Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
76 - 100 of 1100 Matches Previous Page  |  Next Page
Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report
sponsored by IBM
WHITE PAPER: Discover how to formulate your own new endpoint protection strategy based around these ever changing endpoint devices. See how other organization are protecting their evolving perimeter and learn statistics from the SANS 2016 Endpoint Security Survey that will help you create your long-term endpoint management strategy.
Posted: 27 Jul 2016 | Published: 01 Mar 2016

IBM

Building Success: Strengthen your Data Discovery and Classification
sponsored by IBM
WHITE PAPER: How can you strengthen your data foundation without compromising its integrity? This Forrester Research Report breaks down the struggle with data discovery and security. What are strong approaches to data classification that you can implement in your company moving forward? Read this report now and find out.
Posted: 25 Jul 2016 | Published: 01 Oct 2014

IBM

Mitigate Model Risk and Reduce Model-Related Costs
sponsored by SAS
WHITE PAPER: By establishing risk mitigation and cost reduction strategies targeted at model implementation and operation, you can easily identify models that are vital for guiding the direction of your business. Discover an approach to model risk management that supports your internal decision-making processes.
Posted: 25 Jul 2016 | Published: 31 Dec 2015

SAS

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Take a Behavioral Bite Out of Crime
sponsored by Infor
WHITE PAPER: 44% of retail shrink is due to employee theft. This is the greatest threat to profitablity at store level. This white paper, based on an extensive study, presents hiring strategy improvements that your organization can quickly adopt.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Infor

The Security Survival Guide for Growing Businesses
sponsored by Trustwave
WHITE PAPER: This guide shows you step by step why your security may be suffering and offer practical tips for addressing critical points so you can take your data protection to the next level.
Posted: 20 Jul 2016 | Published: 01 Jun 2016

Trustwave

Reference Guide: Acceptable Use Policy
sponsored by Navex Global
WHITE PAPER: This reference guide provides an example of an acceptable use policy of computer systems at an organization. Use this sample as a guideline for developing your own policy.
Posted: 20 Jul 2016 | Published: 01 Jun 2016

Navex Global

Red Hat Product Security Risk Report 2015
sponsored by Red Hat
WHITE PAPER: Tools that detect and address critical vulnerabilities before they go public are crucial to empowering developers. Explore reasons you should implement open source tools with security in mind.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Red Hat

6 Easy Ways to Advance Your Cybersecurity Program When You Have a Small Team
sponsored by ThreatConnect
WHITE PAPER: This paper outlines 6 steps you can take to prioritize threat data, automate manual tasks, and streamline your workflow. With the right tools in place, you can turn your small band of brothers into an army suited to take down all of today's sophisticated threats.
Posted: 20 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

IT Security for Retail
sponsored by Trustwave
WHITE PAPER: This white paper emphasizes a multi-layer defense program against attacks. This approach helps you avoid infection, halt propagation, stop exfiltration and unify your security systems.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

Get the Incident Responder’s Field Guide: Lessons from a Fortune 100 Incident Response Leader
sponsored by Digital Guardian
WHITE PAPER: The Digital Guardian Incident Responder's Field Guide provides a formal, coordinated approach for responding to security attacks that affect information assets. Written by Tim Bandos, a former Fortune 100 cyber security leader, this e-book provides easy-to-follow steps for crafting an Incident Response plan.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Digital Guardian

IT Security for Financial Sector
sponsored by Trustwave
WHITE PAPER: Learn why threats are growing and how to keep up with them in this white paper. See where financial organizations around the world are falling short of best security practices and how you can avoid making the next $50 million mistake.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

2016 Security Pressures Report
sponsored by Trustwave
WHITE PAPER: The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.
Posted: 18 Jul 2016 | Published: 01 Jun 2016

Trustwave

3 Steps to Create a Data Protection Lifecycle Management Strategy
sponsored by Iron Mountain
WHITE PAPER: Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.
Posted: 15 Jul 2016 | Published: 01 Jun 2016

Iron Mountain

Security and Innovation Converge at Open Source Linux
sponsored by Red Hat
WHITE PAPER: Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

Red Hat

Migration Best Practices for Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: As IT systems age, they become more brittle. Download this white paper to understand the benefits of adopting the latest release of Red Hat Enterprise Linux—which will mitigate risk in the lifecycle of your server platform, and decrease the vulnerability of systems to security threats.
Posted: 15 Jul 2016 | Published: 29 Aug 2014

Red Hat

Asset Management Firm's Switch to Caché From a Relational Database Improves Performance, Reduces Risk
sponsored by InterSystems
WHITE PAPER: In this case study, explore how a global asset management firm based in Boston, MA transitioned from a relational database to Caché to help mitigate investment, operational, and technological risk. Tap into how they increased flexibility and reliability, boosted database performance, and more.
Posted: 11 Jul 2016 | Published: 30 Apr 2014

InterSystems

Cybersecurity Moves Toward Hybrid Models
sponsored by Dell SecureWorks
WHITE PAPER: Discover why the older "all or nothing" kind of relationship between organizations and information security service providers is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Dell SecureWorks

HIPAA Compliance & Risk Management
sponsored by Armor
WHITE PAPER: Develop a proactive strategy to circumvent security problems before they occur. Learn the latest HIPAA regulation requirements to improve internal procedures and reduce threats. Understand the possible threats and formulate policies on how to protect data while conforming to the necessary regulations.
Posted: 11 Jul 2016 | Published: 31 Dec 2015

Armor

Are You a Security-First Organization?
sponsored by Armor
WHITE PAPER: Regulations are not intended to tell businesses how to structure their security efforts, they are intended to be used as a guide against which the chosen security structure can be checked. Learn how to better structure your security posture to actually protect your assets rather than just looking like you're protecting them.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Armor

Incident Response Team: Transform Your IR Team From Reactive to Proactive
sponsored by ThreatConnect
WHITE PAPER: Discover how your IR team can become faster and more effective at protecting your network. Unite your people, processes, and technologies across your organization to eliminating barriers between the systems that used to slow you down.
Posted: 06 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

State of Application Security Report
sponsored by Arxan
WHITE PAPER: You know why mobile apps must be secure, now learn why in this white paper. It provides recommendations for how organizations and consumers can minimize the risk of their mobile apps being hacked and how app developers can improve protection.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

Arxan

Security Operations Center: Unite People, Processes, and Technologies Across Your SOC
sponsored by ThreatConnect
WHITE PAPER: Discover how to deepen your threat intelligence, validate it, prioritize it and act on it. Bring together the people, processes, and technologies that comprise your Security Operations Center (SOC) team, and the other teams you partner with on a daily basis. Automate mundane security tasks that slow you down by leveraging tools you already have.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

4 Steps to Effectively Managing Risk and Compliance for Financial Services
sponsored by IBM
WHITE PAPER: Learn why convergence is key to maximizing governance efforts, and discover the 4 steps financial services organizations can take to mitigate compliance risks.
Posted: 22 Jul 2016 | Published: 31 May 2011

IBM
76 - 100 of 1100 Matches Previous Page    2 3 4 5 6 7    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement