Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
26 - 50 of 1131 Matches Previous Page  |  Next Page
When App is the Business, the Business is the App Vol. 2
sponsored by IBM MaaS360
WHITE PAPER: Empower your organization with a mobile application strategy that advances your business while providing scalability, sustainability and security. Learn how to design your business around applications without putting enterprise data at risk.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

When Business is the App, The App is the Business - Vol 1
sponsored by IBM MaaS360
WHITE PAPER: Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices, that are critical to employee productivity and smooth business operations.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

A Powerful Platform for Cloud Security Analytics
sponsored by Exabeam
WHITE PAPER: Security architects and SOC managers need a solution for integrating activity across all deployments and making sense of behavior in an open, cloud-based architecture. Discover how you can analyze account lockouts, detect unusual access patterns, and prevent data loss while allowing your organizations to continue growing with the cloud.
Posted: 20 May 2016 | Published: 31 Dec 2015

Exabeam

Accelerate the Investigation Process to Find, and Root out Attackers
sponsored by Exabeam
WHITE PAPER: User behavior intelligence and security session assembly can help enterprises root out attackers that impersonate employees. Discover how the right solution can help you give more complex tasks to junior security analysts while speeding up data analysis.
Posted: 20 May 2016 | Published: 31 Dec 2014

Exabeam

Detect, Prioritize, and Respond to Modern Cyber Attacks
sponsored by Exabeam
WHITE PAPER: They need the ability to automatically analyze user behavior to respond effectively. Learn how to leverage existing log data to detect modern attacks and prioritize incidents efficiently. Used correctly, user behavior analytics adds a powerful analytics layer over existing security technologies, guiding a more effective response to attacks.
Posted: 20 May 2016 | Published: 31 Dec 2015

Exabeam

Moving from Monitoring to Blocking Content - 5 Best Practices
sponsored by Intel Security
WHITE PAPER: Whatever the cause - subpar security, human error, unmanaged endpoints, etc. - data loss prevention (DLP) is more important than ever. Your security strategy must be context aware. Learn how to implement context aware, multi-layered content blocking without inhibiting business processes.
Posted: 19 May 2016 | Published: 01 Apr 2016

Intel Security

Protect Company Data with Encryption & Remote Management
sponsored by Intel Security
WHITE PAPER: Simplify enterprise security management with broad, centralized control and stronger, more efficient options for protecting endpoints. View now to stay ahead of emerging threats with proven TCO-friendly solutions that lock down endpoints and keep data secure without dragging down user or mobile-workforce productivity.
Posted: 19 May 2016 | Published: 01 Apr 2016

Intel Security

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection
sponsored by Intel Security
WHITE PAPER: DLP tactics & tools only work if you know how to use them properly. This data exfiltration study reveals the security tools, response plans and awareness training required to protect your infrastructure and prevent major losses.
Posted: 19 May 2016 | Published: 31 Dec 2015

Intel Security

Five Tips to Help Protect Your Data - From passive monitoring to proactive protection
sponsored by Intel Security
WHITE PAPER: Modern DLP needs to be rapidly incremental, focusing on derived value, successful preventative actions and increasing the risk threshold. Inside this white paper, you'll learn 5 key requirements to ensure your data protection efforts are successful.
Posted: 19 May 2016 | Published: 01 Apr 2016

Intel Security

The Productivity Transformation
sponsored by IBM MaaS360
WHITE PAPER: Your enterprise can't be left behind in this new era of productivity. Enable your employees by creating secure systems that can protect your data while living on less than enterprise secure devices.
Posted: 19 May 2016 | Published: 01 Mar 2016

IBM MaaS360

Gemalto SafeNet Keysecure for MongoDB Encryption Key Management for MongoDB Native Encryption
sponsored by Gemalto
WHITE PAPER: Increase in opportunity comes with increase in risk. Greater encryption and key management can make accumulating big data a breeze. Learn how to ensure your data protection platform is flexible to work across all data types and all locations where your data lives.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

Gemalto SafeNet KeySecure
sponsored by Gemalto
WHITE PAPER: This white paper shows you how to easily manage keys for a variety of encryption locations. Centralize your encryption and key management for lower cost of administration.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

Gemalto’s SafeNet Encryption Connectors a Complete, Enterprise-Ready Encryption Platform
sponsored by Gemalto
WHITE PAPER: With all your different types of data and all the different locations is resides, you need a flexible data protection solution with uniform controls across your entire landscape. Learn how you can encrypt both data at rest and data in motion that flows across your network or between data centers.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

2015 the Year Data Breaches Got Personal
sponsored by Gemalto
WHITE PAPER: Data breaches continue to be a large and growing threat for organizations in all industries. Many are clinging to conventional ways of looking at cyber security rather than taking a newer approach. With this cybercrime data, you'll be able to formulate a modern security strategy to stay ahead of evolving threats and hackers.
Posted: 18 May 2016 | Published: 31 Dec 2015

Gemalto

Mobile is the New Playground for Thieves
sponsored by IBM MaaS360
WHITE PAPER: You need to modernize your security with a robust way to proactively detect, analyze and remediate new mobile threats. Learn the true cost of a data breach and how to best implement your own BYOD policy.
Posted: 18 May 2016 | Published: 31 Dec 2015

IBM MaaS360

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM MaaS360
WHITE PAPER: Your goal is to make BYOD policies feasible by seamlessly securing corporate data on the device while providing logical separation from personal activities. Learn five key steps you should consider before putting your BYOD program in place.
Posted: 18 May 2016 | Published: 31 Dec 2012

IBM MaaS360

Encrypt Everything How to Unshare and Secure Your Sensitive Data Wherever It Resides
sponsored by Gemalto
WHITE PAPER: Encryption is the key to unsharing your sensitive data. Learn a multitier plan that helps you protect your perimeter while also encrypting data in every level, moving or at rest. Identify where your sensitive data lives to better understand your IT environment.
Posted: 17 May 2016 | Published: 01 Apr 2016

Gemalto

Market Focus Double Vision
sponsored by Gigamon
WHITE PAPER: It's time to get real with security realities. Understand how to achieve greater visibility into your network traffic and learn where other organizations stand in the cyber security war.
Posted: 17 May 2016 | Published: 01 Feb 2016

Gigamon

Ten ways to save money with IBM data protection
sponsored by IBM
WHITE PAPER: Discover 10 ways you can employ your data protection system to help you organize files while addressing modern data protection challenges, and save money.
Posted: 17 May 2016 | Published: 31 Jul 2015

IBM

E-Waste Is More Than Just Clutter
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

Why IT Leaders Are Buying into Mobile Security
sponsored by Lookout
WHITE PAPER: As mobile devices continue to play a major role in productivity, the likelihood for targeted cyber-attacks will continue to intensify. Discover how CIOs prioritize their mobile security investments today, and ensure mobility doesn't become a liability to your organization—even with the risk of data breach.
Posted: 17 May 2016 | Published: 17 May 2016

Lookout

IT Guide: Windows 10 Migration Minus The Complexity
sponsored by Druva Software
WHITE PAPER: With six steps, you can leverage endpoint data protection to help you ease into OS migration. Learn how to craft a migration plan that drastically simplifies the OS refresh process and provides comprehensive data protection and governance foundation for your organization.
Posted: 16 May 2016 | Published: 31 Dec 2015

Druva Software

Understanding How IBM Spectrum Protect Enables Hybrid Data Protection
sponsored by IBM
WHITE PAPER: Moving to a hybrid cloud infrastructure is a no-brainer for many organizations as it provides greater efficiency and cost effectiveness. But, choosing a cloud services provider who provides the best data protection isn't as clear. Learn what to look for when architecting your hybrid cloud solution and how to best protect your backups.
Posted: 16 May 2016 | Published: 31 Aug 2015

IBM

Your Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.

Defending Your Office 365 Data: A Complete Guide
sponsored by Datto, Inc.
WHITE PAPER: Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.
26 - 50 of 1131 Matches Previous Page    1 2 3 4 5    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement