Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
76 - 100 of 900 Matches Previous Page  |  Next Page
Elevate Cybersecurity: Understanding from the Server Room to the Board Room
sponsored by SurfWatch Labs
WHITE PAPER: Through cyber threat intelligence, you can connect the server room to the board room. Read on to learn how cyber threat inteligence bolsters your security.
Posted: 12 Jan 2016 | Published: 30 Dec 2015

SurfWatch Labs

Cyber Risk Intellegence for Credit Unions
sponsored by SurfWatch Labs
WHITE PAPER: This white paper outlines how credit unions can use cyber risk intelligence to prevent data breaches. Read on to learn how to improve your cyber security practice as well reduce the level of effort needed to protect your financial institution.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

SurfWatch Labs

Is Your Network Safe? Identifying Most Overlooked Endpoint of Them All
sponsored by HP Limited
WHITE PAPER: In this white paper, you will highlight the most critical vulnerabilities that network-connected printers pose. Read on now to enforce user authentication, admin passwords, and printer feature restriction for your network-connected endpoints.
Posted: 12 Jan 2016 | Published: 31 Jan 2015

HP Limited

The 10 Essential Network Security Best Practices for 2016
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this infographic, you will discover the top 10 essential, expert-recommended security best practices for identifying issues in real time and addressing the majority of attacks anticipated in 2016. Access this graphic to bolster your network defenses and prepare for ransomware that targets Android devices and Mac laptops, and more.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

WatchGuard Technologies, Inc.

A Guide to Advanced Threat Detection for Sensitive Enterprise IP
sponsored by Interset Software Inc.
WHITE PAPER: In this white paper, you will explore the unique challenges of protecting critical enterprise data and examine a holistic approach to protecting your sensitive data that utilizes advanced behavioral analytics to safeguard your high-value IP.
Posted: 08 Jan 2016 | Published: 31 Dec 2015

Interset Software Inc.

A Guide to Essential Analytics Tools for New Healthcare Models
sponsored by SAS
WHITE PAPER: In this resource, you will compare the differing types of episode analytics, and discover how healthcare providers use these analytics for payment bundling in real-world scenarios. Read on now to discover how to reduce variations that will negatively impact care outcomes and lead to higher costs.
Posted: 06 Jan 2016 | Published: 31 Dec 2014

SAS

Hospitality and Cybercrime: How to Safeguard Sensitive Information
sponsored by SurfWatch Labs
WHITE PAPER: This white paper explores the many cyber-risks faced by the hospitality sector. Access it and discover just how much your business is at risk – and what you can do about it.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

SurfWatch Labs

Case Study: School District Stops Breaches with Heightened Network Visbility
sponsored by Lancope
WHITE PAPER: Access this case study to discover how a large school district blocked breaches with network visibility, improved its incident response time, and more.
Posted: 30 Dec 2015 | Published: 30 Dec 2015

Lancope

Cybersecurity Predictions for 2016: Targeting the Human Factor
sponsored by Proofpoint, Inc.
WHITE PAPER: This article provides deep insights into how advanced cybercriminals will improve their social engineering tactics in the future. Take a look to prepare for the evolving threats of 2016.
Posted: 29 Dec 2015 | Published: 29 Dec 2015

Proofpoint, Inc.

Case Study: Government Institution Gains Deeper Security Insight
sponsored by ThreatConnect
WHITE PAPER: In this case study, discover how a government institution obtained greater insight into security threats by implementing predictive defenses, threat intelligence, and more.
Posted: 21 Dec 2015 | Published: 21 Dec 2015

ThreatConnect

The Frightening Fraud Landscape of 2016: Predictions from the Experts
sponsored by Easy Solutions
WHITE PAPER: This blog post gives you a quick breakdown of the kinds of cyber-fraud you need to look out for in 2016. Read on for an essential look into the future of online fraud.
Posted: 17 Dec 2015 | Published: 26 Nov 2015

Easy Solutions

Advanced Session Security
sponsored by CA Technologies
WHITE PAPER: Surveys show that IT security experts have identified session hijacking as one of the top three security risks. Access this white paper and uncover details on two highly successful methods for enhancing session security.
Posted: 16 Dec 2015 | Published: 16 Dec 2015

CA Technologies

New Recommendations From FFIEC on Extortion Attacks
sponsored by Easy Solutions
WHITE PAPER: Recently, the Federal Financial Institutions Examinations Council (FFIEC) issued a statement warning financial institutions of the cyber-risks they face and suggesting steps for avoiding those risks. Access this article for a summary of the most important information and guidelines to come out of the FFIEC statement.
Posted: 15 Dec 2015 | Published: 17 Nov 2015

Easy Solutions

Applying the "Diamond Model" of Threat Intelligence
sponsored by ThreatConnect
WHITE PAPER: This white paper takes a fun and humorous approach to breaking down how successful hacks occur and how they can be prevented.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

ThreatConnect

Proactive Incident Response: Prepare Now or Pay Later
sponsored by Blue Coat Systems
WHITE PAPER: This infographic features a proactive approach to incident response. Discover how to gain visibility and reduce response time by recording and analyzing all network traffic, earning you up to 55% in savings by reducing costs associated with data breaches.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

Blue Coat Systems

Government Worker Privacy Survey
sponsored by OptioLabs
WHITE PAPER: This survey report discusses the risks government agencies face when sensitive information is clearly displayed on a computer screen and gives suggestions for mitigating those risks.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

OptioLabs

Reduce risk and maximize quality with Dell Data Modernization
sponsored by Dell, Inc.
WHITE PAPER: the following white paper, learn about the dangers of cutting corners in data modernization and uncover a system that can help organizations get a better handle of modernization without needing to place excess stress on IT.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

Dell, Inc.

Insider Threats in the Real World
sponsored by OptioLabs
WHITE PAPER: This white paper introduces an approach to security that reduces the risk of real life insider threats, including eavesdropping, shoulder-surfing, credentials theft, and more.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

OptioLabs

Executive Summary: Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: This white paper describes how to find a solution that addresses two main drivers of incident response (IR) costs. Discover key strategies for lowering costs and maximizing ROI when performing IR, with details on three maturity models.
Posted: 03 Dec 2015 | Published: 30 Sep 2015

Blue Coat Systems

Leveraging Your Data for Competitive Advantage
sponsored by Veritas
WHITE PAPER: Access this overview and learn how to build a data-driven culture from experts in the field of data management.
Posted: 01 Dec 2015 | Published: 01 Dec 2015

Veritas

Strategies for Advanced Threat Protection
sponsored by Symantec Corporation
WHITE PAPER: In this data sheet, you'll find a new strategy designed to uncover, prioritize, and remediate advanced attacks across all your endpoints. Access now and learn how to search for, discover, and remediate any attack artifacts across all of your endpoint systems.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Symantec Corporation

Exposing The Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper to learn how sandboxing has evolved to fight modern cybercrime and how the technology could secure your business.
Posted: 13 Nov 2015 | Published: 30 Jun 2015

Check Point Software Technologies Ltd.

How to Stop Today's Advanced Hackers
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper discusses how you can protect against any threat today's advanced hackers throw at you.
Posted: 13 Nov 2015 | Published: 19 Aug 2015

Check Point Software Technologies Ltd.

Combat the Rise of Malware
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This resource discusses the growing malware threat and gives suggestions for combatting zero-day attacks, non-executable attacks, and more.
Posted: 13 Nov 2015 | Published: 26 Oct 2015

Check Point Software Technologies Ltd.

A Strategic Approach to Combatting Security Threats Featuring ESG Analyst Jon Oltsik
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This paper discusses how organizations can take a more strategic approach to threat management by moving to a tightly integrated and centrally managed defense-in-depth architecture.
Posted: 12 Nov 2015 | Published: 31 Oct 2015

Check Point Software Technologies Ltd.
76 - 100 of 900 Matches Previous Page    2 3 4 5 6 7    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement