Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
101 - 125 of 891 Matches Previous Page  |  Next Page
Identifying Weak Security Links with Threat Intelligence
sponsored by Sourcefire
WHITE PAPER: Download this extensive white paper now to learn about how to fight back with threat intelligence. Also uncover details on current industry trends and find out where things will go from here.
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Sourcefire

IBM X-Force Threat Intelligence Quarterly
sponsored by Avnet
WHITE PAPER: This important white paper takes a look at how organizations dealt with the immediate aftermath of the Heartbleed announcement with large-scale mitigation strategies for ongoing protection.
Posted: 23 Dec 2014 | Published: 12 Aug 2014

Avnet

Managing Security Risks and Vulnerabilities
sponsored by Avnet
WHITE PAPER: Access this valuable white paper now to learn how to protect high-value assets and provide scalable, cost-effective, integrated security across the entire IT environment and much more.
Posted: 22 Dec 2014 | Published: 08 Jan 2014

Avnet

Email Archives: Why Old Solutions Aren't Sufficient for Modern Enterprises
sponsored by Mimecast
WHITE PAPER: This white paper examines the difficulties that organizations encounter as they seek a solution to ever-increasing volumes of stored emails and the need for faster, more flexible accessibility to this data.
Posted: 19 Dec 2014 | Published: 31 May 2013

Mimecast

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This informative white paper discusses how file sharing services are being used within enterprises; the benefits and risks that they bring; and the factors that organizations should consider in selecting an enterprise-grade service in order to ensure its security.
Posted: 19 Dec 2014 | Published: 30 Apr 2014

Mimecast

Integrating Document Control into your Core Business
sponsored by OpenText
WHITE PAPER: The following white paper explores the rationale, requirements, and collaborative benefits associated with an integrated approach to document control. Read on to learn how this technology can benefit your business as well.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

OpenText

Key Considerations in Moving to Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: This exclusive white paper offers up four crucial considerations to ensure a smooth transition to Office 365 and to allow for the same level of administration, security, and message hygiene you had with your on-premises implementation.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Defend web properties from modern threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Check out this white paper to discover the challenges of defending modern web properties from modern threats, as well as an application delivery controller (ADC) that works hand in hand with advanced malware protection and high-profile security products.
Posted: 16 Dec 2014 | Published: 31 Dec 2013

Citrix

Moving from Government to e-Government
sponsored by OpenText
WHITE PAPER: Read this white paper to learn the cost-cutting benefits of evolving into an e-government model. Read on to learn how one solution can make your transition faster and easier while protecting valuable and confidential data.
Posted: 16 Dec 2014 | Published: 24 Jul 2014

OpenText

The New Security Paradigm: Changes you Must Make
sponsored by Symantec Corporation
WHITE PAPER: This important white paper offers security resiliency as the paradigm shift that must occur, forcing you to rethink the way you approach security, utilize what you already have, identify the gaps, and move from reaction to prediction.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

Symantec Corporation

LexisNexis + Micron SSDs = Faster, More Reliable Big Data Analytics
sponsored by Micron Technology
WHITE PAPER: This white paper details LexisNexis' soltuion to big data storage performance.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

Micron Technology

A dangerous business? Enterprise risk forecasting
sponsored by IPL
WHITE PAPER: The following white paper will explore the common issues with risk assessment and how predictive KRIs may offer a solid solution. Learn how this technology works, what benefits they bring into the enterprise and more.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

IPL

CIO Spotlight: Controlling Data Risk In the BYOD Onslaught
sponsored by CommVault
WHITE PAPER: This exclusive paper lists 5 areas that support risk mitigation and data protection for BYOD. Read on to learn more.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

CommVault

Business Risk: Effective Technology Protecting Your Business
sponsored by Hewlett-Packard Company
WHITE PAPER: View this white paper to learn how you can drive down OPEX by refreshing your servers. By automating repetitive tasks and providing a single-pane-of-glass view into your infrastructure, you can reduce downtime costs by up to 60%. Read on to learn how new servers can protect your business from risk.
Posted: 02 Dec 2014 | Published: 13 Aug 2014

Hewlett-Packard Company

Websense® Security Labs™: 8 Security Predictions for 2015
sponsored by Websense
WHITE PAPER: This must-read resource from Websense presents the top 8 security predictions for 2015.
Posted: 01 Dec 2014 | Published: 18 Nov 2014

Websense

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

Cloud Infrastructure Security: It's Time to Rethink Your Strategy
sponsored by CloudPassage
WHITE PAPER: This white paper discusses why, in order to truly reap the benefits of the cloud, leaders need to rethink their approach to infrastructure security.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

CloudPassage

Central control. Manage, monitor and secure your network in minutes with ControlNow
sponsored by ControlNow
WHITE PAPER: This exclusive white paper takes an in-depth look at how one bank was able to recover and continue business after a security breach. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

ControlNow

Central Bank and Trust
sponsored by ControlNow
WHITE PAPER: This exclusive case study takes an in-depth look at how one bank was able to recover and continue business after a security breach. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

ControlNow

Protecting Your Business with a More Mature IT Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Your ability to spot and stop cyber attacks depends on having the right security people, processes, and technology in place. HP Security Intelligence and Operations Consulting has assessed the security programs of dozens of enterprises. The results are concerning--24 percent of companies do not meet minimum requirements for security monitoring.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company

The 2014 Global Cost of Cybercrime Study
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative report distills interviews with senior-level IT personnel about the impact of cybercrime on their organizations in 2014 into trends that apply to every enterprise around the world.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Mitigating User-Based Risks When Infrastructure Monitoring Falls Short
sponsored by ObserveIT
WHITE PAPER: This white paper discusses the roles of trusted insiders versus outsiders in data breaches; identifying activities and intent when it comes to user-based threats; why user-based monitoring is a promising solution; and more.
Posted: 14 Nov 2014 | Published: 31 Oct 2014

ObserveIT

Migration Engine from Butterfly Software
sponsored by IBM
WHITE PAPER: This resource provides an overview of the migration procedure and an explanation for how your organization can access all of its data from a single backup platform, improving your RTO and RPO objectives and ensuring you are legally compliant as well as reducing your overall carbon footprint.
Posted: 12 Nov 2014 | Published: 31 May 2013

IBM

Know Your Endpoints to Prevent Security Breaches
sponsored by IBM
WHITE PAPER: This exclusive whitepaper covers how an IBM assessment can show you how secure your endpoints really are.
Posted: 11 Nov 2014 | Published: 13 Sep 2012

IBM

How the Right Printing Security Can Minimize the Risk of Check Fraud and Counterfeiting
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a solution developed by HP and TROY to control check printing operations and help prevent fraud on finished checks, adding security to a variety of applications.
Posted: 10 Nov 2014 | Published: 31 Mar 2014

Hewlett-Packard Limited
101 - 125 of 891 Matches Previous Page    3 4 5 6 7 8    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement