Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
26 - 50 of 1104 Matches Previous Page  |  Next Page
HEB Grocery Store Patches Office 365 Security Flaws
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how H-E-B solved their Office 365 issues by seamlessly implementing a security overlay tool. Learn how to eliminate false positive message classification leading to data loss, unwanted spam, and improve email security in the cloud.
Posted: 07 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER: How do you ensure security in Office 365? Discover how to layer smart security to detect and block attacks and automate response to quickly remove threats before than can do harm. With a little planning, you'll soon be able to stop 99.9% of advanced threats before they reach your users.
Posted: 07 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

The Future of Enterprise Mobile Security: Predictions for 2016 and Beyond
sponsored by Lookout
WHITE PAPER: Understanding and successfully combatting security threats that mobility creates is paramount for continued protection of sensitive company and customer data. This white paper provides Lookout's mobile cybersecurity predictions for 2016 to 2019, so you can futureproof your enterprise.
Posted: 02 Sep 2016 | Published: 29 Jul 2016

Lookout

2016 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

Information Security Consulting Services Report
sponsored by IBM
WHITE PAPER: This Forrester report evaluates the 13 most significant information security consulting service providers against a set of 31 criteria. Uncover how well these consultancies fulfill the criteria and where they stand in relation to each other.
Posted: 30 Aug 2016 | Published: 29 Jan 2016

IBM

Cybersecurity Perspectives from the Boardroom and C-suite
sponsored by IBM
WHITE PAPER: Discover how to best protect you organization against major cyberthreats, types of cyberthreats you may or may not know about and how to optimize your investment in your security solution. See security statistics from organizations across industries to better understand how you can implement your own enterprise risk plan as appropriate.
Posted: 30 Aug 2016 | Published: 01 Jul 2016

IBM

The Case for Security Intelligence Services, Hosted from the Cloud
sponsored by IBM
WHITE PAPER: Discover how to utilize the cloud to automatically detect and respond to threats across your network. Collect, correlate and analyze information from across data silos to give you deep visibility of both cloud and on-premises infrastructure to keep your organization ahead of the latest threats.
Posted: 30 Aug 2016 | Published: 01 Apr 2015

IBM

2016 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This in-depth analysis outlines what IT and security professionals learned from 2015's cyberattacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrophic data loss.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Trends in SAP Cybersecurity
sponsored by IBM
WHITE PAPER: The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 29 Aug 2016 | Published: 01 Feb 2016

IBM

For Better Access Governance, Look Beyond Roles to
sponsored by IBM
WHITE PAPER: Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Tolly Test Report: Evaluating a Web Protection Vendor
sponsored by IBM
WHITE PAPER: In this test report, The Tolly Group evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.
Posted: 29 Aug 2016 | Published: 01 Jun 2016

IBM

Ransomware Multi-layered Approach
sponsored by TrendMicro
WHITE PAPER: Discover four ways you can prepare your corporate network for ransomware attacks to prevent data and financial losses. Learn how a layered approach to security can minimize your malware risk and educate your users on how exactly ransomware can attack your data.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

TrendMicro

5 Ways to Safeguard Sensitive Data from Insider Threats and External Attacks
sponsored by IBM
WHITE PAPER: A modular security strategy that allows you to deploy defense capabilities as you need them is the key to future protection. Discover how you can monitor your entire network continuously to prevent the 5 most harmful occurrences.
Posted: 25 Aug 2016 | Published: 01 Nov 2015

IBM

Uncovering the Risk of SAP Cyber Breaches
sponsored by Onapsis
WHITE PAPER: The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis

Threat Report: Exploitation & Cyberattacks on SAP Business Applications
sponsored by Onapsis
WHITE PAPER: Your SAP applications are under attack. Access this in-depth threat report to learn about a specific vulnerability being actively exploited, the types of SAP systems affected, and how you can mitigate this vulnerability to minimize business risk.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis

Frost & Sullivan Best Practices Research: Network Security Forensics
sponsored by RSA
WHITE PAPER: This white paper shows you a comprehensive set of technologies for incident detection and network security forensics that will greatly improve you security posture. Learn how to achieve depth and real-time visibility into the inbound and outbound communications traversing your network.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

RSA

How Hacking Happens in 2016: Account Takeover
sponsored by IMMUNIO, Inc.
WHITE PAPER: Account takeovers are the latest tricks up the sleeves of hackers, and this e-book helps you understand the 4 main techniques that hackers use to target the accounts of your users. Access now to learn how you can prevent account takeover, and even quickly detect compromised accounts.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

Inside Job: A Better Strategy to Stop Insider Threats
sponsored by Infor
WHITE PAPER: Insider threats are the greatest risk to top-of-the-line cybersecurity. Your data and predictive analytics may be the best tools to protect against insider threats. This guide to insider threats walks you through a brief history of these threats, who could be considered insiders, and how to approach these issues now as well as in the future.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Infor

Deep Security Protection from Ransomware
sponsored by TrendMicro
WHITE PAPER: Ransomware is increasingly targeting servers, where attackers use known software vulnerabilities to inject ransomware. Learn how to protect your servers from ransomware attacks through anti-malware, intrusion prevention, integrity monitoring and web reputation.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

TrendMicro

Breach Detection Systems Test Report
sponsored by TrendMicro
WHITE PAPER: This report shows you independent test results of a breach detection system. Uncover the overall test results, a product scorecard, and discover an analysis of its resistance to evasion techniques, detection of SSL encryption, and more.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

TrendMicro

SIEM’s Total Cost of Ownership – Key Considerations
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover how to take a holistic view on SIEM platform capabilities and discover the impact SIEM can have on your security people and processes. Learn what factors to consider when assessing SIEM business practicality and total cost of ownership.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

Strategy Guide for Securing the SAP Landscape
sponsored by Onapsis
WHITE PAPER: Your organization should be thinking about how best to protect SAP systems. Learn how to secure SAP by taking a largely application-oriented approach, while also applying network restrictions to underlying network devices and firewalls.
Posted: 24 Aug 2016 | Published: 01 Jun 2016

Onapsis

What to Expect from a Multi-Factor Authentication Vendor
sponsored by RSA Softcat
WHITE PAPER: This infographic shows you what you should expect from your multi-factor authentication vendor. Discover a strategy that integrates with the simplest IT environment to the most complex out there so you don't have to choose between security and convenience.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Benchmark Your Threat Detection Effectiveness
sponsored by RSA
WHITE PAPER: This white paper describes the results of a global survey of 160 respondents across 22 different industry sectors in the Americas, EMEA and APJ from December 2015 through February 2016 to understand how effective organizations are at detecting and investigating cyber threats.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA

Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software
26 - 50 of 1104 Matches Previous Page    1 2 3 4 5    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement