Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
1 - 25 of 1187 Matches Previous Page  |  Next Page
Building a Vendor (IT) Risk Management Program
sponsored by BitSight
WHITE PAPER: Understand a vendor's security posture without requiring expensive site visits and penetration tests. Assess your vendors more frequently and focus efforts on those who have serious security issues.
Posted: 29 Jun 2016 | Published: 28 Apr 2016

BitSight

Neutralize Emerging Threats: Reducing the Time to Discover and Recover Transcript
sponsored by Intel Security
WHITE PAPER: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Published: 01 May 2016

Intel Security

Komerční bankaReducing logins from malware-infected endpoints by90 percent in just three months
sponsored by IBM
WHITE PAPER: Learn about KB's security struggles and how they were able to mitigate malware attacks with advanced fraud and malware protection. They are now able to detect, block and remediate infections and detect phishing threats before damage can be done to their enterprise.
Posted: 28 Jun 2016 | Published: 01 May 2016

IBM

HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: Learn the essentials of formulating a mature information security program from this white paper, which will clarify the major points of contention surrounding the HITRUST Common Security Framework (CSF) Assurance Program. Access now to obtain answers to 20 FAQ to bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

Breach Response: Preparing for the Threat; Controlling the Chaos
sponsored by AllClear ID
WHITE PAPER: Examine past breaches, in this report, to learn the tangible benefits of being well-prepared for a cyber attack. Other benefits, like good data governance and responsible stewardship, are less tangible, but inspire confidence and can reinforce your good reputation. Discover how to emerge from every data breach unscathed, public image intact.
Posted: 28 Jun 2016 | Published: 01 Oct 2014

AllClear ID

Net Diligence Cyber Claims Study 2014
sponsored by AllClear ID
WHITE PAPER: This study helps you risk understand the true impact of data insecurity by consolidating claims data from multiple insurers. The combined pool of claims is sizable enough that it allows us to ascertain real costs and project future trends.
Posted: 28 Jun 2016 | Published: 31 Dec 2014

AllClear ID

The Cost of Unintentional Insider Threat
sponsored by Forcepoint
WHITE PAPER: A high rate of Unintentional Insider Threats (UIT) sheds light on the demands of today's workplace culture in the United States. Work cultures are unlikely to change anytime soon, but there are tools and programs that can help any work environment with a UIT problem. To find out more, read the report.
Posted: 28 Jun 2016 | Published: 13 Jan 2016

Forcepoint

BitSight Global View
sponsored by BitSight
WHITE PAPER: This report shows you the security performance results of 250 random organizations per country from the U.S., the U.K., Singapore, Germany, China and Brazil during May 1, 2015 until May 1, 2016. It can help your organization's security stance as you move forward into new, global markets.
Posted: 28 Jun 2016 | Published: 01 May 2016

BitSight

Don’t Let “Trusted” Vendors Become Cyber-Breach Enablers
sponsored by BitSight
WHITE PAPER: Learn how to evaluate vendors' security ratings simply and effectively. Police vendors entrusted with handling your sensitive data and greatly enhance your vendor risk management program no matter where it is on the maturity curve.
Posted: 28 Jun 2016 | Published: 01 May 2016

BitSight

Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 27 Jun 2016 | Published: 01 May 2016

Intel Security

UK’s Hottest Banking FraudSchemes
sponsored by IBM
WHITE PAPER: Leading cybersecurity authority Limor Kessem teaches you top fraud threats to UK banking institutions and the impact cybercrime is having on them today. You'll learn top cybercrime trends and the scale at which these practices are growing.
Posted: 27 Jun 2016 | Published: 01 May 2016

IBM

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
WHITE PAPER: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 24 Jun 2016 | Published: 01 May 2016

Citrix

EMEA: Rethinking the Cyber Security Disconnect to Save Money
sponsored by VMware
WHITE PAPER: Discover five ways you can improve your security posture today and instruct employees on more secure data handling. Learn why it's important for business leaders in Africa, Europe, and the Middle East to understand cyber security as a top priority and ultimately save money in mitigating threats rather than reacting to them.
Posted: 24 Jun 2016 | Published: 01 May 2016

VMware

Top 10 Reasons to choose EMC Data Protection Solutions
sponsored by Richardson Eyres
WHITE PAPER: Learn 10 reasons why changing your data protection platform to enable efficiency and TCO is a must. Discover enterprise-class data protection across on premise, virtualized, hybrid, and cloud consumption models.
Posted: 23 Jun 2016 | Published: 01 May 2016

Richardson Eyres

The Axway MFT Solution Transcript
sponsored by Axway
WHITE PAPER: It's critical your organization implements MFT to manage and secure the giant wave of data moving forward. MFT is innovating, securing and optimizing business for the future. Whether your organizational value is banking transactions, trades, manufacturing, etc., MFT can increase customer satisfaction and engagement.
Posted: 23 Jun 2016 | Published: 01 May 2016

Axway

Axway Use Cases- Transcript
sponsored by Axway
WHITE PAPER: Learn how a globally recognized watch manufacturer is maintaining its brand equity and commerce with global partners. See how they optimized the transfer, communication and security of information from HQ to their partners.
Posted: 22 Jun 2016 | Published: 01 May 2016

Axway

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

IBM Security Trusteer Pinpoint Detect Solution Brief
sponsored by IBM
WHITE PAPER: You need a fundamentally different approach to detecting fraud that will also decrease false positives. Discover how to build fraud detection based on visibility, global threat intelligence and agility. Simplify your approach and accurately identify fraud throughout the entire fraud lifecycle.
Posted: 21 Jun 2016 | Published: 01 May 2016

IBM

Analyze This
sponsored by SAS
WHITE PAPER: See how other organizations define security analytics and why you should consider its implementation to better optimize your organization. Learn how you can assess security performance to make better spending and policy decisions.
Posted: 21 Jun 2016 | Published: 01 May 2016

SAS

IBM Security Trusteer Fraud Protection Suite solution brief
sponsored by IBM
WHITE PAPER: Discover more accurate fraud detection and gain greater visibility and adaptability across the fraud management lifecycle.
Posted: 21 Jun 2016 | Published: 01 May 2016

IBM

A Comprehensive, Innovative Approach to Mobile Security
sponsored by Unisys
WHITE PAPER: Because of new mobile threat vectors, security at the device-level is no longer enough. Discover how to strengthen your mobile endpoints from the inside-out with software-defined security, securing mobile data along the entire path to the destination server.
Posted: 20 Jun 2016 | Published: 30 Sep 2015

Unisys

Re-Thinking Your Data Flow Transmission for Security Risk and Compliance
sponsored by Axway
WHITE PAPER: A comprehensive managed file transfer solution provides off-the-shelf integration with common security products and end-to-end visibility into and monitoring of file transfers. It will help you ensure the rapid onboarding of new customers and partners, as well as governing interactions with trading partners.
Posted: 20 Jun 2016 | Published: 01 May 2016

Axway

Is your business risking a USD 100 million loss?
sponsored by IBM
WHITE PAPER: Learn how to safely replicate and archive data to enable your end users while discouraging data loss. Implement technologies that give you greater visibility into your data so nobody in your organization makes the next $100 million mistake.
Posted: 17 Jun 2016 | Published: 01 May 2016

IBM

‘PowerShell’ Deep Dive: A United Threat Research Report
sponsored by Carbon Black
WHITE PAPER: Learn more about PowerShell and how cybercriminals are using it to expedite their criminal activities. This report outlines several techniques attackers use to leverage PowerShell to gain access to organizations' endpoints and provides suggestions on how security teams can detect, prevent and respond to such attacks.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black

Stop Ransomware with Carbon Black
sponsored by Carbon Black
WHITE PAPER: Re-imaging security methods will never be the right solution to this problem. Learn about the tools imperative in preventing, detecting and remidiating randsomeware threats to your endpoints. Get greater visibility through continuous monitoring throughout your whole network.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black
1 - 25 of 1187 Matches Previous Page    1 2 3 4    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement