Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk ManagementWhite Papers (View All Report Types)
101 - 125 of 735 Matches Previous Page  | Next Page
Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

Security Management 2.5: Replacing Your SIEM Yet?
sponsored by IBM
WHITE PAPER: This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.
Posted: 20 Mar 2014 | Published: 01 Feb 2014

IBM

Combating Cybercrime - A Collective Global Response
sponsored by ThreatMetrix
WHITE PAPER: This guide explores the current threat landscape and how businesses are combating cybercrime on a global level.
Posted: 20 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

IBM Security Services Client Reference Guide
sponsored by IBM
WHITE PAPER: This in-depth guide explores essential case studies that will help you understand the evolving threat landscape and learn from your peers' compliance challenges.
Posted: 19 Mar 2014 | Published: 30 Nov 2013

IBM

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 19 Mar 2014 | Published: 31 Oct 2013

IBM

Stop Fraud Before it Happens
sponsored by Verizon
WHITE PAPER: This white paper features a healthcare fraud management solution that offers detection, prevention, and management tools to better identify threats before they strike.
Posted: 19 Mar 2014 | Published: 31 Dec 2012

Verizon

Five Essentials for Better Workforce Continuity – Integrating the Human Side into your Strategy
sponsored by IBM
WHITE PAPER: In this informative paper, learn about the five essential components to workforce continuity, in case of an enterprise emergency, and learn how to embrace the human element of business continuity planning.
Posted: 18 Mar 2014 | Published: 30 Nov 2013

IBM

Reducing the Cost and Complexity of Endpoint Management
sponsored by IBM
WHITE PAPER: This guide explores key tactics for thwarting cyber-attacks, how to protect your system, and the benefits of utilizing endpoint management.
Posted: 18 Mar 2014 | Published: 30 Sep 2013

IBM

9 Simple (but Critical) Tips for Effective Patch Management
sponsored by Dell, Inc.
WHITE PAPER: This resource offers 9 patch management best practices. Click now to reveal a comprehensive solution that will help you achieve effective patch management without suffering high costs.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Dell, Inc.

IBM Security Services Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This guide asks some key questions about the current threat landscape and analyzes cyber-attacks across the world.
Posted: 18 Mar 2014 | Published: 31 Jul 2013

IBM

Healthcare Fraud Management: Solutions for Identification and Intervention
sponsored by Verizon
WHITE PAPER: This white paper features a healthcare fraud management solution that leverages predictive analytics to identify potentially fraudulent claims and prevent improper payment before they occur.
Posted: 18 Mar 2014 | Published: 30 Nov 2011

Verizon

Managing Non-Microsoft Updates
sponsored by Secunia
WHITE PAPER: This guide focuses on the importance of security patches and how you can easily update your configuration from one centralized location.
Posted: 18 Mar 2014 | Published: 31 Dec 2012

Secunia

The optimization of everything: OTC derivatives, counterparty credit risk and funding
sponsored by IBM
WHITE PAPER: In this white paper, learn about risk management practices and analytics that can aid in the optimization of everything – from OTC derivatives to counterparty credit risk to funding.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

IBM

IT Security: Midsize Businesses Face Enterprise- Caliber Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: As cybercriminals are carrying out sophisticated, enterprise-grade attacks on midsize businesses, ensuring system security within those smaller firms is more important than ever. This brief whitepaper explores the flaws in many midmarket organizations' IT security and why they are being targeted.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

Hewlett-Packard Company

A New Vision for Management of Fraud and Improper Payments
sponsored by Verizon
WHITE PAPER: This white paper explores the negative impact fraud has on healthcare benefits programs. Read on to learn 5 fraud management best practices and to discover a comprehensive SaaS platform that offers real-time security assessment.
Posted: 17 Mar 2014 | Published: 31 Oct 2011

Verizon

Developing an Information Governance Strategy: An Osterman Research White Paper
sponsored by Rand Secure Data
WHITE PAPER: This resource homes in on the challenges of information governance and offers 13 key recommendations to help you improve information governance practices.
Posted: 17 Mar 2014 | Published: 28 Feb 2014

Rand Secure Data

The Importance of Reputation
sponsored by Hewlett-Packard Company
WHITE PAPER: This guide explores the inexplicable link between data and security, and lays out the current threat landscape in today's ever-changing IT world.
Posted: 14 Mar 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

Detecting Sophisticated Online Attacks with Streaming Analytics
sponsored by EMC Corporation
WHITE PAPER: Discover how RSA Web Threat Detection delivers actionable intelligence by leveraging big data to correlate anomalies and detect online threats in real time.
Posted: 13 Mar 2014 | Published: 31 Dec 2013

EMC Corporation

Sophisticated Attacks - The Four Things you Can do now to Help Keep Your Organization Safe
sponsored by IBM
WHITE PAPER: This guide takes a look at IT staff shortages and how managed security services providers (MSSPs) can help minimize issues with the technical skills dilemma.
Posted: 10 Mar 2014 | Published: 31 May 2013

IBM

Smarter Security Intelligence: Leverage Big Data Analytics to Improve Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper highlights how big data analytics can be utilized to react to security incidents, as well as predict, prevent and take real-time action.
Posted: 07 Mar 2014 | Published: 07 Mar 2014

IBM

Combat the Latest Security Attacks with Global Threat Intelligence
sponsored by IBM
WHITE PAPER: In this white paper, learn how to approach today's advanced threat landscape by first understanding the source of attacks, then developing threat intelligence to better detect and analyze new threats to help maximize defense efforts.
Posted: 06 Mar 2014 | Published: 30 Sep 2013

IBM

SANS WhatWorks in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization
sponsored by FireEye
WHITE PAPER: Cybercriminals are always looking for new ways to infiltrate your system, making it essential to have an effective intrusion prevention system (IPS). This white paper explores one company's IPS platform and how it can greatly enhance your system security.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

FireEye

Securosis Report: Replacing Your SIEM with Security Management 2.5 Yet?
sponsored by IBM
WHITE PAPER: This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.
Posted: 06 Mar 2014 | Published: 01 Feb 2014

IBM

Breaking Through the GRC Value Ceiling
sponsored by EMC Corporation
WHITE PAPER: This paper uses the RSA Archer GRC Reference Architecture to illustrate the value of operational technologies while acknowledging there is a ―Value Ceiling‖ for some niche operational tools, highlighting the missed opportunity for broader value.
Posted: 14 Mar 2014 | Published: 30 Sep 2013

EMC Corporation

IBM Reputational Risk Index
sponsored by IBM
WHITE PAPER: Access this white paper today to view the results of a survey of more than 1000 business continuity specialists and more than 1200 security practitioners, and learn how your peers are approaching modern DR and reputation management practices.
Posted: 11 Mar 2014 | Published: 31 Dec 2013

IBM
101 - 125 of 735 Matches Previous Page    3 4 5 6 7 8    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement