Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
126 - 150 of 1532 Matches Previous Page  |  Next Page
Synchronized Security: Best-of-breed defense that's more coordinated than attacks
sponsored by Sophos
WHITE PAPER: Today's attacks are more sophisticated and coordinated than ever. According to ESG, 46% of organizations believe they have a problematic shortage of cybersecurity skills. Inside, learn how to protect against known and emerging threats.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Sophos

GDPR will bring the Teeth that have been Missing in Data Security Auditing and Compliance
sponsored by SyncDog
WHITE PAPER: Data security standards have been around for decades yet standards enforcement has been lacking. This paper identifies 5 steps to help maintain compliance leading up to GDPR.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

SyncDog

SyncDog Metropolitan Police Department Case Study
sponsored by SyncDog
WHITE PAPER: In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

SyncDog

Don't Let Legacy Security Tools Hold Up PCI Compliance in the Cloud
sponsored by CloudPassage
WHITE PAPER: Explore the top challenges of using traditional PCI security controls in a cloud environment. Learn how you can automate cloud compliance with the Payment Card Industry Data Security Standard.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

CloudPassage

Top 10 Ways to Achieve Agile Security
sponsored by CloudPassage
RESOURCE: From the barrage of cyberattacks on enterprises to new threat vectors within networks due to the move to the cloud, CIOs and CISOs have more to consider around cybersecurity than ever before. Check out this brief albeit enlightening guide that reveals the 10 fundamental steps to help you get started on your own path to agile security nirvana.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

CloudPassage

The Dangers of Phishing: Help Employees Avoid the Lure of Cybercrime
sponsored by Kaspersky Lab
WHITE PAPER: According to Kaspersky Labs, 48% of all phishing attacks were focused on gleaning users' financial data. This white paper reveals how to identify a phishing attack and how to protect your business from being targeted by phishing attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

When Cryptors Attack: Timeline of a Ransomware Infection
sponsored by Kaspersky Lab
WHITE PAPER: The average amount of damage to SMBs caused by one cryptomalware attack is $99,000, according to a survey from Kaspersky Lab and B2B International. Take a closer look at this white paper to learn about cryptomalware attacks and how to prevent your company from being targeted with cryptomalware.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

Encryption Hiding Malware in Half of Cyber Attacks
sponsored by A10 Networks
EGUIDE: A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

Report: Lack of SSL Traffic Inspection Poses Threat to Enterprises
sponsored by A10 Networks
EGUIDE: Most companies fall short when it comes to SSL traffic inspection, according to Ponemon Institute. Read this e-guide to reveal an expert report that recognizes how lack of SSL traffic inspection is putting companies at risk.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

5 Ways to Ensure Digital Business Success
sponsored by Entrust, Inc.
WHITE PAPER: Analysts predict that 40% of all digital initiatives will fail due to mismanagement of identity-related requirements. Read this white paper to uncover 5 ways to ensure stronger authentication and identity management within your business.
Posted: 20 Sep 2017 | Published: 31 Dec 2016

Entrust, Inc.

IBM Cloud Secure Virtualization: Your Key to Simplifying GDPR Compliance
sponsored by HyTrust
WHITE PAPER: Time is running out for firms to comply with the GDPR. Take a closer look at this white paper to reveal how to simplify your compliance efforts.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

HyTrust

Optimize your AML Investigation Productivity
sponsored by Attivio, Inc.
EBOOK: Read this e-book to reveal a holistic view of risk and compliance to strengthen your anti-money laundering software.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

ComputerWeekly.com

GDPR: The State of Play
sponsored by ComputerWeekly.com
DATA SHEET: An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

ComputerWeekly.com

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

Security Orchestration and Micro-Segmentation for Public and Private Cloud
sponsored by Cloudvisory
WHITE PAPER: According to Gartner, misconfiguration and mistakes are the leading causes of operations incidents and successful security attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Cloudvisory

Expert Perspectives on Data Protection and GDPR Compliance
sponsored by CyberArk Software, Inc
EGUIDE: A report from World Economic Forum and McKinsey & Company estimates that cyberattacks could cost the global economy $3 trillion by 2020. Read this e-guide to reveal experts' perspectives on data protection, cybersecurity, and compliance.
Posted: 22 Sep 2017 | Published: 20 Sep 2017

CyberArk Software, Inc

SWIFT Security Controls to be Mandatory by 2018
sponsored by CyberArk Software, Inc
EGUIDE: Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018.
Posted: 22 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

Privileged Account Security
sponsored by CyberArk Software, Inc
EGUIDE: 55% of insider misuse is tracked to privileged account abuse, according to Verizon's Data Breach Investigations Report. Take a look at this expert e-guide to discover how to improve your security by limiting privileged accounts.
Posted: 22 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

How Ransomware Attacks have Changed
sponsored by CyberArk Software, Inc
EGUIDE: Take a look at this e-guide to uncover an expert perspective that reveals a different kind of ransomware, how ransomware has changed, and how to prevent destruction of service attacks.
Posted: 22 Sep 2017 | Published: 20 Sep 2017

CyberArk Software, Inc

Logrythm's Security Analytics Platform: Product Overview
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment.
Posted: 20 Sep 2017 | Published: 14 Sep 2017

LogRhythm, Inc.

SIEM Analysis for Security Professionals
sponsored by LogRhythm, Inc.
EDITORIAL RESOURCE GUIDE: This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise.
Posted: 20 Sep 2017 | Published: 14 Sep 2017

LogRhythm, Inc.

Why Security in DevOps is Essential to Software Development
sponsored by SearchSecurity.com
EBOOK: What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

SearchSecurity.com

Step Up Your Security and Privacy with Data Masking
sponsored by Delphix
WEBCAST: For many organizations, the most confidential information exists in some of the least-secure environments. Learn why data masking is an effective approach to protecting sensitive environments from a variety of threats. Discover challenges and best practices for implementing data-masking tools, and more.
Posted: 07 Sep 2017 | Premiered: Aug 28, 2017

Delphix

EU GDPR Compliance Puts Focus on Data Tracking, Encryption
sponsored by Ivanti
EGUIDE: In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.
Posted: 05 Sep 2017 | Published: 31 Aug 2017

Ivanti
126 - 150 of 1532 Matches Previous Page    4 5 6 7 8 9    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement