Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
101 - 125 of 1407 Matches Previous Page  |  Next Page
Limiting Widespread Data Access
sponsored by Varonis
WHITE PAPER: This white paper discusses the problem of universal access to sensitive data and gives suggestions for solving this problem without interfering with the business process.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

Case Study: Boston University Achieves Heightened Protection for Sensitive Data
sponsored by Varonis
WHITE PAPER: Access this case study to discover how Boston University implemented DLP that gives insight into both where sensitive data is located and who has access to it.
Posted: 24 Jun 2015 | Published: 01 Jan 2014

Varonis

Special Report: Detailed Reviews of 7 IPS Platforms
sponsored by IBM
WHITE PAPER: This report presents detailed reviews of seven IPS platforms to help you decide which one meets your specific needs.
Posted: 24 Jun 2015 | Published: 29 Dec 2014

IBM

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

Understand the Threat Landscape
sponsored by IBM
WHITE PAPER: This infographic provides you with some essential statistics regarding the rising problem of cybercrime.
Posted: 24 Jun 2015 | Published: 31 Dec 2014

IBM

Strategy Considerations for Building a Security Operations Center
sponsored by IBM
WHITE PAPER: This white paper discusses the benefits of SOCs and gives essential advice on designing one that will work for you.
Posted: 24 Jun 2015 | Published: 31 Dec 2013

IBM

Data Breach Risk Calculator
sponsored by IBM
WHITE PAPER: With this risk calculator, you can answer a few simple questions to determine how much your organization would lose in a data breach.
Posted: 24 Jun 2015 | Published: 31 Dec 2014

IBM

Advance Your Cybersecurity Career with Unique Online Cybersecurity Graduate Program
sponsored by Mission Critical Institute
WHITE PAPER: This resource introduces the expert faculty in the online cybersecurity MBA program offered through Concordia St. Paul. Take a look to determine if these staff members could help you reach your further education goals.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Mission Critical Institute

UK 2015 Cyber Risk Survey Report
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Many UK firms are failing to adequately assess their customers and trading partners for cyber risk, Marsh's UK Cyber Risk Survey reveals.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

ComputerWeekly.com

Gartner Market Guide for File Analysis Software
sponsored by Symantec | Veritas
WHITE PAPER: File analysis (FA) enables better information management decisions for unstructured data. Access this market guide for File Analysis software to read about use cases, recommendations, and vendor comparisons.
Posted: 18 Jun 2015 | Published: 23 Sep 2014

Symantec | Veritas

NetApp Is Accelerating Your Data Protection Strategy to the Clouds
sponsored by NetApp
WHITE PAPER: This informative white paper makes it clear that improving data backup and recovery is a top priority for IT groups in organizations of all sizes.
Posted: 18 Jun 2015 | Published: 01 Jan 2015

NetApp

HP employs Microsoft Windows Server 2003 Migration Program
sponsored by HP
WHITE PAPER: This white paper explains how to employ a Microsoft Windows Server 2003 migration program. Read now to migrate to Windows Server 2012 R2 while making business improvements.
Posted: 16 Jun 2015 | Published: 31 May 2015

HP

Information Governance: Fighting Back Against the Exponential Data Curve
sponsored by Symantec | Veritas
WHITE PAPER: This white paper focuses on information governance, specifically fighting back against the exponential data growth we are facing.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Symantec | Veritas

The Essential Guide To Selling Managed Endpoint Protection
sponsored by Solarwinds N-able
WHITE PAPER: This guide offers essential tips for building managed security services that effectively protect your customers while building your revenue.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Solarwinds N-able

Risk-Free VDI with Tintri and Citrix
sponsored by Tintri
WHITE PAPER: Many IT organizations are turning to virtual desktop infrastructure (VDI) technology to reduce the cost, complexity, and risk associated with desktop management. Access this white paper to find out how to gain end-to-end insights into the storage infrastructure for unmatched VM control. Learn how to you make your VDI successful.
Posted: 05 Jun 2015 | Published: 07 Jul 2014

Tintri

Ecommerce & Media Websites: A Custom Private Cloud to Handle Your Complex Website Requirements
sponsored by Rackspace
WHITE PAPER: E-commerce and media-rich websites require robust infrastructure, security, compliance, and high availability. A custom private cloud can handle these complex websites. Read this white paper to find out how to support the needs of these websites.
Posted: 05 Jun 2015 | Published: 18 May 2015

Rackspace

Turkcell improves productivity through processes automation
sponsored by Hewlett-Packard Limited
WHITE PAPER: Turkcell's IT team needed to optimize its resources, focusing on the tens of thousands of incidents and service requests it receives monthly, along with process automation and health checks. Read this white paper to find out how Turkcell's IT team saved 3,300 man-hours each month, while improving quality and supporting digital business processes.
Posted: 03 Jun 2015 | Published: 31 Aug 2013

Hewlett-Packard Limited

Managing Multi-Vendor UC Ecosystems
sponsored by IR
WEBCAST: This video introduces IR Prognosis, which identifies issues, reduces MTTR, and manages multi-vendor UC ecosystems, including Microsoft, VMware, Avaya, Cisco, and Alcatel-Lucent. Watch now so you can monitor, measure, and manage the user's complete UC experience and take control of your UC environment.
Posted: 02 Jun 2015 | Premiered: Jun 2, 2015

IR

The 5 Essential Functions of an Enterprise Security Operations Center
sponsored by IBM
WHITE PAPER: This infographic describes the five ways a dedicated security operations center can help you develop smarter and more efficient responses to threats.
Posted: 29 May 2015 | Published: 29 May 2015

IBM

8 Elements Of Complete Vulnerability Management
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: Read this white paper to discover the eight elements of comprehensive vulnerability management, and to learn how you can make sure your vulnerabilities stay sealed against even the most sophisticated attacks.
Posted: 28 May 2015 | Published: 28 May 2015

BAE Systems Applied Intelligence (formerly SilverSky)

Modernizing Software Delivery through Software-Defined Environments
sponsored by IBM
WHITE PAPER: Companies need a holistic software delivery process that streamlines their ability to innovate based on customer feedback while also lowering barriers, costs and risks. Software-defined environments (SDEs) can do this. This white paper explains how to begin the transition to SDEs and receive the full benefit of their resources and tools.
Posted: 27 May 2015 | Published: 31 Dec 2014

IBM

Information Visibility: Reducing Business Risk
sponsored by Clearswift
WHITE PAPER: This paper introduces the concepts and ideas behind an information governance platform by providing details of some of its key features, such as Adaptive Redaction and information discovery and tracking through the Information Governance Server.
Posted: 26 May 2015 | Published: 01 Apr 2015

Clearswift

Securing the Mobile-First Experience
sponsored by HID
RESOURCE: This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015

HID

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM
101 - 125 of 1407 Matches Previous Page    3 4 5 6 7 8    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement