Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
151 - 175 of 877 Matches Previous Page  |  Next Page
A Guide to 12 CyberSecurity Metrics You/Your Vendors Should be Watching
sponsored by BitSight
WHITE PAPER: This white paper details 12 actionable metrics that can help you specifically assess how your organization is doing with its current cybersecurity.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

BitSight

Utilizing Security Ratings for Enterprise IT Risk Mitigation
sponsored by BitSight
WHITE PAPER: This white paper highlights a security ratings technology that measures company security performance and provides metrics to help mitigate risk and streamline security operations. Access now and learn how this cloud-based intelligence platform can help your enterprise improve your overall risk management in today's world of dangerous cyber-attacks.
Posted: 05 Feb 2016 | Published: 30 Jun 2014

BitSight

Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: This white paper talks about some of the security risk management approaches organizations have taken as well as new approaches to other growing problems. Access this resource now and learn to identify, quantify and mitigate risk throughout your network.
Posted: 04 Feb 2016 | Published: 30 Apr 2014

BitSight

Continuous Third-Party Security Monitoring Powers Business Objectives and Vendor Accountability
sponsored by BitSight
WHITE PAPER: As concerns about data guardianship, targeted attacks and advanced security threats have risen, so have the significance of third-party relationships. Access this white paper and find out about the attitudes and capabilities regarding third-party security compliance of enterprise IT security decision-makers in the US, UK, France and Germany.
Posted: 03 Feb 2016 | Published: 31 Jan 2015

BitSight

Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach
sponsored by BitSight
WHITE PAPER: Cyberattacks are likely to increase in the coming years and by better understanding key indicators of vulnerability to breaches, executives and directors can begin to effectively mitigate the risk of a data breach. Discover the relationship between publicly disclosed data breaches and the factors that go into an organization's security rating.
Posted: 03 Feb 2016 | Published: 30 Apr 2015

BitSight

The Security Performance of 6 Key Industries
sponsored by BitSight
WHITE PAPER: Discover the security performance of six key industry sectors, how they prepare for cyberattacks, and the commonalities of their experiences in defending their data.
Posted: 02 Feb 2016 | Published: 30 Sep 2015

BitSight

40 Questions You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014

BitSight

5 Steps to Achieve Risk-based Application Security Management
sponsored by IBM
WHITE PAPER: This e-guide discusses potential obstacles to managing application security effectively and describes 5 steps for implementing risk-based application security management. Access now and obtain visibility into the state of application security across your enterprise with these tips.
Posted: 29 Jan 2016 | Published: 31 Jul 2015

IBM

Security attacks on industrial control systems
sponsored by IBM
WHITE PAPER: This white paper examines the history of industrial control systems (ICS), the susceptibility of these systems to certain attacks and how the systems can be defended.
Posted: 17 Mar 2016 | Published: 31 Oct 2015

IBM

Security trends in the manufacturing industry
sponsored by IBM
WHITE PAPER: This white paper shows you statistics about cyberattack in the manufacturing industry and how they resulted. Learn some manufacturing best practices and securements to better protect any exploitable weaknesses in your organization's infrastructure.
Posted: 16 Mar 2016 | Published: 29 Feb 2016

IBM

Security trends in the retail industry
sponsored by IBM
WHITE PAPER: In this white paper, you will learn about different methods hackers use to steal customer data as well as statistics showing what time of year attacks are most prevalent. Learn how to defend yourself against hackers and how to respond if a breach does take place in your network.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

IBM

Security trends in the healthcare industry
sponsored by IBM
WHITE PAPER: This white paper gives you the latest statistics on healthcare-related security breaches and how you can avoid becoming a statistic yourself by falling victim to attack. Learn about the most common cyberattacks against healthcare organizations and how to patch vulnerabilities you may have in your network.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

IBM

The price of loyalty programs
sponsored by IBM
WHITE PAPER: This white paper shows you how to implement a loyal program for your customers and minimize the chance of account breaches. Learn how to diligently monitor your network and how to detect signs of attacks.
Posted: 14 Mar 2016 | Published: 30 Nov 2015

IBM

Real-Time, Unified Endpoint Protection: A New Era in Incident Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper teaches you about the only endpoint protection platform that natively integrates prediction, prevention, detection and response. Save considerable time, money and energy while simultaneously improving your overall security posture.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

Replacing Antivirus, and Doing it Right: A CISO Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper shows you how to successfully execute a complete antivirus replacement. Access now and learn how to make a daunting task into a simple project with the right careful planning, frequent communication and stakeholder buy-in.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

Next Generation Endpoint Protection Buyer's Guide
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper teaches you about next-generation endpoint protection that can detect and prevent threats on endpoints using a unique behavior-based approach.
Posted: 08 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

A Smarter Approach to Retail Order Security
sponsored by Prelert
WHITE PAPER: Many of the platforms that online retailers use to catch security risks require manual human input to alert on issues, allowing unknown or unexpected problems to go undetected until it's too late. This brief resource describes how automated machine learning can help online retailers stay competitive in today's e-commerce landscape.
Posted: 25 Feb 2016 | Published: 25 Feb 2016

Prelert

Transcript: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WHITE PAPER: Gain deeper visibility into your network using anomaly detection alongside compliance/segmentation monitoring. Identify advanced attacks and protect the crown jewels on your network.
Posted: 25 Feb 2016 | Published: 27 Jan 2016

Lancope

Vulnerability Scanning Tips and Tricks
sponsored by Alert Logic
WHITE PAPER: This white paper teaches you the importance of performing regular scans to identify and reduce vulnerabilities. This is you guide to ensure your scans successfully complete and report properly.
Posted: 24 Feb 2016 | Published: 20 Aug 2015

Alert Logic

Vulnerability Response Best Practices
sponsored by Alert Logic
WHITE PAPER: This white paper gives you a step-by-step approach in responding to vulnerabilities with examples of breaches throughout. Learn how to prepare you network for an attack and how to lessen the potential for security flaws in your network.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Alert Logic

Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper outlines your responsibilities in managing your data in your cloud and gives you seven best practices to keep it secure.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

Alert Logic

4 Tips to Secure your Saas Environment
sponsored by Alert Logic
WHITE PAPER: This white paper gives you four tips that SaaS providers need to keep in mind at all times to keep their security ahead of the game and make sure your SaaS app delivers the value and safety your customers demand.
Posted: 19 Feb 2016 | Published: 27 Jan 2016

Alert Logic

AWS & Alert Logic Case Study
sponsored by Alert Logic
WHITE PAPER: This case study shows you the results of Concep and how they gained comprehensive network threat and intrusion detection capabilities.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Alert Logic

Addressing PCI Compliance
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

CA Technologies.

Delivering More Efficiency and Productivity With Modernized Data Protection
sponsored by HPE and Veeam
WHITE PAPER: This white paper teaches you about new, hyper-converged solutions, based on virtualization software that can transform your data center. Gain a more cost efficient solution with a smaller management footprint.
Posted: 27 Jan 2016 | Published: 30 Sep 2014

HPE and Veeam
151 - 175 of 877 Matches Previous Page    5 6 7 8 9 10    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement