Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
1 - 25 of 1530 Matches Previous Page  |  Next Page
Reduce the Risks and Costs Associated with Software Assets and Licensing
sponsored by Snow Software
VIDEO: Organizations around the world spend over an estimated $330 billion on enterprise software every year. Software asset management (SAM) is designed to help you keep track of all your software licensing data, ensure compliance, and prevent overspending. Watch this 2 minute video to see how SAM will save your bottom line.
Posted: 23 Mar 2017 | Premiered: 26 Aug 2015

Snow Software

Information Governance: Protect Your Company's Assets
sponsored by Box
WHITE PAPER: This white paper explores how to leverage the cloud content management platform from Box to implement a sound information governance program for you organization. Discover how to reduce risks and gain control over who can see and use information and how it is kept.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Box

Make Migration AWSome: Speed Up And De-Risk Your Migration To AWS
sponsored by Amazon Web Services
WHITE PAPER: Those moving to AWS face a substantial move that needs to be planned out ahead of time. Read on to learn about a service that helps you prepare for your AWS migration while minimizing the risk associated with such a move.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Amazon Web Services

How To Implement a Records and Information Management Risk Control Framework
sponsored by Iron Mountain
WHITE PAPER: In this white paper, learn about records and information management (RIM) controls you can implement to mitigate data risk. For example, learn the 9 major categories of RIM risk controls, how you can parcel out the responsibility of these categories to your employees, and more.
Posted: 20 Mar 2017 | Published: 31 Dec 2015

Iron Mountain

Identify and Manage Fraud Better with Analytics
sponsored by BAE Systems
WHITE PAPER: This white paper explores how to put the right analytics tools and practices in place to fight financial crime in an era of cloud and big data. Discover how predictive analytics can help identify fraudulent behavior and improve strategic decision-making even in the face of high data volumes and proliferating attack vectors.
Posted: 14 Mar 2017 | Published: 14 Mar 2017

BAE Systems

SonicWall 2017 Threat Report: The State of the Cybersecurity Arms Race
sponsored by SonicWall
WHITE PAPER: This SonicWall Annual Threat Report defines the cybersecurity battlefield and enables you to mount an impenetrable defense in 2017 and beyond.
Posted: 10 Mar 2017 | Published: 31 Jan 2017

SonicWall

2017 Annual Threat Report
sponsored by SonicWall
RESEARCH CONTENT: This 2017 Annual Threat Report looks at both sides of the cybersecurity arms race: the attackers and the targeted organizations. Discover which areas of security are projected to see the most attention and learn how to overcome challenges like SSL encrypted traffic, higher instances of ransomware attacks, IoT security issues, and more.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

SonicWall

You've Been Compromised - Now What?
sponsored by Dell SecureWorks
WHITE PAPER: Explore three critical questions you must answer and decisively act upon at the first signs of a security breach. Discover these questions to ensure your organization can protect itself from costly security incidents.
Posted: 08 Mar 2017 | Published: 30 Dec 2016

Dell SecureWorks

The State of the Cybersecurity Arms Race
sponsored by SonicWall
RESOURCE: In the war against cybercrime, no one gets to avoid battle. In this resource, industry expert Bill Conner provides insight into staying up-to-date on the latest threats and cybersecurity innovations shaping today's landscape.
Posted: 08 Mar 2017 | Published: 06 Feb 2017

SonicWall

Fighting the Latest Evolution of Money Laundering
sponsored by BAE Systems
WHITE PAPER: This report explores how to meet the ever-growing threat of financial cybercrime. Discover how to take an integrated approach to detecting and preventing cybercrime that leverages anti-money laundering (AML) technologies, blockchains, machine learning, and more.
Posted: 08 Mar 2017 | Published: 31 Dec 2016

BAE Systems

Announcing New and Enhanced SonicWall Email Security 9.0 with Capture ATP to Detect Zero-Day
sponsored by SonicWall
DATA SHEET: In 2016, ransomware attacks grew by 167x year-over-year to 638 million. As today's malware and ransomware pose ever evolving malicious, zero-day threats, organizations need to defend their networks beyond their perimeters. Discover how SonicWall can help you block ransomware, inspect email, and more.
Posted: 07 Mar 2017 | Published: 09 Feb 2017

SonicWall

How Well Do You Know Your Customers?
sponsored by BAE Systems
WEBCAST: This webcast explores how KYC and anti-money laundering (AML) technology fit into your institution by viewing the organization in terms of a financial crime and risk management framework. Discover how to go beyond initial customer onboarding to implement ongoing risk management.
Posted: 07 Mar 2017 | Premiered: Mar 7, 2017

BAE Systems

Improving and Accelerating Fraud Detection and Prevention
sponsored by BAE Systems
RESOURCE: This resource explores how to combat modern financial crime and compliance challenges and improve your organization's ability to detect and prevent fraudulent claims, even in complex, high-volume environments. Discover a platform that enables you to detect more fraud faster, improve detection accuracy, accelerate decision-making, and more.
Posted: 07 Mar 2017 | Published: 31 Dec 2016

BAE Systems

6 Steps to Proactive Cybersecurity Protection
sponsored by BAE Systems
WHITE PAPER: Learn how to take a stratified approach to IT security that leverages threat intelligence to prevent breaches. Discover 6 steps to proactive cybersecurity protection and obtain the monitoring capabilities you're looking for.
Posted: 07 Mar 2017 | Published: 31 Dec 2016

BAE Systems

Board Oversight of Cybersecurity Risk: A Framework for Inquiry
sponsored by Dell SecureWorks
WHITE PAPER: Use this white paper as your tool for improving the board-management dialog on cybersecurity risk management. It will help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

Dell SecureWorks

Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect Their Businesses
sponsored by BAE Systems
WHITE PAPER: Go beyond simple risk management by implementing cybersecurity practices designed not only to prevent breaches but anticipate the damage and recover from attacks. Discover how to bolster endpoint security and data loss prevention by identifying potential attackers to improve your organization's threat awareness and put the right tools in place.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

Navigating IT Transformation
sponsored by HPE and IntelĀ®
WHITE PAPER: IT transformation is the hot new trend, but you've got some hoops to jump through first. This comprehensive IDG paper is here to report on some of the common troubles that your peers are having with their IT transformations and what you can do to avoid these costly mistakes.
Posted: 03 Mar 2017 | Published: 03 Mar 2017

HPE and IntelĀ®

The Potential ROI of Fraud Detection and Prevention Tools
sponsored by BAE Systems
RESEARCH CONTENT: This Forrester Total Economic Impact report examines an analytical platform that provides organizations with the tools to detect, investigate, and prevent insurance fraud while minimizing the impact to genuine customers. Discover the potential ROI of this fraud detection and prevention platform, deployed either on-premise or in the cloud.
Posted: 03 Mar 2017 | Published: 31 May 2016

BAE Systems

Do You Know Who I Am? Know Your Customer Systems Market Update
sponsored by BAE Systems
WHITE PAPER: Explore how Know Your Customer (KYC) systems provide organizations with the processes and workflows they need to assess the risk customers pose both at account opening and over time. Learn how to leverage KYC to boost customer onboarding and due diligence, improve risk management, integrate AML with KYC systems, and more.
Posted: 02 Mar 2017 | Published: 31 Aug 2016

BAE Systems

The Ultimate Guide to Cybersecurity to Drive Profitability
sponsored by Cisco Systems, Inc.
EBOOK: This e-book explores how to turn cybersecurity success into a true competitive advantage that enables faster innovation. Discover how to secure your network to prevent costly downtime, equipment damage, compliance issues and more. Plus, learn how to leverage threat intelligence to bolster malware defense and improve network visibility.
Posted: 01 Mar 2017 | Published: 31 Dec 2016

Cisco Systems, Inc.

2017 Annual Cybersecurity Report
sponsored by Cisco and Dimension Data
RESEARCH CONTENT: This 2017 Annual Cybersecurity Report explores how to implement an integrated security architecture by connecting your security tools to work together in an automated, streamlined environment.
Posted: 28 Feb 2017 | Published: 31 Jan 2017

Cisco and Dimension Data

Managing the Risks of Cryptocurrency
sponsored by BAE Systems
WHITE PAPER: This report explores how to defend against malware designed to attack cryptocurrencies in an increasingly virtual, mobile, and connected world. Read on to learn about the growing cryptocurrency landscape, how to navigate the cyber risks of virtual currencies, essential tips for protecting your financial institution, and more.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

BAE Systems

The new EUsecurityrequirements and you
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This infographic reveals how to support compliance while reaping business rewards. Learn about tools that deliver real-time threat intelligence, policy-based data usage assurance, and 2 more compliant ways to use and store data.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Symantec & Blue Coat Systems

When Downtime Takes a Bite out of Your Budget
sponsored by Globalscape
EBOOK: Unplanned downtime and data loss will ultimately affect an organization's bottom line. Discover how to develop a robust data protection strategy that helps defend your most critical assets and learn how to create visibility into data transfers, meet compliance, simplify disaster recovery, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape

Your Data on the Move: Taking Back Control of Your Most Precious Asset
sponsored by Globalscape
WHITE PAPER: This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape
1 - 25 of 1530 Matches Previous Page    1 2 3 4    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement