IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk AssessmentWhite Papers (View All Report Types)
76 - 100 of 183 Matches Previous Page  | Next Page
How to create inherently secure communications
sponsored by ComputerWeekly.com
WHITE PAPER: In earlier times, if an enterprise presumed it had control over its network, and if it had few external connections or communication, it was feasible that the connections between operational computers probably were not an unacceptable risk.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

The 11 security commandments - Jericho Forum
sponsored by ComputerWeekly.com
WHITE PAPER: The Jericho Forum commandments define both the areas and the principles that must be observed when planning for a de-perimeterized future.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

How to handle requirements for risk assessment methodologies
sponsored by ComputerWeekly.com
WHITE PAPER: Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization.
Posted: 24 Oct 2011 | Published: 25 Nov 2010

ComputerWeekly.com

How to tackle risk taxonomy
sponsored by ComputerWeekly.com
WHITE PAPER: This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available.
Posted: 24 Oct 2011 | Published: 25 Nov 2010

ComputerWeekly.com

IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how security intelligence addresses these shortcomings and empowers organizations from Fortune Five companies to mid-sized enterprises to government agencies to maintain comprehensive and cost-effective information security.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

IBM

Delivering high quality applications faster with reduced risk & cost
sponsored by IBM
WHITE PAPER: Improve time to value and quality by reducing rework and cost through faster stakeholder consensus, increased productivity, better process automation, and anytime-anywhere decision support for application software. Download the paper for more information on delivering high quality applications faster with reduced risk & cost.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

The Real-World Benefits of SAP Safeguarding Services
sponsored by SAP America, Inc.
WHITE PAPER: This white paper introduces professional safeguarding services which can provide technical support and advice for ensuring IT projects go as planned. Inside, gain access to the thoughts and opinions of real-world users of the service.
Posted: 29 Jul 2011 | Published: 29 Jul 2011

SAP America, Inc.

Choosing a Cloud Provider with Confidence
sponsored by GeoTrust, Inc.
WHITE PAPER: In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.
Posted: 15 Jul 2011 | Published: 05 Jul 2011

GeoTrust, Inc.

Maintaining Continuous Compliance – a new best practice approach
sponsored by IBM
WHITE PAPER: When trying to achieve continuous compliance with internal policies and external regulations, organizations need to replace traditional processes with a new best practice approach and new innovative technology, such as that provided by IBM Tivoli Endpoint Manager.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

IBM

Taming the Data Demons
sponsored by IBM
WHITE PAPER: Taming the data demons: leveraging information in the age of risk explores the framework and advantages of a holistic approach to data risk management, and provides both IT and line-of-business executives with the "why" and "how" to begin putting an end-to-end data risk management program to work in your organization.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures
sponsored by Sybase, an SAP company
WHITE PAPER: Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk!
Posted: 17 Jun 2011 | Published: 15 Jun 2011

Sybase, an SAP company

SANS Institute: Oracle Database Security, What to Look for and Where to Secure
sponsored by Oracle Corporation
WHITE PAPER: To properly protect the information at the database layer there are a number of comprehensive measures that need to be taken. With this paper Tanya Baccum, SANS Institute analyst, examines these measures for holistically protecting Oracle database from inside out.
Posted: 08 Jun 2011 | Published: 08 Jun 2010

Oracle Corporation

The Next Generation of Cybercrime
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will educate you about a range of different security threats, as well as, the hackers that perpetrated these viruses. You will also receive a list of best practices for protecting your organization the right way.
Posted: 31 May 2011 | Published: 31 May 2011

Dell SecureWorks

2010 Endpoint Risk Assessment: Internal Vulnerabilities
sponsored by Promisec
WHITE PAPER: This study will show you the most common security issues that were found and how they were dealt with by the various organizations.
Posted: 23 May 2011 | Published: 23 May 2011

Promisec

Methodology for Information Quality Management
sponsored by Harte-Hanks Trillium Software
WHITE PAPER: This paper discusses how Trillium Software extends that principle to ensure services are driven by data governance defining the criticality and use for the data, and establishing roles and responsibilities within the business and IT to achieve business goals and objectives.
Posted: 10 May 2011 | Published: 10 May 2011

Harte-Hanks Trillium Software

The Systems Engineering Balancing Act: Choosing an Optimum Development Approach
sponsored by IBM
WHITE PAPER: This thought leadership white paper proposes a combination of requirements-driven, model-driven and test-driven approaches as a mechanism for delivering systems development projects at a reduced cost and risk.
Posted: 23 Mar 2011 | Published: 23 Mar 2011

IBM

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives
sponsored by ISACA
WHITE PAPER: Globalization and recent economic pressures have resulted in increased requirements for the availability, scalability and efficiency of enterprise information technology (IT) solutions.
Posted: 23 Mar 2011 | Published: 23 Mar 2011

ISACA

Smart Decision Making in the Era of New Financial Challenges
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to learn why the Monte Carlo modeling method provides a beacon of financial sanity and reliability at time when consumer confidence is at an all-time low and managers face new levels of accountability and keen public scrutiny in their decision-making.
Posted: 22 Mar 2011 | Published: 02 Mar 2009

Oracle Corporation

Balancing Social Networking with Network Security Objectives
sponsored by BlueCoat
WHITE PAPER: Social networking has achieved a level of popularity that requires reasonable access at work, but it is also sufficiently mature to bring value to many businesses. But safe social networking requires an aggressive and layered security strategy at the web gateway, as well as the definition of new usage policies and priorities from management and IT.
Posted: 04 Mar 2011 | Published: 04 Mar 2011

BlueCoat

Five Signs Your File Data is at Risk
sponsored by Imperva
WHITE PAPER: Persistent insider threats and regulatory compliance mandates make protecting sensitive file data a business requirement for virtually every organization. However, the sheer volume of file data and its rapid and continuous growth make it a challenge to secure properly.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

EIU Report: Preemptive Action: Mitigating Project Portfolio Risks in the Financial Services Industry
sponsored by Oracle Corporation
WHITE PAPER: This research report explains how to ensure long-term viability in the financial services industry by depending on your ability to invest wisely in projects, meet regulatory targets and avoid the costly and public failures that brought down so many other organizations in the financial services industry.
Posted: 31 Jan 2011 | Published: 31 Jan 2011

Oracle Corporation

How to Get Started with Enterprise Risk Management
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Enterprise Risk Management is a practice that has been around for decades, tracing its roots all the way back to the early 1970s. It garnered much attention in the early 2000s when the New York Stock Exchange required all of its listed companies to mandate their Audit Committees to “discuss policies with respect to risk assessment and management.”
Posted: 01 Dec 2010 | Published: 01 Dec 2010

RSA, The Security Division of EMC

Risk Management: Protect and Maximize Stakeholder Value
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.
Posted: 07 Oct 2010 | Published: 02 Feb 2009

Oracle Corporation UK Ltd

Risk Management: Protect and Maximize Stakeholder Value
sponsored by Oracle Corporation
WHITE PAPER: This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.
Posted: 01 Oct 2010 | Published: 02 Feb 2009

Oracle Corporation

Helping Enterprises Succeed: Responsible Corporate Strategy and Intelligent Business Insights
sponsored by SAP America, Inc.
WHITE PAPER: This Executive Insights paper describes how the combination of EPM and GRC solutions is now more critical than ever for business success. This document also discusses how EPM and GRC must be linked to business intelligence tools and supported by comprehensive services to ensure that the data generated is used appropriately.
Posted: 20 Sep 2010 | Published: 20 Sep 2010

SAP America, Inc.
76 - 100 of 183 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement