Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk ManagementMultimedia (View All Report Types)
1 - 25 of 111 Matches Previous Page  | Next Page
Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast to see how you can best protect your assets accessible by the Web with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

ABAC to the Future: Deliver Smarter SiteMinder Policies with No Sweat
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast features a next-generation authorization strategy that offers a finer-grained approach to user provisioning. Click now to explore key benefits.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Radiant Logic, Inc.

How-to Build High Performance Security for the Software-Defined Data Center
sponsored by Trend Micro
PODCAST: Listen to this podcast for valuable information to consider when virtualizing your networks, especially with a whole new set of security risks to worry about. Click now for key recommendations to ensure a high-performance, secure network.
Posted: 18 Apr 2014 | Premiered: Apr 11, 2014

Trend Micro

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Third Party Applications: A Chink in Your Armour
sponsored by Lumension
WEBCAST: This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management.
Posted: 15 Apr 2014 | Premiered: Apr 15, 2014

Lumension

Maximum-Strength Threat Detection for Mid-Size Enterprises
sponsored by EMC Corporation
WEBCAST: This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

Mobile Application Security Chaos
sponsored by Hewlett-Packard Company
WEBCAST: Check out this video and see if you can recognize each of the types of vulnerabilities inflicted on these mobile users.
Posted: 08 Apr 2014 | Premiered: Apr 8, 2014

Hewlett-Packard Company

How to Stop Online Payment Fraud Without Adding Friction
sponsored by ThreatMetrix
WEBCAST: This in-depth webcast explores many current methods used to detect online payment fraud in real-time and how you can be more transparent for your customers.
Posted: 02 Apr 2014 | Premiered: Feb 28, 2014

ThreatMetrix

Rackspace and NetIQ - A Success Story
sponsored by NetIQ
WEBCAST: This webcast features one organization's experience with a streamlined identity and access management (IAM) solution that simplifies user provisioning across physical and virtual infrastructures.
Posted: 02 Apr 2014 | Premiered: Feb 28, 2013

NetIQ

Chalk Talk: NetIQ Cloud Access
sponsored by NetIQ
WEBCAST: This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

NetIQ

Security and Compliance Best Practices for SaaS Providers
sponsored by CloudPassage
WEBCAST: This webcast reviews the latest trends in software architectures and delivery models, along with the issues software-as-a-service (SaaS) providers must take into consideration when developing security measures.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

CloudPassage

What Security Pros Need to Know About Cloud
sponsored by CloudPassage
WEBCAST: In this webcast, uncover the benefits of policy-based automation for your security systems – to help you keep a scalable cloud environment protected.
Posted: 01 Apr 2014 | Premiered: Apr 1, 2014

CloudPassage

Comprehensive Cloud Security Requires an Automated Approach
sponsored by CloudPassage
WEBCAST: This webcast highlights major cloud security challenges and offers best practices to alleviate each issue. Click through to learn how automation may be your key to security success.
Posted: 31 Mar 2014 | Premiered: Nov 12, 2013

CloudPassage

Best practices in managing requirements in Energy and Utilities industries
sponsored by IBM
WEBCAST: This webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.
Posted: 27 Mar 2014 | Premiered: May 31, 2013

IBM

Podcast: Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
PODCAST: This podcast will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.
Posted: 26 Mar 2014 | Premiered: Mar 18, 2014

OpenIAM

Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
WEBCAST: This presentation will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.
Posted: 25 Mar 2014 | Premiered: Mar 18, 2014

OpenIAM

Demo: Easy-to-use OpenIAM Identity and Access Management
sponsored by OpenIAM
WEBCAST: View this webcast for a demonstration on how to use a fully-integrated IAM platform that offers self-service, user lifecycle management, provisioning, and single sign-on (SSO) capabilities
Posted: 18 Mar 2014 | Premiered: Mar 9, 2014

OpenIAM

Are you minding your business's reputation? What can you do to mind it better?
sponsored by IBM
WEBCAST: Changing social, cloud, and mobile technologies makes our lives smarter, more connected and more productive – but it also exposes us to bigger risks. In this video, learn about a simple tool that will help you assess how well you're managing your reputation and your IT investment.
Posted: 14 Mar 2014 | Premiered: May 22, 2013

IBM

How to Detect SQL Injection & XSS Attacks using SIEM Event Correlation
sponsored by AlienVault
WEBCAST: This in-depth webinar explores the current threat landscape, SQL injection and XSS attacks and what you can do to stop them.
Posted: 04 Mar 2014 | Premiered: Feb 25, 2014

AlienVault

Secure Your Apps, Docs and Devices in Minutes
sponsored by Fiberlink
WEBCAST: In this webcast, discover a single mobile management and security platform that ensures data protection and maintains compliance across all devices used for business.
Posted: 28 Feb 2014 | Premiered: Dec 6, 2013

Fiberlink

Understand and Counter Insider Threats with Behavioral Analytics
sponsored by Hewlett-Packard Company
WEBCAST: This in-depth resource explores how to combat insider threats and what you can do to prevent them from causing devastating attacks.
Posted: 25 Feb 2014 | Premiered: Nov 14, 2013

Hewlett-Packard Company

Case Study: SEEK Protects Sites with Web Application Security Firewall
sponsored by Imperva
WEBCAST: This case study features one organization's experience with a Web application security solution that tackled technical, logic, denial-of-service, and fraud attacks to reduce risk and save its reputation.
Posted: 21 Feb 2014 | Premiered: Mar 19, 2013

Imperva

Streamline Software Asset Management, Compose a software Management Symphony
sponsored by CDW Corporation
WEBCAST: View this webcast to explore a software asset management solution with customized application inventory reporting that enables you to easily assess software licenses and reduce compliance risks and costs.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

CDW Corporation

Podcast: Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
sponsored by Code42
PODCAST: In this on-demand podcast from the experts at SearchStorage.com, learn how choosing the right cloud model can help you address the challenges of data backup and security.
Posted: 20 Mar 2014 | Premiered: Mar 13, 2014

Code42

Application Whitelisting Best Practices: Lessons from the Field
sponsored by Lumension
WEBCAST: This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Lumension
1 - 25 of 111 Matches Previous Page    1 2 3 4    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement