Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Multimedia (View All Report Types)
1 - 25 of 138 Matches Previous Page  |  Next Page
Hackers Aren't As Picky As You Think
sponsored by Verizon
VIDEO: Discover the first truth of network security: That malicious actors are mostly out for low hanging fruit. With the resources found in this video, you can begin developing your plan to prevent hackers from exploiting weaknesses in your network.
Posted: 24 Jun 2016 | Premiered: 28 Apr 2016

Verizon

Success Story Video: State of California
sponsored by Axway
VIDEO: They were able to build their website quickly using a managed file transfer (MFT) system. Learn how they now centrally manage and monitor secure file transfers across all their sites and applications for all their agencies.
Posted: 17 Jun 2016 | Premiered: 01 May 2016

Axway

Addressing the Problem of Business Email Compromise
sponsored by Cloudmark
WEBCAST: Using recent examples, Cloudmark's VP of Product Management, Kevin San Diego and Gartner Research Director Perry Carpenter will tell you how to prevent future spear phishing attacks and what capabilities a spear phishing solution needs to include in order to be effective.
Posted: 17 Jun 2016 | Premiered: May 1, 2016

Cloudmark

Encompass analytics and transaction processing with one platform
sponsored by IBM
WEBCAST: Infrastructure is vital to retrieving value from your data. Watch this brief video to learn about an end-to-end solution that brings analytics and transaction processing to your data, minimizing cost and complexity risk associated with moving data to another platform, and keeps everything you need in one platform.
Posted: 17 Jun 2016 | Premiered: Jun 30, 2015

IBM

Case Study: How Republic Bank Monitors, Protects Sensitive Data
sponsored by Imperva
VIDEO: See how a national bank managed 100% uptime over a three-year period and ensured compliance across all servers in all locations. Learn how you can leverage behavioral analytics to mitigate risk and ensure that unauthorized personnel do not access sensitive client information.
Posted: 14 Jun 2016 | Premiered: 16 Sep 2015

Imperva

Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.
Posted: 13 Jun 2016 | Premiered: May 1, 2016

Intel Security

Masergy Unified Enterprise Security Demo
sponsored by MASERGY
WEBCAST: Access this webcast to discover how machine learning combined with continuous human monitoring can harden your defenses and improve your advanced threat detection capabilities.
Posted: 09 Jun 2016 | Premiered: May 1, 2016

MASERGY

B2B Success Story: E-Commerce Strategy for Thousands of Daily Transactions
sponsored by Axway
WEBCAST: In this video, Shawn Buske discusses the e-commerce system that Jabil chose to handle thousands of daily B2B transactions. Jabil was also able to easily meet SLA compliance and security compliance requirements.
Posted: 08 Jun 2016 | Premiered: Jan 11, 2016

Axway

Masergy Customer turned Evangelist, Stuart Carrothers talks Masergy
sponsored by MASERGY
WEBCAST: In this video, you'll discover a security vendor that wants to work with you for the lifetime of your organizations. From them, you'll get real-time visibility and change bandwidth as you need it. Learn about largest global network in the world based on software defined networking.
Posted: 07 Jun 2016 | Premiered: May 1, 2016

MASERGY

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

Addressing Cybersecurity in Healthcare Strategically
sponsored by Symantec Corporation
WEBCAST: What are the 3 major factors contributing to the increasing number of healthcare breaches? Find out what they are, and discover how you can best detect, respond and get ahead of threats as they are happening, and how you can best mitigate future attacks.
Posted: 23 May 2016 | Premiered: Apr 1, 2016

Symantec Corporation

Builders vs. Breakers: 10 Preventable Online Attacks
sponsored by Pluralsight
VIDEO: Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.
Posted: 20 May 2016 | Premiered: 05 May 2014

Pluralsight

Hulu Solves Their Security Analytics Problems with Exabeam
sponsored by Exabeam
VIDEO: Hulu security decided to utilize user behavior analytics (UBA) to help with this process. They're now able to focus their small team on specific areas of concern rather than watch a whole gamut of areas.
Posted: 20 May 2016 | Premiered: 23 Sep 2015

Exabeam

Safeway Gains Visibility and Context into Attacks with Exabeam's Behavior Intelligence Solution
sponsored by Exabeam
VIDEO: User behavior analytics (UBA) is dynamic. It's imperative today to deal with the myriad of threats that organizations deal with daily. Accelerate your time to attack understanding, reduce response time and create a more efficient security operation with UBA.
Posted: 20 May 2016 | Premiered: 17 Feb 2015

Exabeam

Five Tips to Make your Data Protection Strategy more proactive
sponsored by Intel Security
WEBCAST: Gain critical albeit little-known tips & tactics to make your data protection strategy more proactive as analysts from the Foundstone Services' Detection and Response team deliver and an in-depth technical discussion on data loss prevention (DLP) policies, implementations, and deployments.
Posted: 17 May 2016 | Premiered: Apr 1, 2016

Intel Security

Data Exfiltration in Depth
sponsored by Intel Security
WEBCAST: Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.
Posted: 17 May 2016 | Premiered: Apr 1, 2016

Intel Security

Staying out of the next Data Breach Headline
sponsored by Intel Security
VIDEO: Learn about outbound data protection as your last line of defense against data exfiltration. Discover how you can achieve greater DLP, disk encryption and device control to from wherever your data lives.
Posted: 12 May 2016 | Premiered: 28 Apr 2016

Intel Security

It's Time to Re-evaluate Your Email Encryption Solution
sponsored by ZixCorp
VIDEO: Encrypting emails should be as easy as clicking "send." This video teaches you about a community approach to securing email and sensitive data. Keep workflow flowing by automating the encryption process so you don't ever have to worry about where your email are flying.
Posted: 12 May 2016 | Premiered: 18 Dec 2013

ZixCorp

Customer Spotlight | blinkbox
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about a VOD service called blinkbox and their struggles finding solid cloud security for their platform. Watch now to see how they remediated their security issues and how they now operate without breach concerns.
Posted: 11 May 2016 | Premiered: 28 Oct 2014

Barracuda Networks

Whiteboard: Barracuda Web Application Firewall
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about common types of web application attacks and what you can do to save your website. Watch now to discover how firewalls can best protect your site against targeted and automated attacks. Protect the integrity of your data and safeguard the reputation of your business.
Posted: 10 May 2016 | Premiered: 30 Jun 2015

Barracuda Networks

Enhancing the security and performance of your cloud-based applications
sponsored by Verizon
VIDEO: This video shows you how you can securely connect to a variety of leading cloud providers through advanced network services, giving you a reliable end-to-end experience for all your cloud-based applications. Watch now to discover secure, on-demand connectivity to drive growth, improve business performance and gain a competitive advantage.
Posted: 10 May 2016 | Premiered: 25 Feb 2015

Verizon

Prevent Email Breaches with Zix
sponsored by ZixCorp
VIDEO: This video shows you how to put an end to email data loss and misplaced attachments. Access now to learn how you can get a second chance at catching mistakes and add another layer of authorization before sending out important information.
Posted: 10 May 2016 | Premiered: 01 Apr 2016

ZixCorp

ELIMINATING CYBERSECURITY BLIND SPOTS WITH APPLICATION AWARENESS
sponsored by Ipoque
WEBCAST: This webinar will review the hidden cyber security threats that Service Provides and Enterprises need to combat.
Posted: 04 May 2016 | Premiered: Apr 26, 2016

Ipoque

Behavior-Based Threat Detection
sponsored by eSentire
VIDEO: This video shows you behavior-based threat detection that scans your network for a multitude of different anomalies. It combines time of day, bandwidth surges, IP reputation and port scanning to identify possible threats to your network security. Access now to learn about always on full traffic forensics.
Posted: 19 Apr 2016 | Premiered: 01 Mar 2016

eSentire

Don't Be the Next Cyber Victim
sponsored by eSentire
WEBCAST: The best way to manage the complexities of cybersecurity is to simplify it. Micro-incident response has the capability to protect your network 24/7, 365 days per year. Access now to stop small breaches from turning into business-ending catastrophes.
Posted: 19 Apr 2016 | Premiered: Mar 1, 2016

eSentire
1 - 25 of 138 Matches Previous Page    1 2 3 4    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement