Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
26 - 50 of 925 Matches Previous Page  |  Next Page
GDPR
sponsored by RSA
WHITE PAPER: GDPR is on track to be the most significant change in global privacy laws in the past 20 years. Everyone wants to know: How will this affect my business? Read this RSA e-book to discover what you need to know about how the GDPR and EU's privacy rules could impact your business operations.
Posted: 08 Nov 2017 | Published: 31 Dec 2016

RSA

GDPR Survival Basics
sponsored by RSA
WHITE PAPER: GDPR takes effect in May 2018. How prepared is your organization? This white paper sets out 5 basic steps for organizations to consider when setting up framework for managing GDPR risk.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

RSA

A Practical Guide for GDPR Compliance
sponsored by RSA
WHITE PAPER: According to an Osterman Research report, 64% of organizations are not ready to comply with the GDPR. Grab your copy of this Osterman Research practical guide to understanding your readiness. Don't miss the checklist on page 9.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

RSA

GDPR: What it Means to Your Cybersecurity Strategy
sponsored by RSA
WHITE PAPER: More than 90% of Europeans say they want the same data protection rights regardless of where their data is processed, and as a result the EU GDPR came along. This white paper reveals what the GDPR means for your various cybersecurity strategies and how you'll need to adjust your approaches to comply.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

RSA

Top-of-Mind Threats and Their Impact on Endpoint Security Decisions
sponsored by Cylance
WHITE PAPER: According to this ESG report, 91% of cybersecurity professionals express the greatest concern over the threat posed by email phishing. Explore this report to learn how to protect your organization's endpoints against cyberattacks with specific defense strategies, including machine learning.
Posted: 01 Nov 2017 | Published: 01 Nov 2017

Cylance

Introduction to Artificial Intelligence for Security Professionals
sponsored by Cylance
WHITE PAPER: According to Gartner, by 2018, 25% of security products used for detection will have some form of machine learning built into them. Explore this 155 page e-book to learn more about artificial intelligence and machine learning for security professionals.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Cylance

10 Traits Of Successful DLP Programs
sponsored by InteliSecure
WHITE PAPER: According to Gartner, by 2018, 90% of organizations will implement at least one form of integrated DLP. This white paper reveals 10 traits of successful DLP programs to increase the effectiveness of your program.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

InteliSecure

Operationalize Your Organization for the GDPR
sponsored by InteliSecure
WHITE PAPER: Learn how creating a general data protection regulation framework to protect critical assets, both tangible and intangible (think IP), will enable you to operationalize your GDPR compliance.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

InteliSecure

Next-Generation Anti-Malware Testing for Dummies
sponsored by Cylance
WHITE PAPER: Inside this Next-Generation Anti-Malware Testing for Dummies e-book, learn about next-generation endpoint security techniques and how you can use machine learning and AI to protect against advanced persistent threats.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Cylance

Pathways for GDPR Readiness
sponsored by IBM
WHITE PAPER: The GDPR regulation can be used as a potential business opportunity for your company. Explore this white paper to learn more about getting a leg up with the GDPR journey, potential drawbacks of failing to comply with GDPR and how your company can benefit from GDPR.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

IBM

5 Steps to Building a Successful Vulnerability Management Program
sponsored by Tenable, Inc.
WHITE PAPER: Vulnerability management is something that will never end and will need to be improved and worked on periodically to ensure the security of your enterprise.Explore this white paper to learn more about successful vulnerability management programs to protect your enterprise.
Posted: 30 Oct 2017 | Published: 27 Apr 2017

Tenable, Inc.

5 Risk Points to Avoid in Enterprise Security
sponsored by Microsoft
WHITE PAPER: According to the Verizon Data Breach Investigations Report, nearly 80% of organizations reported data breaches, with 1/3 of them reporting more than 6 breaches. In this white paper, find out how you can boost your organization's device and app security, all while protecting against malware, data breaches and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Microsoft

13 Essential Steps to Meeting the Security Challenges
sponsored by Tenable, Inc.
WHITE PAPER: While multinational companies can likely meet some of the GDPR requirements right now, most will find that they have a lot of work to do in order to meet full compliance. Key into this white paper to gain a deeper understanding of GDPR and why the regulation is important to IT professionals.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Tenable, Inc.

Uncovered: IDC Explores the Benefits of Cloud-based Vulnerability Management
sponsored by Tenable, Inc.
WHITE PAPER: The shift to public cloud, along with mobile and DevOps, comes with an abundance of new assets for security pros to control and contain. How can you manage new vulnerabilities that result? Explore this IDC tech spotlight to how a cloud-based approach to vulnerability management can help.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Tenable, Inc.

Find and eliminate security blind spots with always-on vulnerability management
sponsored by Tenable, Inc.
WHITE PAPER: Explore this Frost & Sullivan white paper to learn more about vulnerability management: implementation, endpoints, user behavior, and more. Inside, also discover why one vulnerability management vendor received Frost & Sullivan's 2017 Visionary Innovation Leadership Award.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Tenable, Inc.

A Privileged Account Security Approach To GDPR Readiness
sponsored by CyberArk Software, Inc
WHITE PAPER: It is difficult to achieve GDPR compliance without securing the privileged pathways to the systems containing personal data. Key into this white paper to learn more about GDPR and how you can protect personal data within your organization.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

CyberArk Software, Inc

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed
sponsored by Absolute
WHITE PAPER: Gartner estimates that by 2019, cloud security audits will routinely include a model that scores risk and implementation effectiveness separately. Explore this white paper to learn how you can effectively mitigate the risks threatening your enterprise's data in the cloud.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Absolute

Absolute Persistence
sponsored by Absolute
WHITE PAPER: Technology never waits, and in the past 20 years we've seen plenty of change. Gone are the days when IT could support the business with one make of PC and a phone. Explore this white paper to discover how to secure and manage endpoints so your organization is protected, business data is secured, and end user productivity is supported.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Absolute

What is the Best Type of DDoS Protection for my Business?
sponsored by Arbor Networks
WHITE PAPER: Cisco predicts that by 2020, 17 million DDoS attacks will occur annually. In this white paper, learn which type of DDoS protection is best for your business.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Arbor Networks

5 questions to ask when considering a DDoS Managed Service
sponsored by Arbor Networks
WHITE PAPER: When evaluating DDoS protection for your business, what are the top questions you should ask? This white paper offers 5 questions to ask to ensure you are picking the best DDoS protection strategy for your enterprise.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Arbor Networks

Advantages of a Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: It is challenging to know which strategy is best for your enterprise protection. This white paper explores the differences between a fabric and a platform approach to your security framework, and reveals how you can protect your enterprise from security threats.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Fortinet, Inc.

A Secure, IT-Approved File Sharing Alternative to Shadow IT
sponsored by Citrix
WHITE PAPER: Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

7 Requirements for an Effective EFSS Platform
sponsored by Citrix
WHITE PAPER: Discover how to make sure you enterprise file sync and sharing (EFSS) offers the flexibility that users need without sacrificing security. Learn how to mitigate the risks associated with personal file-sharing services and uncover 7 key requirements for a sound EFSS platform.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Citrix

Meet the GDPR Regulation
sponsored by Citrix
WHITE PAPER: According to a Ponemon Institute study, while 67% of respondents are aware of GDPR, only 50% of the organizations have allocated budget and started to prepare for these new regulations. This white paper offers an overview of the GDPR, why it matters, and what organizations like you need to do to prepare and comply with it.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Citrix

A Risk Manager’s Guide to the General Data Protection Regulation (GDPR)
sponsored by BitSight
WHITE PAPER: Noncompliance with the GDPR will result in a maximum fine of €20,000,000 or 4% of an organization's worldwide revenue, whichever is greater. In this white paper, gain a deeper understanding of the GDPR, how it will affect your organization, and how you can prepare for it.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

BitSight
26 - 50 of 925 Matches Previous Page    1 2 3 4 5    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement