Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
51 - 75 of 1075 Matches Previous Page  |  Next Page
Get the Incident Responder’s Field Guide: Lessons from a Fortune 100 Incident Response Leader
sponsored by Digital Guardian
WHITE PAPER: The Digital Guardian Incident Responder's Field Guide provides a formal, coordinated approach for responding to security attacks that affect information assets. Written by Tim Bandos, a former Fortune 100 cyber security leader, this e-book provides easy-to-follow steps for crafting an Incident Response plan.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Digital Guardian

IT Security for Financial Sector
sponsored by Trustwave
WHITE PAPER: Learn why threats are growing and how to keep up with them in this white paper. See where financial organizations around the world are falling short of best security practices and how you can avoid making the next $50 million mistake.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

Prevention Is Futile in 2020: Protect Information Via Pervasive Monitoring and Collective Intelligence
sponsored by Imperva
WHITE PAPER: Now is the time to move toward people-centric and pervasive monitoring strategies to future-proof your organization. Read this report by Gartner to discover 4 critical shifts organizations need to implement to stay vigilant.
Posted: 19 Jul 2016 | Published: 01 May 2013

Imperva

2016 Security Pressures Report
sponsored by Trustwave
WHITE PAPER: The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.
Posted: 18 Jul 2016 | Published: 01 Jun 2016

Trustwave

3 Steps to Create a Data Protection Lifecycle Management Strategy
sponsored by Iron Mountain
WHITE PAPER: Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.
Posted: 15 Jul 2016 | Published: 01 Jun 2016

Iron Mountain

Security and Innovation Converge at Open Source Linux
sponsored by Red Hat
WHITE PAPER: Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

Red Hat

Migration Best Practices for Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: As IT systems age, they become more brittle. Download this white paper to understand the benefits of adopting the latest release of Red Hat Enterprise Linux—which will mitigate risk in the lifecycle of your server platform, and decrease the vulnerability of systems to security threats.
Posted: 15 Jul 2016 | Published: 29 Aug 2014

Red Hat

Asset Management Firm's Switch to Caché From a Relational Database Improves Performance, Reduces Risk
sponsored by InterSystems
WHITE PAPER: In this case study, explore how a global asset management firm based in Boston, MA transitioned from a relational database to Caché to help mitigate investment, operational, and technological risk. Tap into how they increased flexibility and reliability, boosted database performance, and more.
Posted: 11 Jul 2016 | Published: 30 Apr 2014

InterSystems

Cybersecurity Moves Toward Hybrid Models
sponsored by Dell SecureWorks
WHITE PAPER: Discover why the older "all or nothing" kind of relationship between organizations and information security service providers is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Dell SecureWorks

HIPAA Compliance & Risk Management
sponsored by Armor
WHITE PAPER: Develop a proactive strategy to circumvent security problems before they occur. Learn the latest HIPAA regulation requirements to improve internal procedures and reduce threats. Understand the possible threats and formulate policies on how to protect data while conforming to the necessary regulations.
Posted: 11 Jul 2016 | Published: 31 Dec 2015

Armor

Are You a Security-First Organization?
sponsored by Armor
WHITE PAPER: Regulations are not intended to tell businesses how to structure their security efforts, they are intended to be used as a guide against which the chosen security structure can be checked. Learn how to better structure your security posture to actually protect your assets rather than just looking like you're protecting them.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Armor

Assessing Cybersecurity Risk in a Breached World
sponsored by Infocyte
WHITE PAPER: It's imperative you include regular compromise assessments as part of your information and IT risk management strategy. Enable your operations team to catch what prevention and monitoring technologies miss, and learn how to best mitigate the possible damage that can be caused from persistent compromises before hackers make their move.
Posted: 06 Jul 2016 | Published: 01 Jun 2016

Infocyte

Incident Response Team: Transform Your IR Team From Reactive to Proactive
sponsored by ThreatConnect
WHITE PAPER: Discover how your IR team can become faster and more effective at protecting your network. Unite your people, processes, and technologies across your organization to eliminating barriers between the systems that used to slow you down.
Posted: 06 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

State of Application Security Report
sponsored by Arxan
WHITE PAPER: You know why mobile apps must be secure, now learn why in this white paper. It provides recommendations for how organizations and consumers can minimize the risk of their mobile apps being hacked and how app developers can improve protection.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

Arxan

Security Operations Center: Unite People, Processes, and Technologies Across Your SOC
sponsored by ThreatConnect
WHITE PAPER: Discover how to deepen your threat intelligence, validate it, prioritize it and act on it. Bring together the people, processes, and technologies that comprise your Security Operations Center (SOC) team, and the other teams you partner with on a daily basis. Automate mundane security tasks that slow you down by leveraging tools you already have.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

First Principles for Network Defenders: A Unified Theory for Security Practitioners
sponsored by Palo Alto Networks
WHITE PAPER: In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization. The three essential tasks that support the first principle are: threat prevention, threat detection, and threat eradication.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

Palo Alto Networks

A Business Case For Funding Your Insider Threat Program
sponsored by Forcepoint
WHITE PAPER: Insider threat is a growing issue that often exceeds expectations. While most organizations go to great lengths implementing background checks to vet employees; often the accidental insider and outsider turned insider (due to compromise), are overlooked. It is time for a new protect from within mentality.
Posted: 01 Jul 2016 | Published: 01 Jun 2016

Forcepoint

Three Critical Steps to Launch a Data Breach Response
sponsored by AllClear ID
WHITE PAPER: This resource highlights three critical steps in launching an effective incident response plan. Learn how to assemble a team, build communication channels with that team, draft different plans around specific incidents types and offer helpful services like identity theft protection.
Posted: 01 Jul 2016 | Published: 31 Dec 2015

AllClear ID

Infographic: Breach Preparedness
sponsored by AllClear ID
WHITE PAPER: This infographic shows you statistics from business executives and consumers on how they handle and perceive a data breach. Learn how to properly deal with a major breach now, before it's too late to formulate a proper breach response plan.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

7 Key Factors of a Highly Effective Application Protection Solution
sponsored by Arxan
WHITE PAPER: An effective application protection strategy is paramount to safeguarding the integrity and confidentiality of an application. This white paper discusses the 7 key factors that enable effective application protection, mitigating binary code risks and combating the latest security threats.
Posted: 30 Jun 2016 | Published: 01 May 2016

Arxan

Privileged Users
sponsored by Forcepoint
WHITE PAPER: Damage caused by Privileged Users is the most extensive, hardest to mitigate, and hardest to detect. However, a solution exists to mitigate the threat of Privileged User abuse. Read the "Privileged Users: Superman or Superthreat?" whitepaper for best practices and strategies for mitigating the threat within your organization.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

Defeating the Threat Within
sponsored by Forcepoint
WHITE PAPER: Your critical data can be stolen by someone who interacts with your network daily. You need the right plan before it happens. Learn about the new wave of insider threats and start planning now.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

Breach response: It's about keeping your customers safe
sponsored by AllClear ID
WHITE PAPER: Learn how to deliver a timely, organized breach response that boosts customers' confidence, repairs customers' identities if they've been victimized and helps minimize irreparable damage to your brand. Ensure peace of mind by giving your assurance that your organization values both their identities and their loyalties.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

Breach response isn't about losing data. It's about keeping your customers.
sponsored by AllClear ID
WHITE PAPER: The time to prepare for a data breach is today. Give your customers reassurance that they are taken care of and help resolve any harm done to their identity. Learn how to respond to customer queries effectively and reduce customer response time for any size breach to as little as 48 hours.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

Building a Vendor (IT) Risk Management Program
sponsored by BitSight
WHITE PAPER: Understand a vendor's security posture without requiring expensive site visits and penetration tests. Assess your vendors more frequently and focus efforts on those who have serious security issues.
Posted: 29 Jun 2016 | Published: 28 Apr 2016

BitSight
51 - 75 of 1075 Matches Previous Page    1 2 3 4 5 6    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement