Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
126 - 150 of 994 Matches Previous Page  |  Next Page
The ABC of Security Strategy
sponsored by IBM
WHITE PAPER: This white paper highlights challenges organizations typically face in implementing effective security strategies. Learn how to manage risk and gain a competitive advantage in your field.
Posted: 03 Mar 2016 | Published: 31 Jan 2016

IBM

An Integrated Approach to Reducing Detection and Response Times
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper to learn about an integrated set of tools that provide a holistic view across the ever-expanding attack surface, and apply big data analytics to detect patterns of concerning behavior faster.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

LogRhythm, Inc.

Dell Data Protection: Rapid Recovery
sponsored by Dell, Inc.
WHITE PAPER: In this white paper, find out how you can protect anything, anywhere: systems, apps and data – fast and easy. Gain a reliable, admin-friendly solution that can be deployed as software or in scalable appliance form factors with all capabilities included.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Dell, Inc.

The Forrester Wave: Information Security Consulting Services
sponsored by IBM
WHITE PAPER: This Forrester report details and analyzes the 13 most significant security consulting service providers and their offerings. Access now to learn more about how well these consultancies fulfill security standards to best select the right partner for your business.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

IBM

Securing Docker: What You Need to Know
sponsored by Black Duck Software
WHITE PAPER: This white paper discusses how you can build, ship, and run distributed applications quickly and reliably. Learn how you can go from physical, single-tenanted computing resources to more efficient, virtual, multi-tenanted infrastructure that can run in traditional IT environments and in the cloud.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Black Duck Software

Oracle database licensing challenges
sponsored by Matrix42
WHITE PAPER: This white paper shows you three examples businesses whose licensing agreements with Oracle fell short of expectations. Learn some of the shortcomings these businesses experienced to protect yourself from similar involvement.
Posted: 29 Feb 2016 | Published: 27 Jan 2016

Matrix42

A Smarter Approach to Retail Order Security
sponsored by Prelert
WHITE PAPER: Many of the platforms that online retailers use to catch security risks require manual human input to alert on issues, allowing unknown or unexpected problems to go undetected until it's too late. This brief resource describes how automated machine learning can help online retailers stay competitive in today's e-commerce landscape.
Posted: 25 Feb 2016 | Published: 25 Feb 2016

Prelert

Big Data Analytics in Manufacturing: Predict Events, Foresee Risk, and Enhance Customer Experience
sponsored by Infor
WHITE PAPER: This white paper explains what manufacturers can do with today's abundance of available data. Access now to uncover ways big data can foster growth opportunities for manufacturers.
Posted: 25 Feb 2016 | Published: 25 Feb 2016

Infor

Open Source Security Needed in Development
sponsored by Black Duck Software
WHITE PAPER: With 4,000 new vulnerabilities disclosed in open source projects each year, you can't afford to use open code without knowing the risk and how to prevent them.
Posted: 24 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Know Your Code: Don't Get Blindsided by Open Source Security Risks During Development
sponsored by Black Duck Software
WHITE PAPER: This white paper teaches you the advantages and disadvantages of using open source software and how you can avoid some of the disadvantages. Access this resource now for considerations your organization should know.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Stress Testing: A View from the Trenches
sponsored by SAS
WHITE PAPER: In this white paper, you will learn about various financial institutions and how well they are rising to the stress test challenge. See what areas are progressing and what areas still need to get up to speed.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

SAS

Financial Instruction Advantage and the Optimization of Information Processing
sponsored by SAS
WHITE PAPER: This white paper shows you a greater capability of model risk assessment. Avoid headline-grabbing risks and pressure from regulators by anticipating what's coming.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

SAS

Open source: What developers and security pros need to know
sponsored by Black Duck Software
WHITE PAPER: Whether you're a developer or security professional, get a firm grip on open source software management, compliance and security risks and solutions you need to know to keep your company safeguarded.
Posted: 22 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Advanced Threat Hunting with Carbon Black Enterprise Response
sponsored by Carbon Black
WHITE PAPER: This white paper covers the capabilities necessary to proactively and efficiently hunt for threats across your enterprise. Learn how to expand detection beyond the point of compromise.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Every Second Counts: Unravel the entire attack and disrupt attacker behavior
sponsored by Carbon Black
WHITE PAPER: Access this white paper and find out how one solution can unravel an entire attack and disrupt the attacker's behavior to help you stay ahead. Learn how your organization can benefit from complete endpoint visibility, faster detection of advanced threats, more effective remediation, and much more.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Data Sheet: Carbon Black Security Solution Overview
sponsored by Carbon Black
WHITE PAPER: This white paper shows you how to enable your organization to disrupt advanced attacks and deploy the best prevention strategies for your business. Learn how to achieve real-time visibility in your network.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Carbon Black Enterprise Protection
sponsored by Carbon Black
WHITE PAPER: This white paper shows you a next-generation endpoint threat prevention solution that delivers a portfolio of protection policies, real-time visibility across environmnet and comprehensive compliance rules in a single platform.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Carbon Black Threat Intel
sponsored by Carbon Black
WHITE PAPER: This white paper teaches you how to gain real-time threat detection and analysis to help proactively protect against advanced threats. Find out how you can proactively detect, respond and ban attacks before a breach occurs.
Posted: 29 Feb 2016 | Published: 27 Jan 2016

Carbon Black

Compliance 101: Basics for Security Professionals
sponsored by Carbon Black
WHITE PAPER: This white paper helps security professional and non-professionals alike understand their roles when it comes to compliance.
Posted: 26 Feb 2016 | Published: 31 Jan 2016

Carbon Black

Application Control Observations & Strategies for Success
sponsored by Carbon Black
WHITE PAPER: This white paper provides a blueprint you can adopt to ensure successful application control deployment. It greatly simplifies the process of achieving "high enforcement" in your IT environment.
Posted: 25 Feb 2016 | Published: 27 Jan 2016

Carbon Black

Disrupt Your Adversaries: 5 Steps to Stopping Advanced Threats
sponsored by Carbon Black
WHITE PAPER: This white paper shows you how you can easily integrate with third-party products to make advanced threats easier to see and faster to stop.
Posted: 25 Feb 2016 | Published: 31 Jan 2016

Carbon Black

Transcript: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WHITE PAPER: Gain deeper visibility into your network using anomaly detection alongside compliance/segmentation monitoring. Identify advanced attacks and protect the crown jewels on your network.
Posted: 25 Feb 2016 | Published: 27 Jan 2016

Lancope

Vulnerability Scanning Tips and Tricks
sponsored by Alert Logic
WHITE PAPER: This white paper teaches you the importance of performing regular scans to identify and reduce vulnerabilities. This is you guide to ensure your scans successfully complete and report properly.
Posted: 24 Feb 2016 | Published: 20 Aug 2015

Alert Logic

Vulnerability Response Best Practices
sponsored by Alert Logic
WHITE PAPER: This white paper gives you a step-by-step approach in responding to vulnerabilities with examples of breaches throughout. Learn how to prepare you network for an attack and how to lessen the potential for security flaws in your network.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Alert Logic

Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper outlines your responsibilities in managing your data in your cloud and gives you seven best practices to keep it secure.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

Alert Logic
126 - 150 of 994 Matches Previous Page    4 5 6 7 8 9    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement