Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
51 - 75 of 1116 Matches Previous Page  |  Next Page
Top 6 Security Measures for the Enterprise Campus Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper details a next-generation security model that moves away from traditional security tools. Access now to learn how you can bring together all critical network security elements to provide an integrated security framework for your cloud-enabled enterprise.
Posted: 11 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

The MSP’s Complete Guide to Cyber Security
sponsored by Intronis
WHITE PAPER: Don't put off security talks until after it's too late. This white paper gathers stats and facts about cybersecurity in regards to SMBs. Learn about common cybersecurity mistakes SMBs constantly make and tips on how to approach cloud security.
Posted: 11 May 2016 | Published: 01 Apr 2016

Intronis

IBM QRadar - Sense and Detect Modern Threats with the Most Sophisticated Security Analytics Platform
sponsored by IBM
WHITE PAPER: This white paper shows you how to "sense" chains of malicious activities and rapidly deploy security tools across your entire network including cloud-based resources. Access now to greatly improve your remediation efforts and minimize potential damage to your organization.
Posted: 11 May 2016 | Published: 01 Apr 2016

IBM

4 Strategies for Keeping Critical Networks Secure
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn four major criteria for selecting the right long term security partner. Access now to find a security provider who can satisfy these major areas of concern and other areas of need for your organization.
Posted: 10 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

3 Major Challenges to Securing Your Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Get an overview of cloud strategies to help you address three major security challenges and protect your data as your organization evolves into a cloud-enabled enterprise.
Posted: 10 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

Move to the cloud with confidence.
sponsored by Verizon
WHITE PAPER: This white paper shows you how to safely connect with a variety of cloud providers to alleviate possible cloud apprehensions. Access now to learn more about how to easily, reliably and securely move to the cloud.
Posted: 10 May 2016 | Published: 31 Dec 2014

Verizon

Threat Defense Isn't Just About Detection: It's How Your Respond
sponsored by Intel Security
WHITE PAPER: Discover how to leverage endpoint detection and response (EDR) to create truly intelligent endpoints that automatically detect and respond to threats before they do their damage. Additionally, read on to see 5 criteria to look for when researching EDR solutions so you can determine which are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security

The Risks of Email and the Rewards of Innovative Encryption
sponsored by ZixCorp
WHITE PAPER: This white paper helps you better understand your organization's need for email encryption. It offers a comprehensive look at the types of people inside and outside of your business who may be exchanging sensitive customer or corporate information.
Posted: 10 May 2016 | Published: 01 Apr 2016

ZixCorp

Comprehensive Security for Cloud-based Email
sponsored by Symantec Corporation
WHITE PAPER: Understand today's biggest cloud threats – including overlooked security issues lurking in commonly used cloud-based productivity apps – and accurately assess how much protection your cloud needs.
Posted: 10 May 2016 | Published: 31 Dec 2015

Symantec Corporation

Understand Pass-the-Hash (PtH) Attacks and Mitigate the Risk
sponsored by Dell Software
WHITE PAPER: Go in depth and learn what a hash is and how a PtH attack can greatly impact your network. Learn how to mitigate these types of attacks with Privileged Password Manager and Privileged Session Manager.
Posted: 09 May 2016 | Published: 31 Dec 2014

Dell Software

Not all Next-Gen Firewalls are created equal
sponsored by Barracuda Networks
WHITE PAPER: This white paper shows you how to centrally control every aspect of your firewalls to maintain even data flow and security throughout your network. Access now learn more about a secure communication backbone that provides all the deep packet inspection and threat mitigation you need.
Posted: 09 May 2016 | Published: 01 Apr 2016

Barracuda Networks

SimpliVity Hyperconverged Infrastructure: Lab Validation Report
sponsored by SimpliVity
WHITE PAPER: In this white paper, you will discover hyperconverged infrastructure that creates backups quickly, efficiently and securely even across data centers. Access now to learn how to backup and restore important files with just two mouse clicks.
Posted: 09 May 2016 | Published: 01 Feb 2016

SimpliVity

Unlock the Key to Repel Ransomware
sponsored by Kaspersky Lab
WHITE PAPER: As cybercriminals realize that victims are often willing to pay for the release of their precious files, the prevalence of ransomware and its variations are on the rise. Learn about the common trends in this type of cybercrime and recommendations to help your organization avoid victimization.
Posted: 09 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Automate email encryption to best protect corporate data
sponsored by ZixCorp
WHITE PAPER: This white paper provides an overview of why it's important to encrypt every corporate email you send and receive. Access now to learn how you can automatically encrypt emails eliminating the risk of interception and allowing your business peace of mind.
Posted: 09 May 2016 | Published: 01 Apr 2016

ZixCorp

Bolster email security in Office 365 deployments
sponsored by ZixCorp
WHITE PAPER: Organizations looking to ensure the success of their Office 365 migration are carefully planning every aspect of their projects to reduce risk. Learn why email encryption capabilities should not be overlooked in those plans.
Posted: 09 May 2016 | Published: 01 Apr 2016

ZixCorp

How Sarbanes-Oxley Act (SOX) Compliance is Impossible without Privileged Management
sponsored by Dell Software
WHITE PAPER: This white paper addresses IT security compliance from an auditor's perspective. Access now to help your organization achieve and prove compliance with other security mandates as well.
Posted: 06 May 2016 | Published: 31 Dec 2015

Dell Software

How HIPAA Compliance is Impossible without Privileged Management
sponsored by Dell Software
WHITE PAPER: Achieving compliance with data security standards requires you to mitigate the risk of privileged access – in healthcare and other industries. Access this white paper now to learn how you can implement proven strategies to achieve regulatory compliance while fighting against other risks.
Posted: 06 May 2016 | Published: 31 Dec 2015

Dell Software

Barracuda NG Firewall Model F1000
sponsored by Barracuda Networks
WHITE PAPER: This white paper shows you how to centrally control your security system to prevent it from weakening over time as the infrastructure evolves. Learn how to strengthen your perimeter firewall protection while enabling flexibility to allow for change in the future.
Posted: 06 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Cost of Data Breach – Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: This report examines two factors that affect the financial consequences of a data breach. The first is executive involvement security strategy and response to data breaches. The second is the purchase of cyber insurance to mitigate the cost of a data breach. Access now to learn how to best mitigate cyber breaches and protect reputation.
Posted: 06 May 2016 | Published: 01 May 2015

IBM

Emergency Incident Response: 10 Common Mistakes of Incident Responders
sponsored by Intel Security
WHITE PAPER: Understand the top 10 common emergency incident response mistakes that organizations commonly make and how you can avoid making the same ones. Access now to prevent your enterprise from suffering from these shortcomings and ensure your current incident response practices are tested, effective and secure.
Posted: 06 May 2016 | Published: 31 Dec 2012

Intel Security

The 5 Characteristics of an Intelligence-Driven Security Operations Center
sponsored by Intel Security
WHITE PAPER: Access this report by Gartner to examine the challenges traditional security operations centers face, and how you can build an intelligence-driven one that can handle today's dynamic threat and risk environment.
Posted: 06 May 2016 | Published: 15 Nov 2015

Intel Security

Deliver reliable, fast, and secure networks for improved APM
sponsored by Ixia
WHITE PAPER: How can an intelligent visibility framework provide smarter application performance monitoring and enhance security tools? Get an overview of the benefits of these tools and what's needed to create a fast, reliable and secure network for greater customer satisfaction.
Posted: 06 May 2016 | Published: 01 Mar 2016

Ixia

Think Like an Attacker: Six Steps Toward Better Security
sponsored by Intel Security
WHITE PAPER: Discover why piecemeal endpoint defenses are not sufficient to protect against today's threat vectors as we take you inside the mind of an attacker to help you bolster your defenses. Read on to learn six ways to think like a hacker and why new threats require more than strategies and tools to keep the bad guys at bay.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Security that Plays Well with Others
sponsored by Intel Security
WHITE PAPER: As cyberattacks increase in volume and sophistication, organizations need to present a unified coordinated defense. Discover how an open, integrated security architecture can help you coordinate your siloed legacy security products and simplify the threat defense lifecycle.
Posted: 06 May 2016 | Published: 31 Dec 2015

Intel Security

Understanding Cyberthreat Motivations to Improve Defense
sponsored by Intel Security
WHITE PAPER: Find out why you must add cyber-criminal motivation to your threat taxonomy in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter and how this crucial understating of the hacker's mind can help protect your entire infrastructure.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security
51 - 75 of 1116 Matches Previous Page    1 2 3 4 5 6    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement