Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
76 - 100 of 994 Matches Previous Page  |  Next Page
Your Legal Liability Following a Cybersecurity Breach
sponsored by SurfWatch Labs
WHITE PAPER: This resource explores recent legal rulings that put more pressure on organizations to develop a comprehensive cyber risk management program. Read on to discover how an effective threat intelligence strategy can enable you to defend against the growing litigation that inevitably results from being the victim of a cyberattack.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SurfWatch Labs

ICS Survey
sponsored by SurfWatch Labs
WHITE PAPER: This white paper shows the security survey results taken by 314 industry respondents. Access now to learn about organizational breach concerns and how businesses have responded to recent threats.
Posted: 31 Mar 2016 | Published: 30 Jun 2015

SurfWatch Labs

How to Secure Health Records on the Screen
sponsored by OptioLabs
WHITE PAPER: This white paper describes the unique challenges and privacy of data in the healthcare domain where every display represents a potential point of leakage.
Posted: 31 Mar 2016 | Published: 29 Feb 2016

OptioLabs

How to Choose the Right Cyber Threat Intelligence Provider
sponsored by SurfWatch Labs
WHITE PAPER: This white paper teaches you what your organization should look for from its threat intelligence software. Learn how to bring cybersecurity in line with your business operations, provide necessary context to prioritize and take meaningful action on specific threats.
Posted: 30 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Defending against POS Malware
sponsored by AlienVault
WHITE PAPER: This white paper takes a look at PoS security and some of the common types of malware used to exploit these systems. Access now to learn about the wide range of hardware and applications, including ubiquitous POS terminals in retail locations.
Posted: 30 Mar 2016 | Published: 01 Feb 2016

AlienVault

Cyber Risk Report - Year in Review
sponsored by SurfWatch Labs
WHITE PAPER: This white paper provides high-level insight on both what cybercriminals are targeting and how they operated over the course of 2015. Learn about the evolving tactics used and how they are impacting business.
Posted: 29 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

The Human Factor Report
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 29 Mar 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

The Importance of Threat Intelligence, Visibility and Disrupting the Kill Chain
sponsored by Dell SecureWorks
WHITE PAPER: This white paper shows you a better, more comprehensive approach to endpoint security challenges. Learn how to catch bad network behavior and learn telltale signs that a breach is imminent.
Posted: 28 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Securing the Enterprise - 5 Pragmatic Steps to Security
sponsored by Dell SecureWorks
WHITE PAPER: This white paper presents five major areas of focus for the practical CISO. Build a culture of security across your organization and ensure all employees understand that no one is excluded from responsibility.
Posted: 28 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

ForeScout CounterACT- Datasheet
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores ways to continuously monitor network traffic and ways to integrate your networking infrastructure to identify devices as soon as they access the network.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

ForeScout Technologies, Inc.

Norwich School - Case Study
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper describes the network security challenges that Norwich School faced and how they found a solution that met their every need. Access now to learn how you can have increased visibility and save time by easily identifying potential threats before they become a major problem.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

ForeScout Technologies, Inc.

Credit Union Infographic
sponsored by SurfWatch Labs
WHITE PAPER: This white paper shows you exactly why you need cyber threat intelligence to defend your sensitive data. With continuous monitoring technology, you'll learn about breaches the moment they occur and be able to mitigate risk accordingly.
Posted: 28 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Privacy Shield: The New Data Transfer Agreement
sponsored by UKFast
WHITE PAPER: In this white paper, you will learn how to take advantage of cloud versatility, best-of-breed technology and enterprise-grade infrastructure without opening up customer data to the uncertainties of global entangled hosting infrastructures.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

UKFast

Building a Business Case for Cyber Threat Intelligence
sponsored by SurfWatch Labs
WHITE PAPER: This white paper gives you 5 main reasons for a risk-based approach to cybersecurity. Access now to learn how you can know the specific cyber threats targeting your business redirect your cyber tactics for the most effective defense and bring cybersecurity into the broader risk discussion.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Rapidly Detect and Respond to the Advanced and Evasive Threat
sponsored by Dell SecureWorks
WHITE PAPER: This white paper explores the benefits of combining advanced network and endpoint detection technology with the right people, processes and intelligence for greater visibility of threats.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

7 Key Questions to Ask When Selecting an Incident Response Service Provider
sponsored by Dell SecureWorks
WHITE PAPER: This white paper is designed to make you ask tough, direct questions of any incident response services provider to help you determine their capabilities.
Posted: 24 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Securing mobile productivity for Microsoft Office 365
sponsored by IBM
WHITE PAPER: This white paper explains the importance of deploying and securing the Microsoft ecosystem across all mobile platforms, including Windows 10. Access now and start efficiently managing your enterprise productivity, connectivity and security in today's hostile mobile world.
Posted: 23 Mar 2016 | Published: 01 Feb 2016

IBM

Determining the True Costs of a Data Breach
sponsored by Dell SecureWorks
WHITE PAPER: This white paper takes an in-depth look at the true costs of a data breach. Keep reading to learn steps and tips you may take to determine and reduce the cost of your next breach.
Posted: 23 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Oracle’s Engineered Systems Approach to Maximizing Database Protection
sponsored by Oracle, in association with Intel
WHITE PAPER: Access this white paper and discover how your organization can gain better backup and recovery performance to meet stringent RPO and RTO SLAs, reduced data loss exposure, increased data integrity, and greater application user satisfaction.
Posted: 22 Mar 2016 | Published: 01 Jan 2016

Oracle, in association with Intel

Case Study: Protect Against Prescription Fraud with EPCS
sponsored by Imprivata
WHITE PAPER: The case study outlines Cambridge Health Alliance's drivers for implementing electronic prescribing of controlled substances (EPCS), and strategies and technologies for meeting DEA requirements. Gather best practice advice to help your healthcare organization achieve EPCS success.
Posted: 22 Mar 2016 | Published: 31 Dec 2015

Imprivata

Multi-Factor Authentication for Government Installations
sponsored by Aruba Networks
WHITE PAPER: This white paper offers a multilayers security solution that's customizable according to your organization's needs. Read now to learn about policies that can be changes per-user requirements and enforced regardless if connecting to wireless, wired or VPN.
Posted: 22 Mar 2016 | Published: 01 Feb 2016

Aruba Networks

Definitive eGuide: Mobility and IoT cuasing IT headaches? Connect and protect with Adaptive Trust
sponsored by Aruba Networks
WHITE PAPER: This white paper outlines the pre-planning and deployment steps needed to help guide you on your journey of enterprise BYOD and IoT. Learn how greater visibility and the integration of your policy decision engine with third-party security solutions can enhance your ability to offer end-to-end mobile protection.
Posted: 22 Mar 2016 | Published: 01 Feb 2016

Aruba Networks

Formulate a Game Plan for Closing the SecOps Gap
sponsored by BMC
WHITE PAPER: Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

BMC

Next-Generation Endpoint Security Market Sizing and Forecast 2016–2020
sponsored by Carbon Black
WHITE PAPER: This EMA research report provides "beyond the surface" insight on variety of enterprise-capable solution providers. Access this report now and learn about research focused on solution providers providing proactive next-generation endpoint security services covering prevention, detection and response.
Posted: 29 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Overcome the Attacker Advantage with McAfee Endpoint Security 10
sponsored by Intel Security
WHITE PAPER: This white paper shows you how to respond and manage the threat defense lifecycle and a provide collaborative, extensive framework to reduce the complexity of conventional multivendor environments.
Posted: 25 Mar 2016 | Published: 31 Dec 2015

Intel Security
76 - 100 of 994 Matches Previous Page    2 3 4 5 6 7    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement