Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
1 - 25 of 1463 Matches Previous Page  |  Next Page
Forensic State Analysis: A New Approach to Threat Hunting
sponsored by Infocyte
WEBCAST: Watch this webcast to uncover strategies to reduce the dwell time of attackers and improve your threat hunting techniques.
Posted: 18 Sep 2017 | Premiered: Apr 3, 2017

Infocyte

IBM Cloud Secure Virtualization: Your Key to Simplifying GDPR Compliance
sponsored by HyTrust
WHITE PAPER: Take a closer look at this white paper to reveal how to simplify your compliance efforts with assistance from IBM.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

HyTrust

Become GDPR-Ready
sponsored by Avnet
WHITE PAPER: If organizations do not know what data they hold and where it is, they will not be able to comply with GDPR, risking their businesses. Read this white paper to reveal insight to prepare for the GDPR.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Avnet

2017 GDPR Report
sponsored by Avnet
WHITE PAPER: Take a closer look at this white paper to reveal research statistics regarding GDPR compliance.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Avnet

360 Data Management For GDPR
sponsored by Avnet
WHITE PAPER: In an effort to prepare for the GDPR, organizations are trying to move from slow-moving, traditional approaches to digitally-driven operations that capitalize on previously inaccessible market opportunities.
Posted: 18 Sep 2017 | Published: 31 Mar 2017

Avnet

Evolution of Incident Response
sponsored by IBM Resilient
WHITE PAPER: A recent survey revealed that data breach and data theft outranked natural and manmade disasters and IT system failures as the largest threat to an organization's reputation. The old days of incident response, will no longer suffice to keep your organization safe. Learn how IR has evolved and how you can improve yours.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

IBM Resilient

Orchestrated Response: A Game-Changing Strategy
sponsored by IBM Resilient
WHITE PAPER: Uncover how organizations have improved their security posture by using advanced security automation and orchestration strategies to alleviate cyber threats.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

IBM Resilient

Optimize your AML Investigation Productivity
sponsored by Attivio, Inc.
EBOOK: Read this e-book to reveal a holistic view of risk and compliance to strengthen your anti-money laundering software.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

Study on the Cyber Resilient Organization: United Arab Emirates
sponsored by IBM Resilient
WHITE PAPER: Take an in-depth look at this Ponemon study to reveal factors effecting cyber resilience. Learn more about activities to improve it, barriers, and threats.
Posted: 12 Sep 2017 | Published: 30 Jun 2017

IBM Resilient

Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

ComputerWeekly.com

GDPR: The State of Play
sponsored by ComputerWeekly.com
DATA SHEET: An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

ComputerWeekly.com

Pervasive Encryption: A New Paradigm for Protection
sponsored by IBM
RESOURCE: The increasing integration between cyberspace and the physical world has exponentially expanded the opportunities for theft, damage, and corruption. Take a look at this report to discover trend and risk information through a security examination of different organizations.
Posted: 08 Sep 2017 | Published: 08 Sep 2017

IBM

How to Implement NIST CSF : A 4-Step Journey to Cybersecurity Maturity
sponsored by Rsam
WHITE PAPER: Read this white paper to discover how a NIST Cybersecurity Framework platform provides users like you with strong security and threat protection against possible attackers.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Rsam

Managing External Identities
sponsored by Simeio
WEBCAST: Listen to this webinar to uncover approaches to enhance your IAM security as well as customer experience.
Posted: 07 Sep 2017 | Premiered: Sep 5, 2017

Simeio

Balancing Security Investments
sponsored by Dell SecureWorks
WHITE PAPER: Lack of a clear security strategy for the cloud may prevent your enterprise from fully realizing the business benefits of the cloud. In this Frost & Sullivan research report, learn which best practices to follow to gain security capabilities within the cloud. Jump to page 10 for the dimensions of the information security maturity model.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Dell SecureWorks

6 Steps to Implementing a Risk-Based Security Approach
sponsored by Dell SecureWorks
WHITE PAPER: It is difficult to defend against something when you do not know what exactly you are defending against. Take an in-depth look at this white paper to uncover 6 steps to implementing a risk-based security approach to enhance your security posture.
Posted: 05 Sep 2017 | Published: 31 Dec 2016

Dell SecureWorks

EU GDPR Compliance Puts Focus on Data Tracking, Encryption
sponsored by Ivanti
EGUIDE: In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.
Posted: 05 Sep 2017 | Published: 31 Aug 2017

Ivanti

Your Employee Security Checklist: 10 Tips
sponsored by Kaspersky Lab
WHITE PAPER: Careless employees were the single biggest cause of serious incidents involving data loss or leakage— involved in 1 in 5 serious data breaches. Find 10 tips for employee security to prevent serious incidents at the employee level.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

WhoDunIt? The Mystery of the Advanced Persistent Threat (APT)
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experienced a targeted cyberattack, 68% report data loss or exposure as a direct result of the attack. Advanced Persistent Threats (APTs) are even more disconcerting. Learn how to protect your company's sensitive information from APT attacks, and discover real-world examples of companies who used Kaspersky for attribution.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

How to Enhance AWS Security
sponsored by Splunk
WHITE PAPER: Here, you'll uncover guidance on enhancing AWS platform security, to quell data protection concerns. Access now to see how AWS can deliver top-notch security, as well as facilitate an adaptive environment armed with the actionable insights needed to help thwart and prevent future threats.
Posted: 30 Aug 2017 | Published: 28 Jul 2017

Splunk

Governance, Risk, and Compliance: Transform Inefficient Processes
sponsored by ServiceNow
WHITE PAPER: Governance, risk, and compliance is a constant concern for enterprises that must keep up with changes in the global regulatory environment and industry standards. Learn how to transform inefficient processes into a unified GRC program.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

ServiceNow

Effectively Monitor, Prioritize, and Automate Response to Third-Party Risk
sponsored by ServiceNow
WHITE PAPER: While assessing vendor risk on a regular basis is critical, it can often be an extremely time-consuming and error-prone exercise involving spreadsheets, email, and rudimentary risk management tools. Learn how to build a more advanced vendor risk management program.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

ServiceNow

Secure Your Endpoint Devices With A Unified Endpoint Management Tool: IBM MaaS360 with Watson Overview
sponsored by IBM
PRODUCT OVERVIEW: Today's end-user devices are comprised of all form factors— everything from smartphones and tablets to laptops and desktops. IT faces the challenge of monitoring, securing and managing all of these end-user devices successfully. Learn how IBM® MaaS360® with Watson™, a cognitive unified endpoint management (UEM) tool, can help overcome this hurdle.
Posted: 30 Aug 2017 | Published: 01 Apr 2017

IBM

Step Up Your Security and Privacy with Data Masking
sponsored by Delphix
WEBCAST: For many organizations, the most confidential information exists in some of the least-secure environments. Learn why data masking is an effective approach to protecting sensitive environments from a variety of threats. Discover challenges and best practices for implementing data-masking tools, and more.
Posted: 07 Sep 2017 | Premiered: Aug 28, 2017

Delphix

Cyber security solutions from IBM
sponsored by IBM
WHITE PAPER: Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection.
Posted: 28 Aug 2017 | Published: 20 Jul 2012

IBM
1 - 25 of 1463 Matches Previous Page    1 2 3 4    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement