Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
76 - 100 of 931 Matches Previous Page  |  Next Page
Special Report: Compromised Data in the Dark Web
sponsored by SurfWatch Labs
WHITE PAPER: This report reveals the findings of a Dark Web analysis, revealing an alarming amount of compromised data from one company alone.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SurfWatch Labs

A Strategic Partner for Proactive Security
sponsored by CrowdStrike
WHITE PAPER: This brochure explains how choosing the right security partner can help you thrive in today's dangerous cybercrime environment.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

CrowdStrike

Detect Threats in Real Time with SaaS Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: This brochure describes how a cloud-based platform can enhance your endpoint security capabilities.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

CrowdStrike

5 Best Practices to Make Security Everyone's Business
sponsored by Citrix
WHITE PAPER: This white paper presents the five steps you can take to help your end users advance your security strategy instead of hindering it.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Citrix

Case Study: Achieving Next Generation Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: This case study describes how a managed care provider strengthened its security by obtaining visibility into all endpoints across the network.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Make Your Security Proactive, Not Reactive
sponsored by CrowdStrike
WHITE PAPER: This report explains how indicators of attack – suspicious behaviors that can alert organizations to a potential hacks – can be instrumental in preventing sophisticated, targeted attacks.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Cyber Attack Survival Checklist
sponsored by CrowdStrike
WHITE PAPER: This cyber-attack survival checklist will help you avoid common mistakes and eliminate deficiencies within your existing security measures.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

4 Secrets to Security: Engaging a Meaningful Dialogue
sponsored by Citrix
WHITE PAPER: Security is of greater interest to corporate boards than ever before and an effective security strategy is crucial. This white paper highlights 4 ways to engage your board of directors in a meaningful discussion about security-related risks.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Citrix

Strengths and Weaknesses of 13 SIEM Solutions
sponsored by AlienVault
WHITE PAPER: This Gartner report provides detailed reviews of the strengths and weaknesses of 13 different SIEM solutions.
Posted: 30 Jul 2015 | Published: 20 Jul 2015

AlienVault

Strategic Migration Planning Guide: Weblogic to JBoss Enterprise Application Platform
sponsored by Red Hat
WHITE PAPER: Read about the proven five-step process designed to identify migration opportunities, examine the risks associated with various migration scenarios, create a standard enterprise environment, and develop a comprehensive and strategic migration plan to the JBoss Enterprise Application Platform.
Posted: 28 Jul 2015 | Published: 30 Sep 2014

Red Hat

Beyond Malware: Detecting the Undetectable
sponsored by CrowdStrike
WHITE PAPER: This report details how successful attacks targeting high-profile government and corporate entities are able to easily bypass traditional defenses.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

CrowdStrike

Case Study: Meeting Compliance with Secure Document Capture and Printing
sponsored by Nuance
WHITE PAPER: Read this case study to discover how the VHA implemented secure document and print management solutions for improved security, compliance, and quality of care.
Posted: 27 Jul 2015 | Published: 31 Dec 2014

Nuance

Cyber Risk Report: Wide Range of Financials Targets Continue to Get Hit
sponsored by SurfWatch Labs
WHITE PAPER: This report uses data from recent financial sector attacks to discuss trends in financial sector security.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

SurfWatch Labs

Cyber Risk Report: Data Breaches and the Healthcare Industry
sponsored by SurfWatch Labs
WHITE PAPER: This white paper presents cybercrime statistics and trends that can help you stay secure despite the numerous threats facing the healthcare industry.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

SurfWatch Labs

Securing the Enterprise: 5 Key IT Challenges
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the five main challenges facing security professionals today. Read on to learn more about the causes of these security problems – and how you can overcome them.
Posted: 21 Jul 2015 | Published: 31 Dec 2013

Symantec Corporation

Strong Authentication without a Password
sponsored by Symantec Corporation
WHITE PAPER: This infographic explains how you can achieve strong authentication that's based on more than a simple password.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

Symantec Corporation

Securing Your Customers Online
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses how you can easily add a second level of authentication to your web applications without inconveniencing your users.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Symantec Corporation

Securing your Enterprise in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: This white paper addresses the issue of cloud security and discusses how you can invest in the cloud without putting your business at risk.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Symantec Corporation

Intelligence-Led Security: Develop a Concrete Plan
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper discusses the importance of proactive, intelligence-based security and gives suggestions for implementing it in your business.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

The Impact of Social Media On Information Security: What Every Company Needs To Know
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper can show you why security professionals need to pay attention to social media, and what you can do to implement secure social media practices in your organization.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

Connecting the Dots: How Threat Intelligence Uses its Data
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper demonstrates how truly effective threat intelligence systems work by presenting a case study where a threat intelligence system was used to uncover the source of an attack.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

Implementing Strong, Comprehensive Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the capabilities of a strong, comprehensive authentication system that will keep you safe in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Jul 2014

Symantec Corporation

Authentication for Today's Threat Landscape
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the capabilities of an authentication system that would be effective in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Dec 2011

Symantec Corporation

Endpoint Security: The Identity and Access Imperatives
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of integrating IAM with your endpoint security measures.
Posted: 17 Jul 2015 | Published: 30 Nov 2014

Symantec Corporation

Reaping the Benefits of Strong, Smarter User Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses what the changes in enterprise IT mean for implementing smart authentication practices.
Posted: 16 Jul 2015 | Published: 31 Oct 2013

Symantec Corporation
76 - 100 of 931 Matches Previous Page    2 3 4 5 6 7    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement