Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
101 - 125 of 853 Matches Previous Page  |  Next Page
Network-based Security: Global Visibility is the Difference
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Point security solutions aren't enough to keep up with increasingly diverse and sophisticated cyberthreats. Access this brief resource to learn how a network-based security strategy can detect threats and stop them before they affect your business.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Top 4 Cybercrime Trends
sponsored by IBM
WHITE PAPER: This report provides insight into the security issues of today's IT environment. While incidents around the globe are diverse, most of them share certain characteristics and recurring patterns. Uncover 4 trends to watch for.
Posted: 11 Mar 2016 | Published: 31 Dec 2015

IBM

A Guide to 12 CyberSecurity Metrics You/Your Vendors Should be Watching
sponsored by BitSight
WHITE PAPER: This white paper details 12 actionable metrics that can help you specifically assess how your organization is doing with its current cybersecurity.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

BitSight

13 Global Security Consultancies That Matter Most And How They Stack Up
sponsored by IBM
WHITE PAPER: This Forrester report details and analyzes the 13 most significant security consulting service providers and their offerings. Access now to learn more about how well these consultancies fulfill security standards to best select the right partner for your business.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

IBM

Stress Testing: A View from the Trenches
sponsored by SAS
WHITE PAPER: In this white paper, you will learn about various financial institutions and how well they are rising to the stress test challenge. See what areas are progressing and what areas still need to get up to speed.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

SAS

Financial Instruction Advantage and the Optimization of Information Processing
sponsored by SAS
WHITE PAPER: This white paper shows you a greater capability of model risk assessment. Avoid headline-grabbing risks and pressure from regulators by anticipating what's coming.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

SAS

eSentire Partner Program
sponsored by eSentire
WHITE PAPER: This white paper gives you a brief overview of the eSentire partner program and how becoming a partner will allow you to reach new customers, increase revenues, expand your portfolio and grow market share. Access now and learn about their program benefits, requirements and if it is the right fit for you.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

eSentire

Cyber Security Breakdown: What Legal Professionals Need to Know
sponsored by eSentire
WHITE PAPER: Be proactive against advanced cyber threats before they hit your organization. Access this resource now to learn how you can take the steps necessary to be fully protected.
Posted: 18 Apr 2016 | Published: 01 Feb 2016

eSentire

We’ve Been Breached- Now What?
sponsored by eSentire
WHITE PAPER: This white paper teaches you how to respond after a cyber threat becomes a cyber attack. Access now to learn how to eradicate cyber threats, repair infected systems and restore operations to normal after an attack occurs.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

eSentire

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: This white paper teaches you about managed file transfer and how it can help you meet increasing customer demands. Access now and learn how to create seamless customer experiences across your value chain and synchronize your business to become more secure, compliant and efficient.
Posted: 14 Apr 2016 | Published: 31 Dec 2013

IBM

Overcome the Attacker Advantage with McAfee Endpoint Security 10
sponsored by Intel Security
WHITE PAPER: This white paper shows you how to respond and manage the threat defense lifecycle and a provide collaborative, extensive framework to reduce the complexity of conventional multivendor environments.
Posted: 25 Mar 2016 | Published: 31 Dec 2015

Intel Security

Security attacks on industrial control systems
sponsored by IBM
WHITE PAPER: This white paper examines the history of industrial control systems (ICS), the susceptibility of these systems to certain attacks and how the systems can be defended.
Posted: 17 Mar 2016 | Published: 31 Oct 2015

IBM

Security trends in the manufacturing industry
sponsored by IBM
WHITE PAPER: This white paper shows you statistics about cyberattack in the manufacturing industry and how they resulted. Learn some manufacturing best practices and securements to better protect any exploitable weaknesses in your organization's infrastructure.
Posted: 16 Mar 2016 | Published: 29 Feb 2016

IBM

Security trends in the retail industry
sponsored by IBM
WHITE PAPER: In this white paper, you will learn about different methods hackers use to steal customer data as well as statistics showing what time of year attacks are most prevalent. Learn how to defend yourself against hackers and how to respond if a breach does take place in your network.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

IBM

Security trends in the healthcare industry
sponsored by IBM
WHITE PAPER: This white paper gives you the latest statistics on healthcare-related security breaches and how you can avoid becoming a statistic yourself by falling victim to attack. Learn about the most common cyberattacks against healthcare organizations and how to patch vulnerabilities you may have in your network.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

IBM

The price of loyalty programs
sponsored by IBM
WHITE PAPER: This white paper shows you how to implement a loyal program for your customers and minimize the chance of account breaches. Learn how to diligently monitor your network and how to detect signs of attacks.
Posted: 14 Mar 2016 | Published: 30 Nov 2015

IBM

Real-Time, Unified Endpoint Protection: A New Era in Incident Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper teaches you about the only endpoint protection platform that natively integrates prediction, prevention, detection and response. Save considerable time, money and energy while simultaneously improving your overall security posture.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

Replacing Antivirus, and Doing it Right: A CISO Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper shows you how to successfully execute a complete antivirus replacement. Access now and learn how to make a daunting task into a simple project with the right careful planning, frequent communication and stakeholder buy-in.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

Next Generation Endpoint Protection Buyer's Guide
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper teaches you about next-generation endpoint protection that can detect and prevent threats on endpoints using a unique behavior-based approach.
Posted: 08 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

A Smarter Approach to Retail Order Security
sponsored by Prelert
WHITE PAPER: Many of the platforms that online retailers use to catch security risks require manual human input to alert on issues, allowing unknown or unexpected problems to go undetected until it's too late. This brief resource describes how automated machine learning can help online retailers stay competitive in today's e-commerce landscape.
Posted: 25 Feb 2016 | Published: 25 Feb 2016

Prelert

Transcript: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WHITE PAPER: Gain deeper visibility into your network using anomaly detection alongside compliance/segmentation monitoring. Identify advanced attacks and protect the crown jewels on your network.
Posted: 25 Feb 2016 | Published: 27 Jan 2016

Lancope

Vulnerability Scanning Tips and Tricks
sponsored by Alert Logic
WHITE PAPER: This white paper teaches you the importance of performing regular scans to identify and reduce vulnerabilities. This is you guide to ensure your scans successfully complete and report properly.
Posted: 24 Feb 2016 | Published: 20 Aug 2015

Alert Logic

Vulnerability Response Best Practices
sponsored by Alert Logic
WHITE PAPER: This white paper gives you a step-by-step approach in responding to vulnerabilities with examples of breaches throughout. Learn how to prepare you network for an attack and how to lessen the potential for security flaws in your network.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Alert Logic

Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper outlines your responsibilities in managing your data in your cloud and gives you seven best practices to keep it secure.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

Alert Logic

4 Tips to Secure your Saas Environment
sponsored by Alert Logic
WHITE PAPER: This white paper gives you four tips that SaaS providers need to keep in mind at all times to keep their security ahead of the game and make sure your SaaS app delivers the value and safety your customers demand.
Posted: 19 Feb 2016 | Published: 27 Jan 2016

Alert Logic
101 - 125 of 853 Matches Previous Page    3 4 5 6 7 8    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement