Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
76 - 100 of 923 Matches Previous Page  |  Next Page
Why Data Protection Is the Cornerstone of Modern Enterprise Security
sponsored by Symantec
WHITE PAPER: According to IDC, by 2020, the amount of digital data is expected to reach 44ZB. In this white paper, explore various trends in data protection and security as well as an information-centric approach to data protection.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Symantec

Extend Your DLP to the Cloud
sponsored by Symantec
WHITE PAPER: With the rise of the cloud, your sensitive and compliance related data is at risk now more than ever. Find out how integrating your on premise Data Loss Prevention with CASB technology can enhance your cloud security.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Symantec

Why You Need to Control Shadow IT, Not Just Discover it
sponsored by Symantec
WHITE PAPER: The rapid, often uncontrolled, growth in the adoption of cloud apps creates a need for improved visibility – it's impossible to control what you cannot see. Read this white paper to uncover how to ensure your organization's safe migration to the cloud.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

Symantec

5 Practical Ways to De-Risk Your Big Projects
sponsored by Energized Work
WHITE PAPER: Every project carries risk, and if it doesn't, it's probably not going to add much value to your business. Learn how to effectively manage goals, communication, and user acceptance when undergoing complex digital business projects.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Energized Work

Enhance Your Security & Compliance for Amazon Web Services
sponsored by CloudPassage
WHITE PAPER: As enterprises move applications from traditional data centers to a public or hybrid cloud environment, the security model needs to change. This white paper explores how you can boost your AWS security to keep up with this change.
Posted: 10 Oct 2017 | Published: 31 Dec 2016

CloudPassage

Proofpoint Threat Response
sponsored by Proofpoint, Inc.
WHITE PAPER: How can you prevent security alerts and incidents from escalating into full-blown breaches? In this white paper, gain insight into the benefits of a threat response platform, and see how you can use it to prioritize and execute response actions.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Proofpoint, Inc.

Preparing for the Big One: General Data Protection Regulation
sponsored by Smarsh
WHITE PAPER: Even if your organization is not physically located in the EU, the GDPR will most likely affect you as well. In this white paper, gain insight into GDPR requirements and what your organization must do to comply.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

Smarsh

Strategies for API Security
sponsored by Akamai Technologies
WHITE PAPER: APIs provide transparency to the internal structure of applications and provide granular access to an application's backend, making online businesses more vulnerable than ever before to cyberattack threats. This white paper outlines the most common types of cyberattacks and offers strategies for protecting APIs.
Posted: 09 Oct 2017 | Published: 31 Dec 2016

Akamai Technologies

Strategies for Securing Applications from Vulnerable Open Source Components
sponsored by Veracode, Inc.
WHITE PAPER: 90% of an application is typically made up of third-party components, making users extremely vulnerable to security risks. In this white paper, learn about hidden vulnerabilities and targets in applications and reveal 5 ways you can use applications without adding risk.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Veracode, Inc.

From the Top: What Executives Need to Know About Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: $117,000 is the average financial impact of a data breach for SMBs in North America and $1.3 million is the average impact for a large enterprise in North America. This paper identifies 6 myths about enterprise security to help you strengthen your approach, so you do not fall victim to data breach's large financial impact.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Kaspersky Lab

How Veracode Supports your Complete Application Security Program
sponsored by Veracode, Inc.
WHITE PAPER: Application layer attacks are now the most frequent pattern in confirmed breaches, according to Verizon. Every organization is dependent on applications – if these applications are at risk, so is the business. In this white paper uncover how to boost your application security effectively.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veracode, Inc.

Veracode Integrations
sponsored by Veracode, Inc.
WHITE PAPER: As more organizations move to DevOps, application security needs to keep up or risk being left behind. Access this white paper to learn how you can integrate your application security with your security and development teams' existing tools and processes.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veracode, Inc.

IT Security: Cost Center or Strategic Investment?
sponsored by Kaspersky Lab
WHITE PAPER: Understanding the math behind the cost of a cyberattack is more crucial now than ever. By reading this white paper, gain a deeper understanding of the cost of IT security incidents and how to move your organization forward in preventing data breaches.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Kaspersky Lab

The Security Professional's Role in a DevSecOps World
sponsored by Veracode, Inc.
WHITE PAPER: A National Institute of Standards and Technology study found that it is 6 times more costly to fix vulnerabilities in production vs. during coding. In this white paper, gain insight into how DevSecOps is the future of software development.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Veracode, Inc.

Synchronized Security: Best-of-breed defense that's more coordinated than attacks
sponsored by Sophos
WHITE PAPER: Today's attacks are more sophisticated and coordinated than ever. According to ESG Group, 46% of organizations believe they have a problematic shortage of cybersecurity skills. Inside, learn how to protect against known and emerging threats.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Sophos

GDPR will bring the Teeth that have been Missing in Data Security Auditing and Compliance
sponsored by SyncDog
WHITE PAPER: Data security standards have been around for decades yet standards enforcement has been lacking. This paper identifies 5 steps to help maintain compliance leading up to GDPR.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

SyncDog

SyncDog Metropolitan Police Department Case Study
sponsored by SyncDog
WHITE PAPER: In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

SyncDog

Beginner's Guide to Ransomware Detection and Protection
sponsored by AlienVault
WHITE PAPER: Within hours of the outbreak of WannaCry, it had infected more than 230,000 computers in over 150 countries. Gain a deeper understanding of ransomware attacks, how they work, who is targeted, and what you can do to stop them.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

AlienVault

Don't Let Legacy Security Tools Hold Up PCI Compliance in the Cloud
sponsored by CloudPassage
WHITE PAPER: Explore the top challenges of using traditional PCI security controls in a cloud environment. Learn how you can automate cloud compliance with the Payment Card Industry Data Security Standard.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

CloudPassage

The Dangers of Phishing: Help Employees Avoid the Lure of Cybercrime
sponsored by Kaspersky Lab
WHITE PAPER: According to Kaspersky Labs, 48% of all phishing attacks were focused on gleaning users' financial data. This white paper reveals how to identify a phishing attack and how to protect your business from being targeted by phishing attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

When Cryptors Attack: Timeline of a Ransomware Infection
sponsored by Kaspersky Lab
WHITE PAPER: The average amount of damage to SMBs caused by one cryptomalware attack is $99,000, according to a survey from Kaspersky Lab and B2B International. Take a closer look at this white paper to learn about cryptomalware attacks and how to prevent your company from being targeted with cryptomalware.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

AWS Security Fitness Guide
sponsored by evident.io
WHITE PAPER: Strengthen your cloud and combat the criminals. Read this white paper to reveal how to make your AWS environment less vulnerable to cyberattacks and threats.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

evident.io

The 6 Essentials for DevOps Team Excellence
sponsored by evident.io
WHITE PAPER: A recent Enterprise Strategy Group survey found that 45% of organizations currently report having a "problematic shortage" of cybersecurity skills. Take an in-depth look at this white paper to reveal essentials that can help your enterprise form a smart framework for running a secure DevOps organization.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

evident.io

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

Security Orchestration and Micro-Segmentation for Public and Private Cloud
sponsored by Cloudvisory
WHITE PAPER: According to Gartner, misconfiguration and mistakes are the leading causes of operations incidents and successful security attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Cloudvisory
76 - 100 of 923 Matches Previous Page    2 3 4 5 6 7    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement