Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk ManagementWhite Papers (View All Report Types)
151 - 175 of 870 Matches Previous Page  | Next Page
How To Avoid Heartbleed Or Similar SSL Related Vulnerabilities?
sponsored by i-Sprint Innovations
WHITE PAPER: This informative guide explores top strategies for resolving Heartbleed and similar SSL-related vulnerabilities.
Posted: 29 May 2014 | Published: 29 May 2014

i-Sprint Innovations

2013 Cyber Risk Report Executive Summary
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative whitepaper reviews the threat landscape of 2013 and outlines the most troublesome risks coming your way in 2014.
Posted: 28 May 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

4 File Sharing Workarounds That Should Worry CSOs
sponsored by GlobalScape
WHITE PAPER: This resource reveals the top 4 file sharing workarounds users are resorting to when organizations don't provide a scalable or easy-to-use resource for large file exchanges.
Posted: 27 May 2014 | Published: 10 Apr 2013

GlobalScape

The File Transfer Security Evolution
sponsored by GlobalScape
WHITE PAPER: This white paper highlights 4 key features of a managed file transfer solution that is business-ready and meets increasing user demands for convenience.
Posted: 27 May 2014 | Published: 31 Dec 2013

GlobalScape

HawkEye G-The Active Defense Grid
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: This informative whitepaper takes a look at a unique security tool designed to prevent advanced persistent threats.
Posted: 27 May 2014 | Published: 27 May 2014

Hexis Cyber Solutions Inc

Mobile is the New Normal for Conducting Business
sponsored by GlobalScape
WHITE PAPER: This resource features a cloud-based mobile file sharing solution that enables convenient and secure user collaboration.
Posted: 23 May 2014 | Published: 23 May 2014

GlobalScape

Exchanging Large Files with External Partners
sponsored by GlobalScape
WHITE PAPER: Access this resource to explore a range of security solutions built to fit varying business needs for exchanging large files.
Posted: 23 May 2014 | Published: 23 May 2014

GlobalScape

Globalscape® EFT Platform: Complete Visibility Over File Transfer
sponsored by GlobalScape
WHITE PAPER: This resource highlights a file transfer platform that offers complete visibility to help improve security and audit management.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

Case Study: Connecting Consultants and Customers Securely at Arthur D. Little
sponsored by GlobalScape
WHITE PAPER: This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

Secure by Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014

Citrix

Five Things To Do After You've Been Hacked
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Access this informative guide to find out 5 things to do after you've been hacked – keeping your system safe and secure.
Posted: 22 May 2014 | Published: 22 May 2014

Hexis Cyber Solutions Inc

Five Things To Do After An Attack
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Advanced persistent threats are a top priority for many IT departments – as they should be. Access this informative whitepaper and find out 5 things to do after a potential attack.
Posted: 22 May 2014 | Published: 22 May 2014

Hexis Cyber Solutions Inc

What the Gartner Analysts are Saying About Government Solutions and Interoperability
sponsored by MicroPact
WHITE PAPER: Budgets are being cut and pressure continues to mount for federal agencies to run leaner and meaner. This paper looks at Gartner analyst coverage of government's approach to developing secure and cost-effective solutions.
Posted: 19 May 2014 | Published: 19 May 2014

MicroPact

Information Visibility: Reducing Business Risk with The Clearswift Aneesya Platform
sponsored by Clearswift
WHITE PAPER: In this white paper, discover an information governance platform that offers real-time insight to improve threat detection and enhance governance and compliance reporting.
Posted: 16 May 2014 | Published: 16 May 2014

Clearswift

Vulnerabilities, Attacks, Data Breaches: Which is most important?
sponsored by IntraLinks, Inc
WHITE PAPER: This resource offers leading advice on how to leverage top vulnerability, attack, and data breach reports to help enhance your security strategies.
Posted: 15 May 2014 | Published: 15 May 2014

IntraLinks, Inc

IAM Systems Now Leverage Intelligence to Address Cloud and Mobile Apps
sponsored by IntraLinks, Inc
WHITE PAPER: This resource highlights the 4 newest roles for identity and access management (IAM) systems that enhance security for an expanding business environment.
Posted: 15 May 2014 | Published: 15 May 2014

IntraLinks, Inc

Transforming Information Security: Designing State-of-the-Art Extended Team
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This informative whitepaper explores strategies for designing a state-of-the-art security team.
Posted: 29 May 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Transforming Information Security: Focusing on Strategic Technologies
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This in-depth guide outlines the current threat landscape and explores strategic technologies for your information security strategy.
Posted: 29 May 2014 | Published: 29 May 2014

RSA, The Security Division of EMC

15 Point Checklist Cloud Data Protection
sponsored by SkyHigh
WHITE PAPER: This resource offers 5 exclusive tips for protecting business data across all cloud services.
Posted: 28 May 2014 | Published: 28 May 2014

SkyHigh

Workflow, governance and reporting – Solvency II
sponsored by IBM
WHITE PAPER: The following white paper provides readers with industry-leading insights into the key challenges and issues arising when managing all 3 pillars of Solvency II. Learn how to manage workflow around internal models, which process surround reporting and the integration with risk modeling, and more.
Posted: 23 May 2014 | Published: 23 May 2014

IBM

Cyber Preppers Guide
sponsored by Threat Track Security
WHITE PAPER: This informative guide provides an effective security preparedness plan – which outlines key strategies for stopping advanced persistent threats (APTs) and other forms of sophisticated malware.
Posted: 22 May 2014 | Published: 14 May 2014

Threat Track Security

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

Meeting Demand of High Availability with Advanced Data Protection
sponsored by IBM
WHITE PAPER: This white paper features a series of data protection solutions that help businesses meet the demands for always-on availability for applications while keeping sensitive information secure.
Posted: 19 May 2014 | Published: 31 Jan 2014

IBM

EMC Isilon for Healthcare
sponsored by Pivotal
WHITE PAPER: This brief resource provides information on a solution that reduces costs and improves operational efficiency by consolidating image data from each department PACS into a single, unified independent storage solution.
Posted: 16 May 2014 | Published: 31 Oct 2012

Pivotal

Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER: This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013

Trend Micro
151 - 175 of 870 Matches Previous Page    5 6 7 8 9 10    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement