Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Multimedia (View All Report Types)
1 - 25 of 133 Matches Previous Page  |  Next Page
How Multi-Vendor DNS Can Protect Your Internet Presence
sponsored by Dyn
WEBCAST: This webinar discusses the October 2016 DDoS Attack and the value of a secondary DNS strategy for resilience within your infrastructure.
Posted: 07 Dec 2016 | Premiered: Oct 26, 2016

Dyn

A Network Security View Of Docker Containers
sponsored by NeuVector
WEBCAST: Many top concerns for containers can be addressed with a better understanding of basic container security and networking. Learn tips for getting visibility into container networking to create a more secure environment overall.
Posted: 30 Nov 2016 | Premiered: Oct 31, 2016

NeuVector

Top 3 Cybersecurity Challenges Facing Healthcare Organizations
sponsored by Arctic Wolf Networks, Inc.
VIDEO: Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.
Posted: 23 Nov 2016 | Premiered: 30 Jun 2016

Arctic Wolf Networks, Inc.

Demo video: How QRadar Works - IBM Security Intelligence and Analytics Whiteboard
sponsored by IBM
WEBCAST: This video shows you how to get greater network visibility and risk management out of your security solution. Discover how to instantly sense and detect a breach as it happens in real-time.
Posted: 16 Nov 2016 | Premiered: Feb 3, 2016

IBM

RoundTower Technologies Protects its Customer's SDN: Video Case Study
sponsored by Check Point Software Technologies Ltd.
VIDEO: Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.
Posted: 14 Nov 2016 | Premiered: 13 Jun 2016

Check Point Software Technologies Ltd.

Threat Summary: Top 2016 Cyber Risks
sponsored by Proofpoint, Inc.
WEBCAST: Discover more about the top cyber risks we faced in 2016. Uncover threats, trends and transformations we saw in the security marketplace and receive future recommendations based on actionable intelligence.
Posted: 11 Nov 2016 | Premiered: Oct 31, 2016

Proofpoint, Inc.

Preventing internal Cybersecurity Breaches
sponsored by Navex Global
WEBCAST: Get insight from security experts on the various types of cybersecurity threats created by a lack of employee awareness. Learn how to develop an effective cybersecurity training program to prevent and solve potential insider issues.
Posted: 10 Nov 2016 | Premiered: Oct 31, 2016

Navex Global

Outthinking Cybercrime: Prepare for the Human Factor
sponsored by Trustwave
WEBCAST: Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.
Posted: 08 Nov 2016 | Premiered: Oct 6, 2016

Trustwave

Next Level Threats: Stopping Ransom & CEO Email fraud
sponsored by Trustwave
WEBCAST: Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. This webinar reveals valuable insight from researchers, security experts and industry leaders on how to prevent ransomware and CEO fraud.
Posted: 07 Nov 2016 | Premiered: Oct 19, 2016

Trustwave

Accelerating Digital Transformation with Data-Driven Security (Video)
sponsored by Akamai
VIDEO: A new approach to cyber security is required to deal with bigger and badder threats. Discover how to take a data-lead approach to security. Learn how to increase your speed and accuracy when dealing with threats without sacrificing customer satisfaction through real-time threat intelligence.
Posted: 01 Nov 2016 | Premiered: 31 Oct 2016

Akamai

Balancing Endpoint Security vs. End User Productivity
sponsored by AppSense
PODCAST: Most IT organizations struggle to balance endpoint security and user productivity. In this podcast, industry expert Simon Townsend will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.
Posted: 21 Oct 2016 | Premiered: Oct 13, 2016

AppSense

Balancing Endpoint Security vs. End User Productivity
sponsored by AppSense
WEBCAST: Most IT organizations struggle to balance endpoint security and user productivity. In this webcast, industry expert Simon Townsend will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.
Posted: 21 Oct 2016 | Premiered: Oct 13, 2016

AppSense

Inside the 2016 Verizon Data Breach Investigations Report
sponsored by Intel Security
WEBCAST: Join security experts Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from the 2016 Data Breach Investigation Report.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

Intel Security

Outsmarting Ransomware: Protect Your Money and Assets
sponsored by arcserve
WEBCAST: Watch this highly informative webinar featuring IT security leaders as they teach you how to defeat those ransomware hackers lurking in the dark of cyberspace. You'll discover preventative measure and remediation strategies to keep your organization safe.
Posted: 14 Sep 2016 | Premiered: Aug 1, 2016

arcserve

Specific Security Monitoring Lessons Learned from: Target, Nieman Marcus, Sony and Other Breaches
sponsored by LogRhythm, Inc.
WEBCAST: In this webcast, three cyber security veterans will discuss today's rapidly evolving cyber threat landscape and what new tools you need to survive. Learn how to address your current security intelligence maturity, and more.
Posted: 19 Aug 2016 | Premiered: Mar 19, 2015

LogRhythm, Inc.

Advantages and challenges of BYOD
sponsored by IBM MaaS360
WEBCAST: This webinar shows you the granular management controls that you need working at the app and data levels. Learn how to leave the personal user experience unaffected while better securing corporate data.
Posted: 10 Aug 2016 | Premiered: May 25, 2016

IBM MaaS360

The Real Cost of a Data Breach
sponsored by AllClear ID
WEBCAST: Through this webinar, you learn from security experts how to effectively respond to customers after a major data breach and decrease the damage done to your brand. Discover how to establish a timeline of events for each incident, determine the scope of an incident and alleviate customer concerns in a timely manner.
Posted: 01 Jul 2016 | Premiered: Nov 10, 2015

AllClear ID

Confidence in the Breach Age: Risks, Preparation, Response & Recovery
sponsored by AllClear ID
WEBCAST: Your organization needs to better understand risks, prepare to face a breach, and know how to respond to generate the best outcome possible. In this webinar, a panel of security experts provides insights and recommendations regarding breach risks, preparation, response, and recovery.
Posted: 01 Jul 2016 | Premiered: Aug 20, 2016

AllClear ID

Webcast - Enhancing Enterprise Security in 2016 – Part 2
sponsored by Intel
WEBCAST: Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

Enhancing Enterprise Security in 2016
sponsored by Intel
WEBCAST: In this informative webcast, Chris Young maps out a new model for cybersecurity, and shares what's currently underway. Learn how to get the most bang for your security buck and what role the government is playing in keeping your enterprise secure.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

Intelligent Endpoint Threat Defense
sponsored by Intel Security
PODCAST: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security

Intelligent Endpoint Threat Defense
sponsored by Intel Security
WEBCAST: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security

Neutralize Emerging Threats: Reducing the Time to Discover and Recover
sponsored by Intel Security
PODCAST: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Premiered: May 1, 2016

Intel Security

Neutralize Emerging Threats: Reducing the Time to Discover and Recover Webcast
sponsored by Intel Security
WEBCAST: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Premiered: May 1, 2016

Intel Security

Why Traditional Security Fails
sponsored by Intel Security
PODCAST: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 28 Jun 2016 | Premiered: May 1, 2016

Intel Security
1 - 25 of 133 Matches Previous Page    1 2 3 4    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement