape of digital identity. Key takeaways: Understand how AI is helping organizations respond to current changes in the threat landscape. Examine how companies are using AI to establish trust in digital identities. Hear how AI is changing the end-to-end customer journey by improving the digital experience.
Tags : 
digital trust, security, digital identity
    
IBM
Published By: IBM     Published Date: May 02, 2018
Read about security measures banks should consider to help mitigate risk and gain user trust in today’s Open Banking ecosystem.
Tags : 
open banking, security, risk
    
IBM
Published By: IBM     Published Date: May 30, 2018
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Tags : 
    
IBM
Published By: Epicor     Published Date: Jun 11, 2018
Growth is definitely on the agenda for manufacturers, along with avoiding the pitfalls of rapid growth. This was clear in a global survey recently undertaken on behalf of Epicor Software Corporation (Epicor) by MORAR Consulting. Our research identified key factors that growing manufacturers cited as essential to their success, along with risks that manufacturers believe could threaten growth for unprepared businesses. The Epicor “Profitable Growth in Action” eBook features seven manufacturers and the factors they consider critical to their success. Get the eBook to learn how you can help boost your company’s potential for profitable growth.
Tags : 
erp software, enterprise resource planning software, manufacturing, manufacturing technology, manufacturing software
    
Epicor
Published By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Mimecast     Published Date: May 09, 2018
Der Mimecast ESRA Report (E-Mail Security Risk Assesment) beleuchtet die Leistungsfähigkeit verschiedener E-Mail Security Lösungen. Der ESRA Report wird quartalsweise durchgeführt und auch der aktuelle Report stellt Lücken bei vielen Systemen im Schutz von Unternehmen gegen bösartige Dateitypen, Ransomware, Phishing und weiteren Angriffsversuchen über E-Mail fest. Fast ein Viertel der "unsicheren" E-Mails werden an die Posteingänge der Benutzer übermittelt. Erfahren Sie in dem Report, wie Sie Ihre Cyber Resilience für E-Mails erhöhen und mit einem mehrschichtigen Ansatz für Ihre Office 365 Umgebung deutlich die Sicherheit für Ihr Unternehmen steigern.
Tags : 
    
Mimecast
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.