Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
101 - 125 of 1774 Matches Previous Page  |  Next Page
SunRice Reboots Their Cyberthreat Defense & ROBO Network Security
sponsored by Palo Alto Networks
CASE STUDY: In this case study, SunRice illustrates how to leverage a centralized security policy management platform to bolster cyber-threat defense and improve visibility of network infrastructure. Access now to streamline network security management and learn how to consolidate outdated legacy appliances.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

Palo Alto Networks

Five Essential Elements for an Effective Mobile Security Strategy
sponsored by vmware airwatch
WHITE PAPER: End users want access to data anytime, anywhere, but enterprise mobility creates increased opportunities for cyberattacks. In this trend brief, you'll review the essential elements of building a mobile security strategy. Access now to learn about ways to construct your strategy and protect data.
Posted: 15 Aug 2016 | Published: 29 Apr 2016

vmware airwatch

Web Application Security: Is Your Site Vulnerable to Attackers?
sponsored by Akamai
RESOURCE: This short infographic details the importance of intelligent security for web applications, including the necessity of a web application firewall (WAF). Learn how to seamlessly integrate and manage a cloud-based WAF to keep hackers out of your business.
Posted: 12 Aug 2016 | Published: 01 Jul 2016

Akamai

Overcoming The Challenges Presented By Mobility In The Enterprise
sponsored by IBM MaaS360
WEBCAST: This webinar shows you the granular management controls that you need working at the app and data levels. Learn how to leave the personal user experience unaffected while better securing corporate data.
Posted: 10 Aug 2016 | Premiered: May 25, 2016

IBM MaaS360

Network Optimizations to Deliver Rich, Dynamically Generated Content
sponsored by Akamai
WHITE PAPER: Online shoppers want entertainment, personalization, and instant gratification. While this is possible, it usually means slow page downloads. Discover how to deliver on customer expectations without damaging the experience or your brand's reputation.
Posted: 10 Aug 2016 | Published: 31 Jul 2014

Akamai

Insider Threat Spotlight Report
sponsored by Exabeam
WHITE PAPER: High profile security breaches underline the need for better security practices and solutions to reduce the risks posed by insiders. Read this research report from the LinkedIn Information Security Community to gain more insight into the state of insider threats and the solutions your peers plan to implement to prevent them.
Posted: 10 Aug 2016 | Published: 01 Jul 2016

Exabeam

‘But I Was Compliant’
sponsored by Armor
WHITE PAPER: Learn how to take a holistic approach to security and, in the process, easily meet regulatory requirements. Look beyond your checklist to ensure data security and the health of your organization.
Posted: 09 Aug 2016 | Published: 01 Jul 2016

Armor

The Definitive Guide to Data Loss Prevention Healthcare Edition
sponsored by Digital Guardian
WHITE PAPER: This comprehensive guide provides what you need to understand, evaluate, and succeed with DLP in healthcare systems. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts.
Posted: 09 Aug 2016 | Published: 01 Jul 2016

Digital Guardian

A SECURITY MANAGER'€™S GUIDE TO VENDOR RISK MANAGEMENT
sponsored by BitSight
WHITE PAPER: Vendor risk management (VRM) is a critical business practice. Within the pages of this guide, security professionals will learn about basic questions you need to ask all vendors and the impact of continuous risk monitoring software.
Posted: 05 Aug 2016 | Published: 01 Jul 2016

BitSight

Utilize Central Recovery Manager to Enforce HPE 3PAR File Persona Data Protection
sponsored by NTT ICT
WHITE PAPER: This white paper demonstrates application-managed data protection that speeds and simplifies protection on your 3PAR StoreServ array. Access now to create local and remote snapshots for quick data recovery, and learn to enable hypervisor owners to control backup from their native tools.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

NTT ICT

451 Research: Vormetric Enters Encryption Gateway Fray with Latest Extension to Its Platform Strategy
sponsored by Vormetric
ANALYST REPORT: This 451 Research report offers a current analysis of Vormetric's recent product releases, including the solutions offering tokenization with dynamic data masking, Teradata support, and cloud encryption gateway. The report also offers analysis of the Vormetric Data Security Platform strategy.
Posted: 29 Jul 2016 | Published: 01 Jun 2016

Vormetric

Pushing the Start Button on Information Lifecycle Governance
sponsored by IBM
WHITE PAPER: Strong information governance ensures that big data remains an advantage for your company. It is important to realize that information governance improvement has to come slowly, in steps instead of strides. Read on to gauge your company's information governance maturity and how to set realistic goals.
Posted: 28 Jul 2016 | Published: 30 Jan 2015

IBM

Securosis: Securing Hadoop: Security Recommendations for Hadoop Environments
sponsored by Vormetric
ANALYST REPORT: This research paper lays out a series of recommended security controls for Hadoop, along with the rationale for each. The analysis is based upon conversations with dozens of data scientists, developers, IT staff, project managers, and security folks from companies of all sizes; as well as decades of security experience the Securosis team brings.
Posted: 28 Jul 2016 | Published: 01 Jun 2016

Vormetric

Market Guide for Merchant and Acquirer Tokenization of Payment Card Data
sponsored by Vormetric
WHITE PAPER: The tokenization of sensitive data is a key component in the ensuring of payment system security. Chief Information Security Officers at cardacceptors and payment processors should use this Market Guide to choose the most appropriate products for their tokenization projects.
Posted: 28 Jul 2016 | Published: 01 Jun 2016

Vormetric

Bloor: For the EU's New Data Protection Regulation, Encryption Should Be the Default
sponsored by Vormetric
WHITE PAPER: This report by Bloor Research discusses the changes being made to the EU data protection landscape and suggests that encryption should be the default choice for protecting data. Discover how you can make it part of a comprehensive, consistent data security strategy.
Posted: 28 Jul 2016 | Published: 01 Jun 2016

Vormetric

Webcast - Enhancing Enterprise Security in 2016 – Part 2
sponsored by Intel
WEBCAST: Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

Enhancing Enterprise Security in 2016
sponsored by Intel
WEBCAST: In this informative webcast, Chris Young maps out a new model for cybersecurity, and shares what's currently underway. Learn how to get the most bang for your security buck and what role the government is playing in keeping your enterprise secure.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

The Threat Defense Lifecycle — Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn how to navigate the new world of cyber threats and security tools while maintaining an open mind towards new strategies and priorities. Collaborate with business pros and innovate to fortify existing defenses and establish new bulwarks against threats lurking around the corner.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

The Threat Defense Lifecycle — Reducing the Time to Discover and Recover
sponsored by Intel Security
WHITE PAPER: You need a new philosophy that'll reduce manual intervention, cut management complexity and optimize existing resources in order to reduce mitigation times. Discover an automated, analytics driven threat defense lifecycle that will give you the best opportunity for long-term, sustainable success in staying in front of security threats.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

The Threat Defense Lifecycle: Intelligent Endpoint Threat Defense
sponsored by Intel Security
WHITE PAPER: Adopt a threat defense lifecycle that will allow you to discover threats faster, respond quicker and overall outsmart attackers, driving business efficiency forward. Learn how to then apply these insights to an automated policy that can block similar attack attempts up front.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

Seven Steps to Ease the Pain of Managing a SOC
sponsored by Intel Security
WHITE PAPER: Discover seven steps that will help SOC managers improve their ability to spot and eradicate threats at several points in the IT ecosystem, from the data center to the endpoint, both onpremises and in the cloud. Learn new, real-world solutions that simplify management, improve detection, and increase the speed of mitigation.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

Former Healthcare CIO Talks Cybersecurity in Healthcare
sponsored by Optum
EGUIDE: Gary Seay, former vice president and CIO of Community Health Systems, was one of the earliest victims of a healthcare data breach back in 2014. In this e-guide, Seay shares what he believes every healthcare organization should do to ward off cyberattacks and shares specific technologies involved in maintaining cybersecurity for healthcare.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

If A Hacker Wants Your Data, Make Sure They Really Work For It
sponsored by Carbon Black
ESSENTIAL GUIDE: This e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.
Posted: 28 Jul 2016 | Published: 25 Jul 2016

Carbon Black

Bolster Your Incident Response and Threat Detection Strategy
sponsored by Carbon Black
WHITE PAPER: In these digital times, how can you mitigate modern attacks? Discover how to centralize all endpoint activity into a single console, easily accessible to you at any time. Streamline incident response to quickly mitigate current risks and avoid future ones.
Posted: 28 Jul 2016 | Published: 01 Jun 2016

Carbon Black
101 - 125 of 1774 Matches Previous Page    3 4 5 6 7 8    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement