Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
1 - 25 of 875 Matches Previous Page  |  Next Page
Economics of DDoS Attacks
sponsored by Arbor Networks
WHITE PAPER: DDoS attacks are cheaper than ever for the perpetrator, extremely lucrative for the attack service provider, and financially devastating for the target. Read this white paper to gain insight into DDoS attacks to prevent your company from having to pay the steep fines.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Arbor Networks

Check Your Armor: What's Your Most Vulnerable Cybersecurity Spot?
sponsored by Simeio
WHITE PAPER: When a company experiences a data breach, hack or other compromise to infrastructure or assets, the company does not realize all of the risk mitigation steps that were overlooked. This white paper reveals a comprehensive identity checklist to ensure your company does not fall victim to a data breach in the first place.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Simeio

PCI Compliance with Unified Security Management
sponsored by AlienVault
WHITE PAPER: Because organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DDS 3.2.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AlienVault

Complying with GDPR: What All Organizations Need to Know
sponsored by Absolute
WHITE PAPER: With GDPR rapidly approaching, companies are now facing the "Big 3": tough reporting, more responsibility, and bigger fines. Explore this white paper to gain a better understanding of GDPR regulations as well as a breakdown of the new penalties, the implications of BYOD and more.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Absolute

The Stakes Have Changed, Have You? 20 Years of DDoS Attacks Targeting Business
sponsored by Arbor Networks
WHITE PAPER: According to Arbor Network's Worldwide Infrastructure Security Report, 93% experienced application layer-attacks and 56% experienced multi-vector DDoS attacks. This white paper reveals how DDoS attacks have evolved and changed over time.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Arbor Networks

5 Steps to Implement & Maintain PCI DSS Compliance
sponsored by AlienVault
WHITE PAPER: Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

Enterprise Endpoint Security Performance Benchmarks
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This white paper reveals an endpoint security report comparing 5 security products based on 17 benchmark performance metrics to assess product performance.
Posted: 18 Oct 2017 | Published: 10 Feb 2017

Symantec & Blue Coat Systems

What You SIEM is What You Get
sponsored by AlienVault
WHITE PAPER: A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can forgo challenges and implement a successful SIEM platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

Threat Intelligence Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

2017 Veritas GDPR Report Chapter 1
sponsored by Veritas
WHITE PAPER: According to the Veritas 2017 GDPR Report, 86% of organizations worldwide are concerned that a failure to adhere to the upcoming GDPR could have a major negative impact on their business.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Veritas

The 4 Critical Areas You Must Address for Cloud Security
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: As companies grapple with the demands imposed by this shifting security landscape, it's critically important to consider the best risk mitigation steps to take. Dive into this white paper to uncover the 4 most commonly exposed risk points for cloud security.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Symantec & Blue Coat Systems

7 Features You'll Find in the Most Advanced DLP Systems
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Cloud services and mobile devices have made the challenges of safeguarding company data even more severe. Explore this white paper to find 7 key features to look for when evaluating a DLP system for your company.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Symantec & Blue Coat Systems

Anti-Virus Comparative
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Uncover results from the Malware Protection Test and the Exploit Test to compare 7 endpoint security vendors.
Posted: 16 Oct 2017 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

GDPR Strategy Guide
sponsored by Veritas
WHITE PAPER: The GDPR obliges businesses to understand and map how personal data flows throughout their organization in the form of Article 30 record. Jump start your compliance journey with this Veritas GDPR Strategy Guide to Article 30 creation.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Veritas

The Buck Stops Where?
sponsored by BitSight
WHITE PAPER: By 2020, Gartner estimates that 75% of Fortune 500 companies will treat vendor risk management as a board-level initiative to mitigate brand and reputation risk. In this white paper, gain insight into how data breaches are affecting both large and small businesses and how these businesses can mitigate their risks of future data breaches.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

BitSight

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Cloud apps introduce a new threat vector, with lots of credentials floating around that provide direct access to business critical data. This white paper provides planning strategies for adopting cloud apps as well as information on managing the human factor.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Symantec & Blue Coat Systems

Why Data Protection Is the Cornerstone of Modern Enterprise Security
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: According to IDC, by 2020, the amount of digital data is expected to reach 44ZB. In this white paper, explore various trends in data protection and security as well as an information-centric approach to data protection.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Symantec & Blue Coat Systems

Extend Your DLP to the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: With the rise of the cloud, your sensitive and compliance related data is at risk now more than ever. Find out how integrating your on premise Data Loss Prevention with CASB technology can enhance your cloud security.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Symantec & Blue Coat Systems

6 Steps for Building a Robust Incident Response Function
sponsored by IBM Resilient
WHITE PAPER: 42% of cyber security professionals say their organization ignores a significant number of security alerts because they can't keep up with the volume, according to Enterprise Strategy Group. This white paper discloses 6 steps for building a robust incident response function to ensure your organization keep up with the high security alert volume.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

IBM Resilient

Why You Need to Control Shadow IT, Not Just Discover it
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: The rapid, often uncontrolled, growth in the adoption of cloud apps creates a need for improved visibility – it's impossible to control what you cannot see. Read this white paper to uncover how to ensure your organization's safe migration to the cloud.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

Symantec & Blue Coat Systems

Amazon Web Services: Risk and Compliance
sponsored by Amazon Web Services
WHITE PAPER: Key into this white paper to explore a basic approach to evaluating AWS controls as well as AWS-specific information around general cloud computing compliance questions.
Posted: 11 Oct 2017 | Published: 31 May 2017

Amazon Web Services

5 Practical Ways to De-Risk Your Big Projects
sponsored by Energized Work
WHITE PAPER: Every project carries risk, and if it doesn't, it's probably not going to add much value to your business. Learn how to effectively manage goals, communication, and user acceptance when undergoing complex digital business projects.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Energized Work

Enhance Your Security & Compliance for Amazon Web Services
sponsored by CloudPassage
WHITE PAPER: As enterprises move applications from traditional data centers to a public or hybrid cloud environment, the security model needs to change. This white paper explores how you can boost your AWS security to keep up with this change.
Posted: 10 Oct 2017 | Published: 31 Dec 2016

CloudPassage

Proofpoint Threat Response
sponsored by Proofpoint, Inc.
WHITE PAPER: How can you prevent security alerts and incidents from escalating into full-blown breaches? In this white paper, gain insight into the benefits of a threat response platform, and see how you can use it to prioritize and execute response actions.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Proofpoint, Inc.

Architecting for HIPAA Security and Compliance on Amazon Web Services
sponsored by Amazon Web Services
WHITE PAPER: AWS customers with HIPAA compliance requirements have a great deal of flexibility in how they meet encryption requirements for PHI. In this white paper, uncover HIPAA privacy and security rules and learn techniques for meeting compliance requirements.
Posted: 09 Oct 2017 | Published: 30 Sep 2017

Amazon Web Services
1 - 25 of 875 Matches Previous Page    1 2 3 4    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement