Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
101 - 125 of 1543 Matches Previous Page  |  Next Page
State of File Collaboration Security
sponsored by FinalCode
WHITE PAPER: Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015


Control Security for the Whole Enterprise with One Portal
sponsored by BitDefender
VIDEO: This video explains how employing a dedicated management portal for your endpoint security – whether physical, virtual or mobile – can help make your enterprise safer.
Posted: 07 Oct 2015 | Premiered: 19 Feb 2013


The Forrester Wave™: DDoS Services Providers, Q3 2015
sponsored by Imperva
WHITE PAPER: Forrester Research offers unique insight into the rapidly growing DDoS Protection market with its Wave Report on DDoS Services Providers. Read the report and learn why Imperva was positioned as a leader in the DDoS service providers space.
Posted: 06 Oct 2015 | Published: 22 Jul 2015


2015 Gartner Magic Quadrant for Web App Firewall
sponsored by Imperva
WHITE PAPER: Imperva, a leading provider of cyber security solutions is once again the only leader in Gartner's Magic Quadrant for Web Application Firewall. Access the report to find out why.
Posted: 06 Oct 2015 | Published: 15 Jul 2015


2015 Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER: DDoS attacks against network infrastructures continue to grow in size and duration. Download this report and learn what to expect and how you can protect your website from such attacks.
Posted: 06 Oct 2015 | Published: 06 Oct 2015


Case Study: Sharing Files without Compromising Security
sponsored by FinalCode
WHITE PAPER: In this case study, discover how an electrical service organization obtained quick and easy file-sharing that didn't compromise its security.
Posted: 05 Oct 2015 | Published: 30 Apr 2015


Top 10 Database Security Threats
sponsored by Imperva
WHITE PAPER: Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers. This whitepaper explains common injection points that provide an avenue for attackers to maliciously access database and Big Data components.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


Bolster Your Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.
Posted: 01 Oct 2015 | Published: 06 Jul 2015

WhiteHat Security

10 Features Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This paper explains in detail the 10 features that every Web application firewall must provide.
Posted: 01 Oct 2015 | Published: 01 Oct 2015


Data Protection and Business Continuity in a Mobile World: A Guide for SMBs
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This report looks at specific security challenges that SMBs face and gives advice for overcoming them.
Posted: 30 Sep 2015 | Published: 30 Jun 2015

Hewlett Packard Enterprise

Demo: Guarding against Today's Advanced Attacks
sponsored by Trend Micro
VIDEO: In this demo video, discover how you can revamp your security to guard against today's advanced attacks.
Posted: 29 Sep 2015 | Premiered: 29 Sep 2015

Trend Micro

Building a Custom Defense for Today's Security Threats
sponsored by Trend Micro
WHITE PAPER: This white paper offers a series of solutions designed to help your organization prevent the potential consequences of advanced threats.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Trend Micro

5 Steps to Migrate Your Applications to the Cloud Stress Free
sponsored by Commvault
WHITE PAPER: In this white paper, you'll find a five-step process for securely migrating your applications to the cloud and keeping them secure once they're there.
Posted: 29 Sep 2015 | Published: 29 Sep 2015


IT's Confidence in Threat Defenses May Be Misplaced
sponsored by Intel Security
WHITE PAPER: This white paper uses survey results to discuss just how prepared the average organization is for a hack, and businesses need to do if they truly want to stay safe.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Intel Security

How to Avoid Security Issues in Cloud Computing
sponsored by Intel and IBM
EGUIDE: This expert guide discusses how cloud computing makes it much easier for your users to do what they want, and why that may not always be a good thing for your security.
Posted: 25 Sep 2015 | Published: 25 Sep 2015

Intel and IBM

Handelsbanken Accelerates Insight into Big Data to Mitigate Risk and Support Regulatory Compliance
sponsored by IBM
VIDEO: This webcasts puts the spotlight on one of the top 10 most profitable banks in the world. Tune in and learn how Handelsbanken enabled its data analysts to produce risk data on a daily basis with the speed and simplicity they needed to meet regulatory requirements.
Posted: 25 Sep 2015 | Premiered: 25 Sep 2015


The Art of Cyber War: A Modern Defense Strategy
sponsored by Imprivata
WHITE PAPER: In this white paper, you'll find indispensible tips on maintaining security and winning the battle against cybercrime.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Security Report: Are Your Customers Afraid to Share Data?
sponsored by Unisys
WHITE PAPER: In this report, survey results from the Australian public reveal how much consumers fear sharing their personal data and which industries they distrust the most.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Social Threat Intelligence: A New Way to Stay Ahead of Hackers
sponsored by Threatstream
PODCAST: This podcast explores social threat intelligence, a new approach to threat intelligence that enables you to share threat information with other businesses in real time.
Posted: 25 Sep 2015 | Premiered: Jun 15, 2015


How to Detect and Defend against Fraudulent Certificates
sponsored by Venafi
EGUIDE: In this expert guide, you'll find tips on detecting and mitigating the fraudulent certificates used by the Flame malware, Zeus, and more.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Social Threat Intelligence: Embracing Collaborative Security
sponsored by Threatstream
WEBCAST: This webcast introduces the concept of social threat intelligence (STI) and explains why it has the potential to reshape security.
Posted: 24 Sep 2015 | Premiered: Jun 18, 2015


Network Security Case Study: Stealthy Tactics Define a Russian Cyber Threat Group
sponsored by FireEye
WHITE PAPER: This network security report will introduce you to HAMMERTOSS and the 5 stages of its attack, as well as how to combat threats such as these that undermine network defenders.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Sluggish Incident Response Report:: Next-Gen Security Problems and Solutions
sponsored by FireEye
WHITE PAPER: Identify the issues plaguing network incident response processes and combat shortcomings like limited human resources. Access this report now to glean an overview of the outside security services that your organization can procure to eliminate sluggish incident response.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Achieve Global PCI DSS Compliance with Managed Cloud Services
sponsored by Datapipe
CASE STUDY: This case study examines how Gateway Ticketing Systems was able to upgrade to a fully managed, PCI compliant hosting environment. Read on to see how this particular cloud platform can deliver business growth enabled with scalable, secure, redundant network, and more.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Social Threat Intelligence: A New Approach to Security
sponsored by Threatstream
TRANSCRIPT: This resource discusses social threat intelligence (STI), a collaborative approach to threat intelligence that can help you keep up with new cyber-risks.
Posted: 23 Sep 2015 | Published: 23 Sep 2015

101 - 125 of 1543 Matches Previous Page    3 4 5 6 7 8    Next Page
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement