Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
51 - 75 of 924 Matches Previous Page  |  Next Page
4 Ways DNS Can Enhance Online Traffic & Security
sponsored by Neustar®
WHITE PAPER: In this white paper, discover 4 ways to optimize your DNS for better business and tighter security.
Posted: 02 Apr 2015 | Published: 11 Nov 2013

Neustar®

3 Questions to Ask Your DNS Host about Lowering DDoS Risks
sponsored by Neustar®
WHITE PAPER: Read this white paper to learn the three questions you absolutely need to ask your DNS host about DDoS protection.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Neustar®

Firewalls for Modern Asia-Pacific Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white papers analyzes how firewall vendors have attempted to respond to modern security needs and reviews 10 leading firewalls in the Asia-Pacific region.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Prepare Yourself for the Cybercrime of 2015
sponsored by FireEye
WHITE PAPER: This 2015 cybercrime report analyzes the threats of 2014 and makes predictions for what you need to be prepared for in the upcoming year.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

FireEye

Cloud Security in an Agile World
sponsored by Rackspace
WHITE PAPER: This white paper tells you exactly what security precautions need to be taken when using cloud services.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

Rackspace

Use ERM to bring together scattered GRC efforts
sponsored by Modulo
WHITE PAPER: Read this brief white paper to discover how using such a software can simplify your job and enhance your GRC management.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

Modulo

Security Best Practices for Amazon Web Services
sponsored by AlienVault
WHITE PAPER: In this white paper, learn how to be a smart user of AWS with tips for security best practices.
Posted: 31 Mar 2015 | Published: 12 Jan 2015

AlienVault

GRC: An Alternative  Approach to Spreadsheets in Risk Management
sponsored by Modulo
WHITE PAPER: This white paper outlines the cost and complexity reducing benefits offered by one GRC strategy.  View now to learn how to retire spreadsheets and manual processes.
Posted: 30 Mar 2015 | Published: 10 Sep 2014

Modulo

Two Industry Experts Offer Top Tips For Records Management
sponsored by Iron Mountain
WHITE PAPER: Access this helpful e-guide to learn from two compliance experts about the key steps to developing a records and information management privacy compliance program, as well as the risks companies potentially face by not getting rid of data.
Posted: 30 Mar 2015 | Published: 30 Mar 2015

Iron Mountain

Cybercrime 101
sponsored by Global Knowledge
WHITE PAPER: Discover the ways in which cybercrime occurs in three realms: individual, business, and governmental. Learn what you can do to protect yourself and your organization.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Global Knowledge

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline and enhance your risk management strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

How to Create a Successful Cloud Computing Strategy For Your Business
sponsored by IBM
WHITE PAPER: This white paper explains how to create a proactive, effective approach to cloud computing and why it can help set your business on the path to success.
Posted: 25 Mar 2015 | Published: 30 Sep 2014

IBM

Why Every IT Security Team Needs Anomaly Detection Software
sponsored by Prelert
WHITE PAPER: This white paper gives you the ins and outs of anomaly detection, including how it works and what its benefits are.
Posted: 25 Mar 2015 | Published: 31 Dec 2014

Prelert

Absence Management - A Guide to Developing a Strategy to Minimize Cost and Risk
sponsored by Workforce
WHITE PAPER: Access this white paper to find out why absence management is so important to minimizing cost and risk.
Posted: 25 Mar 2015 | Published: 31 Jan 2015

Workforce

The Executive's Guide to Breach Response
sponsored by Hewlett-Packard Limited
WHITE PAPER: Download this white paper for a step-by-step guide on how to lead your organization through a crisis with comprehensive planning, sound leadership, and more.
Posted: 25 Mar 2015 | Published: 31 Jan 2015

Hewlett-Packard Limited

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Limited
WHITE PAPER: This survey reveals how IT professionals view effective executive involvement in threat mitigation.
Posted: 24 Mar 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

Why Role Management has the Spotlight
sponsored by SailPoint Technologies
WHITE PAPER: Uncover how role management can help your organization manage information security and corporate risk in three key areas. Access now to learn more.
Posted: 24 Mar 2015 | Published: 04 Dec 2013

SailPoint Technologies

The Secret To Finding Unknown IT Security Threats
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how predictive analytics and adaptable machine learning can enhance your security and protect you from even the worse threats.
Posted: 24 Mar 2015 | Published: 18 Mar 2014

Prelert

Distilling Alert Noise to Find Real Problems
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how anomaly detection programs can lower your rates of false positives and make security management much more efficient.
Posted: 24 Mar 2015 | Published: 04 Mar 2015

Prelert

A Comprehensive Security Intelligence Platform
sponsored by IBM
WHITE PAPER: Download this paper to discover the pros and cons of an SIEM platform and to determine if this is the one that meets your needs.
Posted: 23 Mar 2015 | Published: 30 Sep 2014

IBM

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article gives you seven foolproof steps towards setting up insider security with less disruption and better accuracy.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

Case Study: Catching Virtual Thieves
sponsored by Prelert
WHITE PAPER: In this brief case study, discover a crime on intellectual property that came very close to slipping through the cracks.
Posted: 23 Mar 2015 | Published: 16 Jan 2015

Prelert

Find the Anomalies in Your Unstructured Data
sponsored by Prelert
WHITE PAPER: This article introduces an anomaly detection program aimed to aid with the analysis of unstructured data.
Posted: 23 Mar 2015 | Published: 27 Feb 2015

Prelert

The Secret To Reducing False Alerts
sponsored by Prelert
WHITE PAPER: Take a look at this brief article to discover how anomaly detection can lower your rate of false positives.
Posted: 23 Mar 2015 | Published: 22 May 2014

Prelert

Quarterly Cybercrime Report
sponsored by IBM
WHITE PAPER: This security report will help you stay up to date on changing cybercrime trends.
Posted: 20 Mar 2015 | Published: 30 Nov 2014

IBM
51 - 75 of 924 Matches Previous Page    1 2 3 4 5 6    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement