Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
126 - 150 of 1381 Matches Previous Page  |  Next Page
5 Surprising Tax Risks Faced by Growing Businesses
sponsored by Avalara
WHITE PAPER: Did you know the very activities you rely on to get a leg up on your competitors can also create surprising tax compliance risks? Find out which 5 ways your success could be your downfall when it comes to tax compliance.
Posted: 14 Jan 2015 | Published: 31 Dec 2014

Avalara

Choose The Right ERP for Your Small Business
sponsored by Avalara
WHITE PAPER: Uncover top tips to help you select the ideal ERP for your business needs based on efficiency, scalability, risk, cost, and deployment. Plus, review why integration and transactional tax compliance are important when selecting an ERP system.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

Avalara

Phishing Tactics
sponsored by Symantec Corporation
WHITE PAPER: This fraud alert highlights the current growth and trends in today's phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Posted: 12 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Breach Preparation: Plan for the Inevitability of Compromise
sponsored by Bit9 + Carbon Black
WHITE PAPER: This important white paper provides insight from a data forensics expert, an attorney who works closely with board-of-directors-level management, a crisis communications professional, and an incident responder and technical expert to help you establish an effective incident response plan.
Posted: 12 Jan 2015 | Published: 08 Jan 2014

Bit9 + Carbon Black

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options
sponsored by Symantec Corporation
WHITE PAPER: This helpful guide explains how the effective implementation of SSL certificates is critical to protecting your customers, earning their trust, and ensuring your success when it comes to conducting business online.
Posted: 08 Jan 2015 | Published: 10 Jun 2013

Symantec Corporation

Are Your Everyday Business Activities Creating Tax Risk?
sponsored by Avalara
WHITE PAPER: This white paper discusses how to spot risk and improve compliance in 7 key business functions and explains the benefits of integrating and automating sales tax compliance in your ERP.
Posted: 07 Jan 2015 | Published: 02 Dec 2014

Avalara

Strategies to Mitigate Business Risk
sponsored by Hewlett-Packard Company
WHITE PAPER: View this white paper to learn how automating repetitive tasks and utilizing a single-pane-of-glass view into your infrastructure can reduce downtime costs by up to 60%. Read on to learn how new servers can protect your business from risk.
Posted: 07 Jan 2015 | Published: 13 Aug 2014

Hewlett-Packard Company

Securing the Modern Data Center: Building Proper Security Controls, Policies, and Processes to Address and Mitigate New Risks
sponsored by Cisco
WHITE PAPER: This paper reviews three data center trends and their risks.
Posted: 31 Dec 2014 | Published: 19 Nov 2014

Cisco

3 Essential Aspects of an Integrated Threat Defense Strategy
sponsored by Sourcefire
WHITE PAPER: This exclusive infographic explores the three key aspects of creating an integrated threat defense strategy that gives you the visibility to discover and protect against socially engineered exploits.
Posted: 31 Dec 2014 | Published: 31 Dec 2014

Sourcefire

Addressing the Full Attack Continuum: A New Threat-Centric Security Model for Before, During, and After an Attack
sponsored by Cisco
WHITE PAPER: This important white paper explores a security solution that spans the entire attack continuum.
Posted: 31 Dec 2014 | Published: 18 Nov 2014

Cisco

What to Look for in an Advanced Malware Protection Vendor
sponsored by Cisco
WHITE PAPER: This exclusive white paper explores the capabilities you must look for in your advanced malware protection vendor.
Posted: 31 Dec 2014 | Published: 26 Nov 2014

Cisco

Getting Started with Your Information Governance Blueprint
sponsored by Hewlett-Packard Company
WHITE PAPER: Find out how information governance can help your business accommodate big data, and minimize the risk created by that data.
Posted: 30 Dec 2014 | Published: 30 Dec 2014

Hewlett-Packard Company

Identifying Weak Security Links with Threat Intelligence
sponsored by Sourcefire
WHITE PAPER: Download this extensive white paper now to learn about how to fight back with threat intelligence. Also uncover details on current industry trends and find out where things will go from here.
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Sourcefire

IBM X-Force Threat Intelligence Quarterly
sponsored by Avnet
WHITE PAPER: This important white paper takes a look at how organizations dealt with the immediate aftermath of the Heartbleed announcement with large-scale mitigation strategies for ongoing protection.
Posted: 23 Dec 2014 | Published: 12 Aug 2014

Avnet

Managing Security Risks and Vulnerabilities
sponsored by Avnet
WHITE PAPER: Access this valuable white paper now to learn how to protect high-value assets and provide scalable, cost-effective, integrated security across the entire IT environment and much more.
Posted: 22 Dec 2014 | Published: 08 Jan 2014

Avnet

Email Archives: Why Old Solutions Aren't Sufficient for Modern Enterprises
sponsored by Mimecast
WHITE PAPER: This white paper examines the difficulties that organizations encounter as they seek a solution to ever-increasing volumes of stored emails and the need for faster, more flexible accessibility to this data.
Posted: 19 Dec 2014 | Published: 31 May 2013

Mimecast

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This informative white paper discusses how file sharing services are being used within enterprises; the benefits and risks that they bring; and the factors that organizations should consider in selecting an enterprise-grade service in order to ensure its security.
Posted: 19 Dec 2014 | Published: 30 Apr 2014

Mimecast

Integrating Document Control into your Core Business
sponsored by OpenText
WHITE PAPER: The following white paper explores the rationale, requirements, and collaborative benefits associated with an integrated approach to document control. Read on to learn how this technology can benefit your business as well.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

OpenText

Key Considerations in Moving to Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: This exclusive white paper offers up four crucial considerations to ensure a smooth transition to Office 365 and to allow for the same level of administration, security, and message hygiene you had with your on-premises implementation.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Defend web properties from modern threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Check out this white paper to discover the challenges of defending modern web properties from modern threats, as well as an application delivery controller (ADC) that works hand in hand with advanced malware protection and high-profile security products.
Posted: 16 Dec 2014 | Published: 31 Dec 2013

Citrix

Moving from Government to e-Government
sponsored by OpenText
WHITE PAPER: Read this white paper to learn the cost-cutting benefits of evolving into an e-government model. Read on to learn how one solution can make your transition faster and easier while protecting valuable and confidential data.
Posted: 16 Dec 2014 | Published: 24 Jul 2014

OpenText

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

LexisNexis + Micron SSDs = Faster, More Reliable Big Data Analytics
sponsored by Micron Technology
WHITE PAPER: This white paper details LexisNexis' soltuion to big data storage performance.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

Micron Technology

Risk Assessment Redo: Trends that make you rethink info governance strategy
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: New data protection vulnerabilities have forced organizations to reexamine risk management strategy. In this classroom, learn how to adapt your risk assessment and information management strategies to face modern threats.
Posted: 08 Dec 2014 | Premiered: 05 Dec 2014

SearchCompliance.com

A dangerous business? Enterprise risk forecasting
sponsored by IPL
WHITE PAPER: The following white paper will explore the common issues with risk assessment and how predictive KRIs may offer a solid solution. Learn how this technology works, what benefits they bring into the enterprise and more.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

IPL
126 - 150 of 1381 Matches Previous Page    4 5 6 7 8 9    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement