Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
1 - 25 of 833 Matches Previous Page  |  Next Page
The Role of Automation in Optimizing Network Performance and Security
sponsored by FireMon
WHITE PAPER: As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

FireMon

Ransomware: Defending Against 5 Major Types
sponsored by Commvault
WHITE PAPER: Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Commvault

The Security Benefits of Prioritizing Critical Data Assets
sponsored by InteliSecure
WHITE PAPER: Do you know what your critical data assets are? This 6-part white paper explores how to define your critical data assets so you can save time and money, all while improving your security posture.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

InteliSecure

Meeting Top Data Protection Challenges
sponsored by Avnet
WHITE PAPER: This white paper explores a strategy that can help you meet top data protection challenges, including cloud security, GDPR requirements, and ransomware attacks.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

Avnet

How to Create a Cybersecurity Policy for Your Organization
sponsored by HelpSystems
WHITE PAPER: Discover a 4-step plan to build a cybersecurity policy for your organization. As a bonus, uncover additional resources to create a data breach response plan.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

HelpSystems

Achieve GDPR Readiness with Secure App and Data Delivery
sponsored by Citrix
WHITE PAPER: A Ponemon Institute study finds that most organizations do not feel prepared for the requirements of the GDPR. Discover how you can meet GDPR compliance through application security, contextual access, and more.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Citrix

The Race to Meet GDPR Compliance
sponsored by HyTrust
WHITE PAPER: No matter where you are in the world, if you do business within the EU, you need to be prepared for GDPR compliance. This white paper provides an overview of the GDPR so you can get ready.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

HyTrust

Compliance As Code - A Visual Guide
sponsored by Flux7
WHITE PAPER: Discover how to automate compliance processes and track the configuration of AWS, an important resource for development, production, and security teams. Plus, learn how to easily customize 6 common AWS Managed Config Rules.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Flux7

Threat Research Report: The Anatomy Of A Ransomware Attack
sponsored by Exabeam
WHITE PAPER: This extensive research report explains ransomware behavior and how you can protect your network. Inside you will gain access to a ransomware cheat sheet and a glossary of security terms.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Exabeam

How Machine Data Supports GDPR Compliance
sponsored by Splunk
WHITE PAPER: Discover an overview of the GDPR and explore how machine data can help you meet the core requirements. Uncover the 3 ways machine data can help support your GDPR compliance program.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Splunk

Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

How to Enhance AWS Security
sponsored by Splunk
WHITE PAPER: Here, you'll uncover guidance on enhancing AWS platform security, to quell data protection concerns. Access now to see how AWS can deliver top-notch security, as well as facilitate an adaptive environment armed with the actionable insights needed to help thwart and prevent future threats.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Splunk

Product Overview: 30 Minutes to a More Secure Enterprise
sponsored by Cisco Umbrella
WHITE PAPER: DNS-layer security offers a first line of defense for your company – DNS request proceed internet activity, after all. But which DNS security is right for you? In this product overview, discover how implementing Cisco Umbrella can help you improve your company's security.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Cisco Umbrella

The Top 5 DevOps Challenges
sponsored by Delphix
WHITE PAPER: The key to deploying DevOps is data management. IT pros need data for their environments, but that need grows exponentially when it comes to DevOps. But this is just the tip of the iceberg. Read on to discover the top five challenges halting your DevOps progess.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

Delphix

How to Use Detection and Response to Reduce Business Risk
sponsored by Dell SecureWorks
WHITE PAPER: Use this white paper to learn how you can reduce the impact of threats to your organization by leveraging security monitoring systems to improve response times, proactively respond to breaches, and more.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

Dell SecureWorks

Using Compliance as a Leaping Pad: Moving on From the "Opportunistic" Stage
sponsored by Dell SecureWorks
WHITE PAPER: Explore how enterprises in the 'opportunistic' stage of security management can build upon existing compliance infrastructure. Learn how to use risk management to your advantage, grow the reach of your security systems, and more.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

Dell SecureWorks

Securing the Evolving Enterprise Network: Inside and Out
sponsored by Aruba Networks
WHITE PAPER: What is tue current state of network security and how can it be improved? This paper from the Enterprise Strategy Group answers this by surveying current network security needs and the problems causing them, as well as why you should consider "closed-loop" network security.
Posted: 28 Jun 2017 | Published: 28 Apr 2017

Aruba Networks

Key Issues for E-Discovery and Legal Compliance
sponsored by Smarsh
WHITE PAPER: Managers are often worried their organizations will be sued at some point, but most aren't adequately prepared to deal with e-discovery issues. In this Osterman Research report, uncover insight from the results of an in-depth survey of decision makers and influencers at mid-sized and large organizations.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Smarsh

The Public Sector Guide to Text Messaging Policy and Retention 2017 Edition
sponsored by Smarsh
WHITE PAPER: This white paper explores how to protect against the risks associated with text messaging by using a cloud-based archiving platform. Learn how to develop a smart text message policy and retention strategy that enables you to respond readily to open records requests or other e-discovery needs.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Smarsh

Software Asset Management: Critical for Mitigating Non-Compliance Risks
sponsored by Flexera Software
WHITE PAPER: This IDC white paper defines software asset management and emphasizes the factors driving its importance. Uncover best practices for mitigating the risks of inefficient software portfolio management and addressing 3 key priorities, namely app security, cost management, and quality of service.
Posted: 16 Jun 2017 | Published: 28 Feb 2017

Flexera Software

How to Drive Business Innovation in Financial Services with a Service-Aware Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: In an era when customers expect everything instantly, having IT systems that can adapt is critical. But many financial firms have IT infrastructures that are lagging behind. Learn how adopting new technologies like a service-aware network and DevOps can help firms improve performance, lower costs, and more.
Posted: 12 Jun 2017 | Published: 01 Jan 2016

Juniper Networks, Inc.

When Software Goes Rogue
sponsored by BDNA
WHITE PAPER: How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.
Posted: 02 Jun 2017 | Published: 31 May 2017

BDNA

Information Governance: Protect Your Company's Assets
sponsored by Box
WHITE PAPER: This white paper explores how to leverage the cloud content management platform from Box to implement a sound information governance program for you organization. Discover how to reduce risks and gain control over who can see and use information and how it is kept.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Box

The Importance of Incident Management Services
sponsored by Dell SecureWorks
WHITE PAPER: The worst time to realize you are not prepared for a security incident is during a breach. Without a proven response plan or strategy, stressed personnel must make crucial decisions without a clear sense of order and priority. Discover how to prepare your enterprise for a security incident in this white paper.
Posted: 09 Mar 2017 | Published: 30 Dec 2016

Dell SecureWorks

Managed Detection and Response
sponsored by Dell SecureWorks
WHITE PAPER: Being resilient to a threat from an advanced adversary is dependent on your organization's integrated capabilities to quickly detect them and respond. In this white paper, learn how you can employ and tune the security tools at your organization to combat today's threats.
Posted: 08 Mar 2017 | Published: 30 Dec 2016

Dell SecureWorks
1 - 25 of 833 Matches Previous Page    1 2 3 4    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement