Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk ManagementMultimedia (View All Report Types)
76 - 100 of 131 Matches Previous Page  | Next Page
Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Managing Access Security in a Multi-Perimeter World
sponsored by IBM
WEBCAST: Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise.
Posted: 07 Mar 2013 | Premiered: Dec 31, 2012

IBM

Seize the power of connected intelligence
sponsored by Hewlett-Packard Limited
WEBCAST: This brief webcast demonstrates how with connected intelligence, IT leaders will be able to proactively manage information related risk, enhance customer experiences, optimize business performance, and discover new market opportunities.
Posted: 07 Sep 2012 | Premiered: Sep 7, 2012

Hewlett-Packard Limited

Tour: Offsite Tape Vaulting
sponsored by Iron Mountain
WEBCAST: For over 55 years, Iron Mountain has been able to help organizations large and small to manage the risks and costs of records management. They understand the value of your data. Check out this brief webcast to learn more about the wide array of services Iron Mountain offers.
Posted: 17 May 2011 | Premiered: May 17, 2011

Iron Mountain

Dedicated Transportation: Extra Care for Your Critical Data
sponsored by Iron Mountain
WEBCAST: Watch this brief demo to learn about Iron Mountain's new Dedicated Transportation service, which ensures the safe delivery of your data to its destination.
Posted: 12 May 2011 | Premiered: May 12, 2011

Iron Mountain

Disclosures 2012 - The Vulnerability of Publicly Traded Companies
sponsored by Veracode, Inc.
WEBCAST: In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.
Posted: 24 May 2012 | Premiered: May 23, 2012

Veracode, Inc.

WAN Security: Making the Right Choices for an Optimized WAN
sponsored by XO Communications
WEBCAST: This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise.
Posted: 03 May 2012 | Premiered: Apr 30, 2012

XO Communications

Healthcare Privacy 2011: Top 5 Messaging and Collaboration Risks
sponsored by Proofpoint, Inc.
WEBCAST: For all healthcare providers, properly secured email and other web 2.0 tools help lower costs while improving service delivery. But failing to protect patient data or meet regulatory requirements could mean large fines and strict penalties. Watch this webcast to uncover the top 5 messaging and collaboration risks.
Posted: 13 Oct 2011 | Premiered: Oct 13, 2011

Proofpoint, Inc.

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel

Secure Cloud Access Reference Architecture Model
sponsored by Intel
WEBCAST: Enterprise cloud computing continues to evolve in 2011, and organizations are developing strategies to ensure that they remain aware of security risks when it comes to operations in the cloud. In this webcast, learn strategies for enhancing cloud security in areas such as encryption, access control, malware protection and more.
Posted: 10 May 2011 | Premiered: May 10, 2011

Intel

What Auditors Think about Crypto
sponsored by Thales
WEBCAST: Thales e-Security & The Ponemon Institute present a joint webinar “What Auditors Think about Crypto”. The webinar discusses the findings of a recent survey that was conducted with auditors in various industries.
Posted: 09 May 2011 | Premiered: May 9, 2011, 11:00 EDT (15:00 GMT)

Thales

ArcSight Case Study: Vodafone
sponsored by ArcSight, an HP Company
VIDEOCAST: Vodafone, the world's leading mobile communications group, uses ArcSight Enterprise Threat and Risk Management platform to get a consolidated global view of security, increase the efficiency in security operations and increase the reaction time to cyberattacks or security breaches.
Posted: 10 Mar 2011 | Premiered: Mar 10, 2011

ArcSight, an HP Company

Top four considerations for securing Microsoft SharePoint
sponsored by Sophos, Inc.
WEBCAST: This webcast discusses the key risks and best practices to securing Microsoft SharePoint and protecting your organization's digital assets.
Posted: 08 Mar 2011 | Premiered: Mar 8, 2011

Sophos, Inc.

Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

The Mobile App Top 10 Risks
sponsored by Veracode, Inc.
WEBCAST: This expert webcast reveals the top 10 mobile application risks facing organizations today.
Posted: 15 Feb 2011 | Premiered: Feb 15, 2011

Veracode, Inc.

How to Beat the Cost of Compliance by Optimizing your Data Across its Lifecycle with IBM System z®
sponsored by IBM
WEBCAST: In this webcast you’ll learn how to lower costs through optimizing your organization’s data, thereby improving the efficiency of your business processes and applications. With intelligent archiving and thorough backup-and-restore strategies, you can further reduce costs and risks to your business.
Posted: 09 Feb 2011 | Premiered: Mar 1, 2011, 11:00 EST (16:00 GMT)

IBM

Don’t Fire Your Firewall
sponsored by AT&T Corp
WEBCAST: Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software.
Posted: 07 Jan 2011 | Premiered: Jan 4, 2011

AT&T Corp

Protect data & client trust: an end to end approach to protecting your applications & organization
sponsored by IBM
WEBCAST: This presentation outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization.
Posted: 06 Dec 2010 | Premiered: Dec 6, 2010

IBM

The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape
sponsored by ESET
PODCAST: In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 
Posted: 02 Dec 2010 | Premiered: Dec 2, 2010

ESET

Enterprise Risk Management: Enabling Risk-Adjusted Management of Strategy and Performance
sponsored by SAP AG
VIDEO: Find out how SAP software allows you to identify, mitigate, and manage risk so that you can increase visibility into the impact of risks, reduce cost and risk across strategic initiatives, and increase your strategic effectiveness.
Posted: 17 Sep 2010 | Premiered: 17 Sep 2010

SAP AG

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO: Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009

Core Security Technologies

Video Whitepaper: Managing Risk & Uncertainty
sponsored by Oracle Corporation
VIDEO: View this video white paper to learn how Integrated business planning can help your company align strategic, operational, and financial plans.
Posted: 15 Dec 2009 | Premiered: 03 Nov 2009

Oracle Corporation

Preparing for Windows 7 Migration
sponsored by Dell, Inc. and Intel®
VIDEO: With XP support sunsetting, customers are concerned about data migration, hardware limitations, compatibility and integration of existing applications and licensing issues associated with upgrading to Windows 7.
Posted: 11 Dec 2009 | Premiered: 11 Dec 2009

Dell, Inc. and Intel®
76 - 100 of 131 Matches Previous Page    2 3 4 5 6    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement