Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
51 - 75 of 1080 Matches Previous Page  |  Next Page
Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 27 Jun 2016 | Published: 01 May 2016

Intel Security

UK’s Hottest Banking FraudSchemes
sponsored by IBM
WHITE PAPER: Leading cybersecurity authority Limor Kessem teaches you top fraud threats to UK banking institutions and the impact cybercrime is having on them today. You'll learn top cybercrime trends and the scale at which these practices are growing.
Posted: 27 Jun 2016 | Published: 01 May 2016

IBM

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
WHITE PAPER: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 24 Jun 2016 | Published: 01 May 2016

Citrix

Top 10 Reasons to choose EMC Data Protection Solutions
sponsored by Richardson Eyres
WHITE PAPER: Learn 10 reasons why changing your data protection platform to enable efficiency and TCO is a must. Discover enterprise-class data protection across on premise, virtualized, hybrid, and cloud consumption models.
Posted: 23 Jun 2016 | Published: 01 May 2016

Richardson Eyres

The Axway MFT Solution Transcript
sponsored by Axway
WHITE PAPER: It's critical your organization implements MFT to manage and secure the giant wave of data moving forward. MFT is innovating, securing and optimizing business for the future. Whether your organizational value is banking transactions, trades, manufacturing, etc., MFT can increase customer satisfaction and engagement.
Posted: 23 Jun 2016 | Published: 01 May 2016

Axway

Secure File Transfer Lifecycle
sponsored by Axway
WHITE PAPER: This presentation transcript highlights how two globally recognized companies maintain brand equity and commerce by securing, scaling and optimizing their data and file exchange capabilities. Discover how to maximize the transfer, communication and security of information between your headquarters and your global community.
Posted: 22 Jun 2016 | Published: 01 May 2016

Axway

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

IBM Security Trusteer Pinpoint Detect Solution Brief
sponsored by IBM
WHITE PAPER: You need a fundamentally different approach to detecting fraud that will also decrease false positives. Discover how to build fraud detection based on visibility, global threat intelligence and agility. Simplify your approach and accurately identify fraud throughout the entire fraud lifecycle.
Posted: 21 Jun 2016 | Published: 01 May 2016

IBM

Analyze this: Security analytics for the midrange enterprise
sponsored by SAS
WHITE PAPER: How do you define security analytics? Discover how other organizations define security analytics and uncover the key benefits to an analytics program. Learn how you can assess security performance to make better spending and policy decisions.
Posted: 21 Jun 2016 | Published: 01 May 2016

SAS

IBM Security Trusteer Fraud Protection Suite solution brief
sponsored by IBM
WHITE PAPER: Discover more accurate fraud detection and gain greater visibility and adaptability across the fraud management lifecycle.
Posted: 21 Jun 2016 | Published: 01 May 2016

IBM

Re-Thinking Your Data Flow Transmission for Security Risk and Compliance
sponsored by Axway
WHITE PAPER: A comprehensive managed file transfer solution provides off-the-shelf integration with common security products and end-to-end visibility into and monitoring of file transfers. It will help you ensure the rapid onboarding of new customers and partners, as well as governing interactions with trading partners.
Posted: 20 Jun 2016 | Published: 01 May 2016

Axway

‘PowerShell’ Deep Dive: A United Threat Research Report
sponsored by Carbon Black
WHITE PAPER: Learn more about PowerShell and how cybercriminals are using it to expedite their criminal activities. This report outlines several techniques attackers use to leverage PowerShell to gain access to organizations' endpoints and provides suggestions on how security teams can detect, prevent and respond to such attacks.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black

Stop Ransomware with Carbon Black
sponsored by Carbon Black
WHITE PAPER: Re-imaging security methods will never be the right solution to this problem. Learn about the tools imperative in preventing, detecting and remidiating randsomeware threats to your endpoints. Get greater visibility through continuous monitoring throughout your whole network.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black

Mobile Application Security Report 2016
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover just how much of your data is being collected and to what extent applications can access your data. Learn precautionary steps you can take to make sure applications aren't grabbing data you don't want them to and make responsible choices when downloading apps.
Posted: 16 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

The Breach Detection Gap and Strategies to Close It
sponsored by Infocyte
WHITE PAPER: What's needed is a layered approach to breach discovery that includes looking for threats which have slipped past the perimeter. Discover how to catch what prevention technologies miss. Reduce the breach detection gap and learn now to mitigate the possible damage caused by prolonged unauthorized access.
Posted: 15 Jun 2016 | Published: 01 May 2016

Infocyte

Clustering for Axway SecureTransport
sponsored by Axway
WHITE PAPER: Learn how to successfully implement clustering for MFT and other business-critical services in your organization. Get proven expertise to leverage an enhanced MFT gateway that supports Standard Clustering and Enterprise Clustering to meet a wide range of capacity requirements and help your organization ensure business continuity.
Posted: 15 Jun 2016 | Published: 31 Dec 2012

Axway

Employing Cyber Threat Intelligence
sponsored by Anomali
WHITE PAPER: Cyber threat intelligence is fast becoming a cornerstone in enterprise security but are you using your various intelligence feeds most effectively? Learn how organizations large and small are increasingly adding threat intelligence to their security posture and see what type of attacks you can mitigate using threat intelligence.
Posted: 15 Jun 2016 | Published: 01 Feb 2016

Anomali

Timeline of Disruption- A history of disrupting the business of hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn about the history of enterprise security: from its conception until today. See how hacking has disrupted business innovation over the years and understand why your organization must continue to innovate fearlessly.
Posted: 15 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

How business innovations meet the business of hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Hackers are sophisticated but what does that mean for your business? Explore the business of hacking. Discover the different ways cybercriminals make money, their motivations and different hacking organizations.
Posted: 14 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

Axway SecureTransport Enhanced Managed File Transfer Gateway
sponsored by Axway
WHITE PAPER: Handle everything from high-volume automated file transfers between systems, sites and lines of business to user-driven communications and mobile file sharing. Ensure you're ready for high-growth uses cases while maintaining corporate controls and visibility.
Posted: 14 Jun 2016 | Published: 31 Dec 2015

Axway

Lighting a Path to PCI Compliance
sponsored by Illumio
WHITE PAPER: Adaptive Security Platforms (ASP) can ensure PCI compliance and audit preparation across a wide spectrum of standards. Read on to uncover how your enterprise can protect cardholder data, implement strong access control measures, maintain an information security policy, and more.
Posted: 13 Jun 2016 | Published: 31 Dec 2015

Illumio

Putting the “Secure” in Secure Remote Access
sponsored by Citrix
WHITE PAPER: Security pros today are challenged to establish comprehensive protection for all kinds of remote access use cases. Learn how you can deliver a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.
Posted: 13 Jun 2016 | Published: 01 May 2016

Citrix

Most Effective Security Technologies and Practices
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how understanding the business of hacking and how cybercriminals profit can help you develop a successful security strategy.
Posted: 13 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

Fraud risk engines strike back
sponsored by IBM
WHITE PAPER: Discover how to approach fraud detection in a new way. You must base your stance on three core principles —visibility, a global threat intelligence network, and agility by design. By using this approach, you can significantly reduce the number of false positives and can improve customer satisfaction.
Posted: 10 Jun 2016 | Published: 01 Feb 2016

IBM

Fraud protection doesn't have to be an uphill battle
sponsored by IBM
WHITE PAPER: You can simplify the fraud protection process while reducing time and cost. Learn how to achieve greater visibility and adaptability across the fraud management lifecycle and discover highly effective intelligence- and evidence-based fraud detection with fewer false positives.
Posted: 10 Jun 2016 | Published: 01 May 2016

IBM
51 - 75 of 1080 Matches Previous Page    1 2 3 4 5 6    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement