Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
101 - 125 of 954 Matches Previous Page  |  Next Page
2015 Cost of Data Breach Study: United Kingdom
sponsored by IBM
WHITE PAPER: This report analyzes the financial cost of cybercrime in the UK, discussing how much harm a hack can cause and what the implications are for your business.
Posted: 13 Jul 2015 | Published: 31 May 2015

IBM

2015 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper provides the full details on the 2015 global data breach study, and shows you how to adequately protect your data. Read on to learn more about why the costs of data breaches have increased, and how you can respond immediately in the event of a breach.
Posted: 10 Jul 2015 | Published: 31 May 2015

IBM

The State of Point-of-Sale Insecurity
sponsored by SurfWatch Labs
WHITE PAPER: This report analyzes the state of PoS compromises and other sources of online credit card theft in order to provide suggestions on combatting this kind of cybercrime.
Posted: 10 Jul 2015 | Published: 30 Jun 2015

SurfWatch Labs

Create Your Own Private ISAC: Tips for Sharing Threat Intelligence
sponsored by SurfWatch Labs
WHITE PAPER: This white paper discusses how cybersecurity professionals can build an information sharing and analysis center (ISAC) to disseminate security intelligence and insights among partners.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

SurfWatch Labs

Unified Security Management vs. SIEM: A Technical Comparison
sponsored by AlienVault
WHITE PAPER: This white paper explores why SIEM solutions have been proven to be less effective than their vendors claim.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

AlienVault

Raising Your Google Ranking: A Guide
sponsored by Symantec Corporation
WHITE PAPER: To help create a more secure web, Google now gives HTTPS-secured sites an SEO (Search Engine Optimization) boost to help safer sites become popular sites. Learn more about this and other ways to boost your ranking - Download our Raise your Google Ranking guide and view the infographic.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

Symantec Corporation

IBM X-Force Threat Intelligence Quarterly, 2Q 2015
sponsored by IBM
WHITE PAPER: This quarterly cyber security report describes just how prevalent insider threats are and gives you guidelines on how to best protect yourself from them.
Posted: 09 Jul 2015 | Published: 30 Jun 2015

IBM

IBM 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This cybercrime report provides data on the sources and frequency of cybercrime so you know what to protect yourself from.
Posted: 08 Jul 2015 | Published: 31 May 2015

IBM

Creating a Cutting-Edge Reporting and Analyst Capability for the Banking Market
sponsored by Progress
WHITE PAPER: Access this white paper to learn how this BRMS helped DBS reduce risk and handle more loan business with more confidence.
Posted: 08 Jul 2015 | Published: 31 May 2014

Progress

Countdown to Compromise: The Timeline of a Spear-Phishing Attack
sponsored by Mimecast
WHITE PAPER: This white paper uses a typical spear-phishing scenario to demonstrate the dangers spear-phishing poses.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Mimecast

IBM 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This infographic gives you a quick breakdown of just how prevalent cyber breaches are and how much danger your organization may be in.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

IBM

Bolster Your Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

WhiteHat Security

The Economic Benefits of Unified Email Management
sponsored by Mimecast
WHITE PAPER: This white paper analyzes the cost-effectiveness of a software-as-a-service email management and security solution.
Posted: 06 Jul 2015 | Published: 30 Apr 2013

Mimecast

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This white paper discusses the security challenges of cloud-based file sharing services and gives tips on how to enjoy their productivity benefits without putting your business at risk.
Posted: 06 Jul 2015 | Published: 31 Dec 2014

Mimecast

Information governance in a big data world
sponsored by IBM
WHITE PAPER: With big data analytics and the influx of information streaming into your organization, your data governance approach will either unify people, processes, and technology – or tear them apart. Access this white paper and discover the key to creating a holistic governance framework that supports your business objectives and revenue goals.
Posted: 06 Jul 2015 | Published: 30 Sep 2014

IBM

Microsoft Office 365 for the Enterprise: How to Strengthen Security, Compliance and Control
sponsored by Mimecast
WHITE PAPER: This white paper analyzes the limitations of Office 365 and makes suggestions for overcoming those limitations, particularly in the area of security.
Posted: 02 Jul 2015 | Published: 28 Feb 2014

Mimecast

NetApp Is Accelerating Your Data Protection Strategy to the Clouds
sponsored by NetApp
WHITE PAPER: This informative white paper makes it clear that improving data backup and recovery is a top priority for IT groups in organizations of all sizes.
Posted: 01 Jul 2015 | Published: 01 Jan 2015

NetApp

4 Critical Risks Facing Microsoft Office 365 Implementation
sponsored by Mimecast
WHITE PAPER: This white paper presents the 4 critical risks facing Microsoft Office 365 implementation and how to mitigate each one.
Posted: 01 Jul 2015 | Published: 24 Jun 2015

Mimecast

Case Study: How a Leading Bank Monitors All Its Data
sponsored by Varonis
WHITE PAPER: This case study describes how a leading bank gained the ability to monitor every bit of its data, down to the last file touch.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

Get Control of Cloud Based File Synchronization Services
sponsored by Varonis
WHITE PAPER: In this white paper, discover how you can allow your employees to use file synchronization without putting your data at risk.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

Cybercrime Readiness in Europe
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Hewlett-Packard Limited

How European Enterprises Are Preparing for Cybercrime
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Hewlett-Packard Limited

Into the Breach: Lessons from Real Security Incidents
sponsored by Varonis
WHITE PAPER: This white paper outlines three devastating security breaches from start to finish, helping you to learn from the mistakes of these compromised businesses and to better keep yourself safe.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

The Security Challenges of Digital Collaboration
sponsored by Varonis
WHITE PAPER: This white paper discusses the problem of universal access to sensitive data and gives suggestions for solving this problem without interfering with the business process.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

Case Study: Boston University Achieves Heightened Protection for Sensitive Data
sponsored by Varonis
WHITE PAPER: Access this case study to discover how Boston University implemented DLP that gives insight into both where sensitive data is located and who has access to it.
Posted: 24 Jun 2015 | Published: 01 Jan 2014

Varonis
101 - 125 of 954 Matches Previous Page    3 4 5 6 7 8    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement