Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk ManagementWhite Papers (View All Report Types)
151 - 175 of 745 Matches Previous Page  | Next Page
The SIEM Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: This guide takes a look at the current trends in security management and how an effective SIEM strategy can help you ensure security.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

AlienVault

Big Threats for Small Businesses
sponsored by FireEye
WHITE PAPER: Data breaches are bad for business, but it can mean the end for small firms. This guide takes a look at today's threat landscape and explores cybercrime trends towards small and midsize businesses.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

FireEye

Once More Into the Breach: The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats
sponsored by FireEye
WHITE PAPER: This guide explores 10 common mistakes businesses make when planning their security strategy.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

FireEye

Thinking Locally, Targeted Globally: New Security Challenges for State and Local Governments
sponsored by FireEye
WHITE PAPER: In a world where cybercrime is growing in complexity and frequency, you don't have room for system vulnerabilities. This guide explores the current role of APTs in and how you can combat these advanced attacks.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

FireEye

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Dell, Inc.

Dell Networking Support for Payment Card Industry Data Security Standard
sponsored by Dell, Inc.
WHITE PAPER: This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Dell, Inc.

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Supply Chain Analysis: From Quartermaster to Sunshop
sponsored by FireEye
WHITE PAPER: This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

IAM for the Real World – Privileged Account Management
sponsored by Dell Software
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Dell Software

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER: This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource highlights results of a 4-question survey about network security, and what IT managers are looking for in a solution to address their top problems.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

Hewlett-Packard Company

Information Risk: Managing Digital Assets in a new Technology Landscape
sponsored by Hewlett-Packard Limited
WHITE PAPER: This in-depth report outlines the current threat landscape, different types of risks, and what you can do to prevent devastating cyber-attacks.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

Hewlett-Packard Limited

Manage Identity and Access for Continuous Compliance and Reduced Risk
sponsored by IBM
WHITE PAPER: This valuable resource shows how policy-driven IAM governance will protect assets from unauthorized access without diminishing productivity.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

IBM

Henan Mobile Achieves Information Security with Centralized, Automated Platform
sponsored by Hewlett-Packard Company
WHITE PAPER: This case study features one telecommunications company's experience implementing a centralized, automated network security management platform. Read through to see how the business is benefiting from improved information security and simplified management.
Posted: 24 Feb 2014 | Published: 31 Jan 2013

Hewlett-Packard Company

ESM Solution Helps City University to Safely Increase Student Numbers by a Third While Going Mobile
sponsored by Hewlett-Packard Company
WHITE PAPER: This guide explores one company's success in implementing effective security management while shifting to more mobile services.
Posted: 24 Feb 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

FireEye Advanced Cyber Attack Landscape Report
sponsored by FireEye
WHITE PAPER: This guide explores the current threat landscape across the globe and how your business may be affected depending on industry and location.
Posted: 24 Feb 2014 | Published: 31 Dec 2013

FireEye

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications
sponsored by Imperva
WHITE PAPER: Read this white paper to unveil the top 6 recommended features for Web application security that next-generation firewalls and an intrusion prevention system (IPS) often miss.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

Imperva

Security Trends 2014
sponsored by Global Knowledge
WHITE PAPER: In this resource, find out what you need to know about security trends in 2014.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by GlobalScape
WHITE PAPER: Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012

GlobalScape

NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER: This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013

IBM

Understanding and Selecting Data Masking Solutions
sponsored by IBM
WHITE PAPER: This white paper examines data masking technology, and pinpoints the must-have features to look for when choosing a solution.
Posted: 28 Feb 2014 | Published: 10 Aug 2012

IBM

Behavioral Analytics Applied to Security
sponsored by FileTrek
WHITE PAPER: This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FileTrek

Security in the Skies
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper highlights the major cloud security concerns and threats, and offers a list of controls to include in your security strategy to prevent these inherent risks.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

(ISC)2 UK Ltd

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd
151 - 175 of 745 Matches Previous Page    5 6 7 8 9 10    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement