306 Vektoren zum Thema "IT risk management" bei ClipDealer

Medien sortieren nach     Gehe zu Seite:    
« Vorherige  1  2  3  4  5  6  
Big data icon set
Cloud shape with blue refresh arrows, triangle warning icon, and network symbol. Ideal for cybersecurity, cloud computing, data storage, IT risk management, system updates, network security disaster
Person with a laptop points forward alongside another using a magnifying glass over the term RISK and icons. Ideal for business strategy, problem-solving, analysis, strategy planning, internet
 businessman investor falling from stack of unstable box Unstable investment market risky situation or economic recession; crisis or bankruptcy.vector illustrator
Word cloud - risk management
Human Resources Flat Set 04
Modern Human Resources set 04
Human Resources Set 04
Hooded figure at laptop with warning symbol, arrows to three computers. Magnifying glass and shoe beside. Ideal for cybersecurity, hacking, online fraud, surveillance, digital forensics, network
Human Resources Linear Set 04
Gears, lock, triangle with exclamation mark, skull symbol. Ideal for cybersecurity, data protection, risk management, warnings security systems cautionary signals IT infrastructure. Line metaphor
Cloud symbol above upward arrow pointing to exclamation mark inside a triangle. Ideal for technology, IT, security alerts, cloud storage, data protection, warnings, online services. Line metaphor
Businessman holding a shield with a lock icon, indicating cybersecurity, with UI elements and a downward arrow. Ideal for cybersecurity, data protection, technology, business safety, online security
Large cloud shape with the word RISK, featuring an exclamation mark in the I position, network servers, and connected globe. Ideal for cybersecurity, data management, IT infrastructure, online
Binary code sequence, magnifying glass inspecting a thumbs-up rating, and RISK text with exclamation mark. Ideal for cybersecurity, risk management, data analysis, decision making, digital
Laptop with document icon, 5G network building, warning sign replacing I in RISK. Ideal for technology, security, internet, data protection, risk management, cybersecurity awareness network
A large green shield with a checkmark in the center, symbolizing security, trust, and verification, in a flat vector illustration.
Gear symbolizes settings and engineering, lock represents security, exclamation mark denotes caution. Ideal for technology, cybersecurity, cloud services, IT support, data protection, risk
Person with a shield blocking DDoS missiles aimed at coins. Ideal for cybersecurity, data protection, financial safety, internet security, risk management, cyber threats, online defense themes. Line
Computer screen with spam emails, binary code, eye, and malicious symbols. Ideal for online security, phishing, data protection, risk management, cybersecurity education, antivirus software, IT
Person standing beside a large shield with a checkmark, contemplating concepts of protection, security, validation, trust, cloud computing, reliability, and safety. Ideal for cybersecurity privacy
Locked padlock with skull and crossbones warning symbol, woman analyzing data, and shield with padlock icon. Ideal for cybersecurity, data protection, internet safety, risk management, IT security
Brick firewall with flame, magnifying glass analyzing Risk, and microphone icon. Ideal for cybersecurity, data protection, risk assessment, digital security, communication security, audit concept
Hacker in action, password input on screen, phishing scam, and laptop security. Ideal for online fraud, identity theft, cybercrime awareness, privacy, tech risks IT protection abstract line flat
Male cybersecurity analyst sitting at desk, working on a laptop with a security shield icon. Concept of online safety, data encryption, and secure internet browsing.
Shopping cart icon near brick firewall with a blue flame, and running figure sign. Ideal for online security, ecommerce safety, data protection, cyber threats, secure transactions, internet safety
Padlock with skull and crossbones symbolizing threats. Person analyzing RISK with magnifying glass amidst icons. Ideal for cybersecurity, risk management, data protection, business strategy
Cloud icon, person analyzing risk with magnifying glass, lock icon for security. Ideal for cloud computing, data protection, digital risk, cybersecurity, privacy, technology abstract line flat
Envelope, lock, exclamation mark icon within triangle, and letters R and SK. Ideal for cybersecurity, email protection, data safety, IT security risk management infosec online communication. Line
Large cloud with an exclamation point in a triangle emphasizing risk within the word RISK and a potted plant. Ideal for presentations, business strategy, safety planning, security protocols, IT risk
Magnifying glass highlighting risks, LMS interface on digital devices, organizational structure with steps. Ideal for business strategy, education, risk management, planning, productivity, teamwork
Blue shield with lock icon next to two gears. Ideal for cybersecurity, data protection, IT security, system maintenance, network security, risk management, and tech infrastructure. Line metaphor
Word RISK with exclamation mark inside triangle replacing I, blue cloud shape above, downward blue arrow on right. Ideal for cybersecurity, data protection, risk management, IT, cloud computing
Lock on blue shield symbolizes cybersecurity with a rising line graph showing growth, and arrows indicating data exchange. Ideal for online safety, safe growth, analytics, IT strategy, trust
Data bars, a lock icon, and a cloud illustrate secure data storage and cybersecurity measures. Ideal for cloud security, data protection, digital privacy, encryption, network safety, technology
Cloud above laptop with user examining risks through magnifying glass. Connected icons symbolize analysis, security, and data management. Ideal for risk management, cybersecurity, cloud computing
Three rockets labeled DDoS flying above warning icons and the word RISK. Ideal for cybersecurity, network protection, threat awareness, IT security training, risk management, emergency preparedness
Three missiles labeled DDoS attack a figure and a rising graph. Ideal for cybersecurity, risk management, data protection, hacking, online threats, cyber warfare, business continuity. Abstract line
Blue cloud graphic with a shield lock icon symbolizing data privacy, cybersecurity, and secure online storage. Ideal for technology, digital safety, cloud computing, IT security, online privacy
Servers, person holding a shield with lock symbol, and another analyzing risk using a magnifying glass. Ideal for cybersecurity, risk management, data storage, server safety, technology security, IT
40 Vector Icons - SEO (Search Engine Optimization)
Laptop with lock, hacked login screen, cloud server, binary code, email vulnerability, and user data visualization. Ideal for digital security, hacking, data breaches privacy cybercrime system
Brick wall with blue flame, router signal, and smiling face icon representing protection, security, and user satisfaction. Ideal for cybersecurity, protection, online security, firewall network
Bar graph, lock, and gear alongside text. Key theme involves data analysis, security, and optimization. Ideal for technology, cybersecurity, data management digital marketing business strategy IT
Large padlock emphasizing security, magnifying glass signifying scrutiny, character analyzing financial data on computer screen. Ideal for cybersecurity, privacy, financial security, data protection
Server rack with four units, biometric face recognition, and shield lock security icon. Ideal for cybersecurity, data encryption, cloud storage, biometrics, access control, privacy abstract line
Bold black icon of a padlock inside a shield, representing security, protection, and safety.
Cloud backdrop with e-commerce shop graphic, the word RISK featuring an exclamation mark warning sign. Ideal for cloud computing, cybersecurity, e-commerce, risk management, online business, data
Computer with lock and warning symbols shows data breach concept. Ideal for cybersecurity, data protection, online safety, risk management, IT security, cloud computing, and networking. Line metaphor
DDoS attack rockets flying toward a blue shield with a checkmark. Ideal for networking, online security, IT systems, data protection, risk management, awareness campaigns, abstract line flat metaphor

« Vorherige  1  2  3  4  5  6