Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk ManagementWhite Papers (View All Report Types)
1 - 25 of 745 Matches Previous Page  | Next Page
Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER: This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011

Symantec Corporation

Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper features threat-aware IAM software that offers centralized security management across physical and virtual applications.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

IBM

A Risk Management Approach to HITECH
sponsored by Symantec Corporation
WHITE PAPER: This exclusive resource describes the challenges of security and privacy in the healthcare environment, discussing how you can best assess risk, prevent data loss, and secure critical systems with minimal impact on the end user or the quality of patient care.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Symantec Corporation

Securing 24x7 Operation of Clinical IT Systems
sponsored by Symantec Corporation
WHITE PAPER: This brief white paper highlights 6 risk management and compliance best practices to help HCOs avoid strict HIPAA violations and fines.
Posted: 23 Apr 2014 | Published: 31 Dec 2013

Symantec Corporation

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014

Cisco Systems, Inc.

Avoid HIPAA Compliance Violations Amid the Rise of BYOD
sponsored by Imprivata
WHITE PAPER: This expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Imprivata

A Guide to Data Privacy for Business and IT Executives
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explains the latest global government efforts in enforcing stronger data privacy laws. Click now to uncover 6 data protection recommendations to help you mitigate the risks of information sharing and prevent regulatory and market sanctions.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

IntraLinks, Inc

Design Security Policies For #GenMobile
sponsored by Aruba Networks
WHITE PAPER: This white paper highlights the 4 areas that must be addressed when providing secure, reliable access to business applications for mobile users. Click through to explore the essential tools you need for this strategy.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

Aruba Networks

Encryption Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

Sophos, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Take a Facts First Approach to E-Discovery
sponsored by Exterro
WHITE PAPER: This white paper delves into the e-discovery challenges faced by today's enterprises and provides practical steps for applying a "facts first" approach that both exceeds court expectations and reduces discovery costs.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

Exterro

Websense 2014 Threat Report, Websense Security Labs
sponsored by Websense
WHITE PAPER: In preparing the Websense® 2014 Threat Report, Websense Security Labs™ researchers examined cybersecurity through the lens of a seven-stage kill chain and attack model. Learn how to apply the seven-stage "kill chain" and attack model to your cybersecurity.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Websense

The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration
sponsored by IntraLinks, Inc
WHITE PAPER: This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Transforming Information Security: Future-Proofing Processes
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Adapting your security strategy to today's expanding threat landscape can be a daunting task. This guide explores strategies for enhancing your security strategy and how to adapt to the current threat landscape.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Advanced Intelligence (AI) EngineTM
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief guide takes an in-depth look at one company's SIEM solution and how it employs log and event management to prevent cyber-attacks.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

LogRhythm, Inc.

The Top 10 Reports for Managing Vulnerabilities
sponsored by Qualys
WHITE PAPER: This paper introduces 10 of the most important vulnerability management, organized across the four key steps in the vulnerability management lifecycle.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Qualys

Top 8 Secure Messaging Policy Best Practices
sponsored by TigerText, Inc.
WHITE PAPER: In this white paper, explore 8 valuable recommendations on how to develop a secure text messaging policy to ensure data security and compliance.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

TigerText, Inc.

Cisco 2014 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Cisco Systems, Inc.

NSS Labs: Breach Detection System Comparative Analysis
sponsored by Sourcefire
WHITE PAPER: This informative analysis tests some top breach detection technologies and compares the standards of their security and performance.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Sourcefire

The Critical Incident Response Maturity Journey
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 16 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Protecting Privacy in Cross-Border Litigation
sponsored by Exterro
WHITE PAPER: For U.S.-based, multinational organizations, privacy statutes in foreign nations have become a minefield. This paper discusses the importance of proactively managing the use of ESI based in foreign countries during e-discovery.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

Compliance Field Guide: Reducing Costs in an Increasingly Regulated World
sponsored by Symantec Corporation
WHITE PAPER: This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.
Posted: 24 Apr 2014 | Published: 31 Jan 2014

Symantec Corporation
1 - 25 of 745 Matches Previous Page    1 2 3 4    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement