Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
1 - 25 of 1550 Matches Previous Page  |  Next Page
Managed Detection and Response Service
sponsored by Rapid 7
WEBCAST: According to the 2017 SANS Incident Response Survey, 87% responded to at least one incident in the past year. Take a look at this webcast to gain insight into improving your incident response strategy by validating and identifying known and unknown threats in order to protect your company.
Posted: 20 Nov 2017 | Premiered: Nov 7, 2017

Rapid 7

Case Study: Incident Response Time Savings and Compliance Ease
sponsored by Rapid 7
CASE STUDY: This case study explores how ESB energy company overcame its challenges of having limited IT staff resources, a growing compliance burden, and numerous threats from hackers. Uncover how ESB overcame these issues by implementing a vulnerability management approach alongside an incident detection response strategy.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Rapid 7

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity

Achieve SIEM Solution Success
sponsored by Rapid 7
WHITE PAPER: In order to unify data, reliably detect attacks, and identify risk across your organization, a SIEM deployment is necessary. This white paper offers Gartner's 6 challenges of the main causes behind failed SIEM deployments and suggests an approach to implementing a successful SIEM platform while keeping these challenges in mind.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Rapid 7

Journey to GDPR
sponsored by IBM
WHITE PAPER: GDPR readiness is critical and a business necessity, but many organizations are struggling with the complex compliance requirements. This article provides information regarding GDPR as well as strategies to ensure you are compliant with the data processing rules.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

IBM

The Evolving Risk Landscape
sponsored by F5 Networks
WHITE PAPER: There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

F5 Networks

Damage Control: The Impact of Critical IT Incidents
sponsored by Splunk
WHITE PAPER: IT incidents result in annual costs running into millions of dollars, while the average organization is dealing with hundreds of incidents every week. This paper provides understanding into a research report analyzing the impact critical IT incidents have on organizations, which halt business processes and impact users.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Splunk

Get Ahead of GDPR Demands
sponsored by IBM
WHITE PAPER: The GDPR financial penalties for non-compliance are daunting; learn how to gain GDPR compliance by keeping your company's data secure. This article provides insight into preparing for the GDPR by accelerating compliance readiness and managing data breaches.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

IBM

The Hunt for IoT
sponsored by F5 Networks
WHITE PAPER: 30.6 million IoT brute force attacks were launched from January 1 to June 30 2017. This white paper provides an analysis of data collected pertaining to the rise of thingbots in Europe, specifically focusing on the Mirai and Persirai bots containing destructive malware.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

F5 Networks

Cybersecurity: For Defenders, It's About Time
sponsored by McAfee, Inc.
WHITE PAPER: In multiple areas of cyber security, time is working in favor of the attackers. This Aberdeen Group white paper provides 4 examples of how recapturing an advantage of time can help defenders to reduce their risk.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

McAfee, Inc.

Magic Quadrant for Enterprise Data Loss Prevention
sponsored by McAfee, Inc.
WHITE PAPER: According to Gartner, By 2020, 85% of organizations will implement at least one form of integrated DLP, up from 50% today. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's DLP products as well as, a market overview.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

McAfee, Inc.

How Malware Can Steal Your Data
sponsored by F5 Networks
EBOOK: 51% of data breaches include malware. This e-book provides insight into how malware can steal your data and offers strategies you use to prevent it from happening.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

Busting the Myth of the Malware "Silver Bullet"
sponsored by McAfee, Inc.
WHITE PAPER: Malware is continuing to evolve, and the next generation of it is requiring us to adopt next-level defenses. Unfortunately, there is no "silver bullet" to protect you from the lurking malware-wolf. Access this white paper to learn how to create a layered defense with complimentary tools that work in unison to fight malware threats.
Posted: 16 Nov 2017 | Published: 28 Feb 2017

McAfee, Inc.

Top Cyber Threats to the Technology Sector
sponsored by Digital Shadows
WHITE PAPER: Technology providers collect sensitive customer data, causing them to be popular targets for cyberattacks. Explore this white paper to learn about the top 4 threats facing technology companies today, and learn from recent attacks to ensure your data is secured.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

GDPR Quick Start Guide
sponsored by MarkLogic
WHITE PAPER: According to an Osterman Research Report, 64% of organizations are not ready to comply with the GDPR. This paper offers a quick start to GDPR with 3 key steps that will put you on the right track to maintaining GDPR compliance.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

MarkLogic

Top Cyber Threats to The Retail Sector
sponsored by Digital Shadows
WHITE PAPER: Given the frequent number of transactions taking place using payment cards, retail companies are frequently the target of financially-motivated threats. Explore this white paper to uncover the top 3 cyber threats to the retail sector to help you monitor and manage digital risks.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

The Pressing Need for Digital Risk Management
sponsored by Digital Shadows
WHITE PAPER: According to ESG research, 69% of organizations are increasing their cybersecurity budgets. This ESP report reveals how CISOs and risk officers can adopt a thorough risk management strategy to protect their enterprise from pressing cyber threats.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Top Cyber Threats to the Legal Sector
sponsored by Digital Shadows
WHITE PAPER: Legal firms can be attractive targets for cybercriminals, especially firms working on mergers and acquisitions (M&A), possessing a large amount of sensitive, non-public information. This paper highlights 3 security risks for legal firms to focus on and how to mitigate them.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Top Cybercrime Threats to Financial Institutions
sponsored by Digital Shadows
WHITE PAPER: The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Protect Your Customer and Employee Accounts
sponsored by Digital Shadows
WHITE PAPER: Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Risk Management Pool Achieves Flexible Storage Capabilities
sponsored by Hewlett Packard Enterprise
CASE STUDY: The Special District Risk Management Authority needed a way to improve storage capacity, as well as data-retention and disaster recovery capabilities. Access this case study to learn how they deployed hyperconverged infrastructure throughout their data centers to meet these challenges and then some.
Posted: 13 Nov 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise

Security Automation and Orchestration Best Practices
sponsored by ServiceNow
WEBCAST: According to a recent Forrester Research Survey, 68% of respondents state that using automation and orchestration tools to improve security operations is a high or critical priority. Watch this webcast to gain insight into security automation and orchestration (SAO) best practices and a roadmap for deployment.
Posted: 13 Nov 2017 | Premiered: Nov 13, 2017

ServiceNow

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: According to a Black Hat Report, 32% of hackers say accessing privileged accounts is the easiest and fastest way to get at sensitive data. This white paper explores the risks associated with privileged accounts and offers strategic risk mitigation tactics you can take to ensure security.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

One Identity

How York Risk Services Responds to Security Threats in Minutes vs. Hours or Days
sponsored by ServiceNow
WEBCAST: When responding to security vulnerabilities, lack of speed and consistency are significant issues many enterprises face. Watch this webcast case study to gain insight into how York Risk Services overcame their incident response issues by implementing an effective vulnerability response strategy.
Posted: 10 Nov 2017 | Premiered: Nov 10, 2017

ServiceNow
1 - 25 of 1550 Matches Previous Page    1 2 3 4    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement