Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
1 - 25 of 1444 Matches Previous Page  |  Next Page
What You Need To Know About Cyber Security Development
sponsored by Hewlett-Packard Company
EGUIDE: This expert e-guide explores the 3 steps for performing a cybersecurity risk assessment and where to target your efforts. Access now to learn how to analyze risk data to build the foundation of your cybersecurity strategy.
Posted: 22 May 2015 | Published: 25 Mar 2015

Hewlett-Packard Company

Detect and Protect against Advanced Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper examines the architecture of a strong, layered security system and suggests ways to partner with security services in order to achieve it.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Uncover Advanced Attacks and Detect Hidden Breaches
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

The Cost of a Data Breach
sponsored by IBM
WHITE PAPER: This report uses statistical analysis to determine how much a breach will cost you depending on attack size, location, and type.
Posted: 22 May 2015 | Published: 31 May 2014

IBM

Special Report: Cyber Security in 2015
sponsored by IBM
WHITE PAPER: This report summarizes essential attack information from recent security breaches to show you what the current threat landscape looks like.
Posted: 22 May 2015 | Published: 31 Mar 2015

IBM

Keep Yourself Secure from Growing Cyber-Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this infographic, discover what you can do to stay safe in an increasingly dangerous cyber landscape, including increasing proactivity in your security strategy and partnering with security services.
Posted: 21 May 2015 | Published: 21 May 2015

Hewlett-Packard Limited

Migrate to Red Hat JBoss Middleware with Red Hat Consulting
sponsored by Red Hat
DATA SHEET: This data sheet provides a comprehensive migration platform for moving your applications or platforms while managing risks and costs and allowing for more strategic allocation of resources and investment budget. Read now to carve out IT costs and make your ecosystem more scalable and agile.
Posted: 21 May 2015 | Published: 31 Aug 2014

Red Hat

Advance the Fight against Cyber Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces the benefits of security services and gives you advice on how to best take advantage of them.
Posted: 21 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

dapt Your Endpoint Security to Mobility and Advanced Threats
sponsored by AVG Technologies
EGUIDE: Read this expert guide to learn about the different kinds of endpoint security options available, and to begin creating strong, multi-layered defense for all your endpoints.
Posted: 21 May 2015 | Published: 21 May 2015

AVG Technologies

The Rise in Cybercrime: A Report on the Current Threat Landscape
sponsored by IBM
WHITE PAPER: This white paper examines why and how cybercrime is increasing and suggests practices for maintaining security.
Posted: 21 May 2015 | Published: 30 Jun 2014

IBM

Equinix Increases IT and Employee Productivity With Automation
sponsored by ServiceNow
WHITE PAPER: View this informative white paper to find out cloud-based IT service automation was the answer they were looking for.
Posted: 21 May 2015 | Published: 31 Dec 2014

ServiceNow

Hybrid Strategies Common as Organizations Strive for Cloud GRC
sponsored by IBM
EGUIDE: This expert e-guide presents best practices for ensuring cloud GRC.
Posted: 21 May 2015 | Published: 06 May 2015

IBM

Best Practices for FTP in the Enterprise
sponsored by IBM
EGUIDE: In this expert guide, you'll find the information you need to decide whether or not it's time to move on from FTP. Additionally, this guide offers tips for achieving best practice if you do stick with FTP.
Posted: 21 May 2015 | Published: 21 May 2015

IBM

Avoid Risks by Keeping Secure FTP Policies Straightforward
sponsored by IBM
EGUIDE: In this e-guide, discover why most users fail to securely transfer files and what you can do to stop their risky behavior.
Posted: 21 May 2015 | Published: 21 May 2015

IBM

6 Major Trends Shaping the Future of Security
sponsored by Box
WHITE PAPER: This white paper outlines the 6 major trends that are changing IT security as we know it.
Posted: 20 May 2015 | Published: 20 Feb 2014

Box

The Value of Encryption When Deploying Cloud File-Sharing Services
sponsored by Signiant, Inc.
WHITE PAPER: In this expert e-guide, discover tips for efficiently rolling out your cloud file-sharing service and for ensuring that you're using smart encryption practices while doing so.
Posted: 20 May 2015 | Published: 20 May 2015

Signiant, Inc.

Addressing Compliance Issues Around Public Cloud for Content Collaboration with Box for Financial Services
sponsored by Box
WHITE PAPER: This white paper explores how content collaboration with Box for Finanical Services addresses compliance issues. Read now to learn how providing enterprise-class content collaboration capabilities can tackle compliance risk.
Posted: 20 May 2015 | Published: 20 May 2015

Box

A New Security Strategy: Focusing on Risk
sponsored by Clearswift
WHITE PAPER: This white paper explores how to shift your security strategy from a compliance-based model to a risk-based model to protect strategic assets. Continue reading and discover how to improve your overall security strategy by implementing a security training and awareness program.
Posted: 20 May 2015 | Published: 29 Apr 2015

Clearswift

Vulnerability Management for the Mid-Size: How to Run a World Class Program Even if You're Not IBM
sponsored by Risk IO
WHITE PAPER: In this white paper, discover how you can design a high-quality vulnerability management program on a midsized budget and with a small security team.
Posted: 20 May 2015 | Published: 20 May 2015

Risk IO

Simplifying Protection of Critical Assets
sponsored by AVG Technologies
EGUIDE: This expert e-guide lays out a simple strategy you can use to make sure you're optimizing your security resources.
Posted: 20 May 2015 | Published: 20 May 2015

AVG Technologies

How Cyber Attackers Operate and How to Stop them
sponsored by IBM
VIDEO: In this video, discover what separates today's attacks from those of the past and how you can revamp your security to meet modern threats.
Posted: 20 May 2015 | Premiered: 22 Apr 2014

IBM

Agile Development with Red Hat Consulting
sponsored by Red Hat
BROCHURE: Read this brochure to learn about some of Red Hat Consulting's agile practice services.
Posted: 20 May 2015 | Published: 20 May 2015

Red Hat

Security and Unlocking the Value of the Mobile Workforce
sponsored by EE
WHITE PAPER: In this white paper, explore the benefits and challenges of mobile computing and why MDM needs to transition to enterprise mobility management (EMM) to secure apps and content. Continue reading to learn more.
Posted: 19 May 2015 | Published: 18 Mar 2015

EE

How to Secure the Enterprise With Threat Intelligence and Protection Software
sponsored by AVG Technologies
EGUIDE: This expert guide can help you stay secure in today's threat landscape by helping you build a strong, layered security system that includes threat intelligence and multiple forms of endpoint protection.
Posted: 19 May 2015 | Published: 19 May 2015

AVG Technologies

Examining File Sync and Sharing Security
sponsored by IntraLinks, Inc
WHITE PAPER: Inside this white paper, examine one file sync, share, and collaboration platform and how to secure data inside and outside of the enterprise. Continue reading to learn how you to remain compliant and if this approach is right for your organization.
Posted: 18 May 2015 | Published: 17 Dec 2014

IntraLinks, Inc
1 - 25 of 1444 Matches Previous Page    1 2 3 4    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement