Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
1 - 25 of 979 Matches Previous Page  |  Next Page
Unlocking Business Success The Five Pillars of User Risk Mitigation
sponsored by Forcepoint
WHITE PAPER: This white paper shows you how to embrace a BYOD policy for your organizations and best practices for visibility into all user activity. Access now to gain a formidable defense against both malicious and unintentionally harmful insiders.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Forcepoint

FortinetCSO_QP
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper analyzes today's advanced threats and today's cybersecurity environment to show you what organizations are doing right and what they are doing wrong. Access now to learn how to effectively counter threats by preventing, detecting and mitigating malware and other malicious actors.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Executive_Summary_DefendAgainstTheUndetected
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, you'll discover why you network must have a comprehensive internal and external solution designed to protect your perimeter, your core, your endpoint and everything else in-between. Access now to learn how you can more effectively detect, prevent and remediate harmful actors.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Six Steps To A Better Security Strategy
sponsored by AllClear ID
WHITE PAPER: In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.
Posted: 29 Apr 2016 | Published: 22 Jan 2016

AllClear ID

Protecting_Against_APTs_minibook
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper helps you better understand the security challenges that businesses face today. Access now to learn insight from a range of industry analysts, consultants and hands-on experts on how they believe you should tackle your security problems.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

How to Protect Patient Data in the Cloud - Best Practices Recommedations
sponsored by Digital Guardian
WHITE PAPER: This white paper shows you best practices for applying DLP to the cloud.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Digital Guardian

Cybersecurity and Data Theft Prevention
sponsored by Forcepoint
WHITE PAPER: This white paper provides a non-technical overview on cybersecurity and provides topics that every CEO should consider. Learn how to identify the critical data at the heart of your organization and conduct an in-depth assessment of your current security posture.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Cyber Dwell Time and Lateral Movement
sponsored by Forcepoint
WHITE PAPER: Today's organizations should not only focus on keeping hackers out, but also remediating damages once a breach occurs. This white paper shows you how to best deal with cyber attackers once a breach happens and how to keep attackers afraid to come back.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Forcepoint

SG-ISFW-Fortinet
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper teaches you about internal segmentation firewalls that can provide your organization with an additional layer of protection inside your network perimeters. It protects critical assets while enhancing their ability to detect breaches and shorten mitigation delays.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Forrester Report -Building_An_Effective_Breach_Detection_And_Response_Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper shows you the benefits of implementing sandbox solutions to meet your security demands. Modern sandboxed are able to virtually replicate operating environments, execute suspicious code and observe behavior. Access now to best quell sophisticated attackers and prevent future ones.
Posted: 28 Apr 2016 | Published: 31 Oct 2015

Fortinet, Inc.

Who's Spying on You?
sponsored by Kaspersky Lab
WHITE PAPER: Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don't get caught in the crossfire. Read our special report "Who's spying on you?" to find out more.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Kaspersky Lab

Build A High-Performance, Customer-Obsessed Security Organization
sponsored by AllClear ID
WHITE PAPER: This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.
Posted: 28 Apr 2016 | Published: 09 Feb 2016

AllClear ID

Total Economic Impact of IBM Security Network Protection (XGS), Forrester Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This white paper examines the benefits you will realize by deploying next generation intrusion prevention. Access now to discover how next-gen IPS could impact your organization.
Posted: 27 Apr 2016 | Published: 01 Feb 2016

IBM

Advanced Threat Protection Buyer's Guide
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper helps you assess your current security posture against a baseline set of requirements. Access now to ensure you're using the right solution set to fit your organization.
Posted: 27 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Protect Your Network From the Inside-Out: Internal Segmentation Firewall (ISFW)
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper teaches you about Internal Segmentation Firewalls (ISFW), which can be deployed rapidly with minimum disruption to business operations. Access now and learn how to gain instant visibility and protection for your internal network.
Posted: 27 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Building an Enterprise Security Architecture
sponsored by Forcepoint
WHITE PAPER: This ESG report outlines the current security problems faced by organizations across industries and shows you new methods to tackle them. Access now to learn how you can get an enterprise security architecture built for integration, central command and control, distributed enforcement and comprehensive monitoring.
Posted: 27 Apr 2016 | Published: 01 Mar 2016

Forcepoint

The human factor research report 2016
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper takes an in-depth look at today's socially engineered attacks, like phishing scams, to help you take action against the wide range of threats. Access now to learn how you can deploy automated incident response capabilities to quickly identify infections.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

How Credential Phishing is Changing - How to Stop It
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper teaches you the anatomy of a phishing attack and why they are so effective. Access now to learn how today's phishing attacks are concocted so you can better spot them before they cause long lasting harm to your organization.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

Three guiding principles for data security and compliance
sponsored by IBM
WHITE PAPER: This white paper talks about the world's growing focus on data protection and what current challenges organizations face. Access now to discover why you need a comprehensive approach to data security and learn three guiding principles to achieve better security compliance.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

IBM Security Guardium Vulnerability Assessment
sponsored by IBM
WHITE PAPER: This white paper teaches you how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Access now to identify exploitable security holes in your database.
Posted: 26 Apr 2016 | Published: 01 Apr 2016

IBM

Comprehensive data protection for physical, virtual and cloud infrastructures
sponsored by IBM
WHITE PAPER: This white paper talks about steps you should take to best protect your virtualized cloud data.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

Arming the front line
sponsored by IBM
WHITE PAPER: This white paper teaches you why antivirus software and firewalls on consumer endpoints aren't sufficient to combat today's sophisticated hacking tools. Access now to learn common misconceptions about endpoint protection and what unexpected benefits you can realize by extending protection to customer endpoints.
Posted: 26 Apr 2016 | Published: 01 Oct 2015

IBM

A Guide to Corporate Social Media Security
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper helps you understand this new kind of attack and develop a plan to protect your organization's reputation.
Posted: 25 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

IBM 2015 Cyber Security Intelligence Index for Information and Communication
sponsored by IBM
WHITE PAPER: This white paper outlines cyber attack incidents of organizations in the information and communications industry. Access now to learn about past trends of cyber criminals and what to look for in the future of cyber crime.
Posted: 25 Apr 2016 | Published: 31 Dec 2015

IBM

Executive_Summary_DefendAgainstTheUndetected
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper shows you a complete, cohesive automated framework that covers all parts of your network from cloud to the perimeter to the endpoints. Access now to learn the three elements you must focus on to ensure the security of your data.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.
1 - 25 of 979 Matches Previous Page    1 2 3 4    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement