Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk ManagementReports
126 - 150 of 1161 Matches Previous Page  | Next Page
Assessing the Value of Next-Generation Firewalls (Gov)
sponsored by Dell Software
WHITE PAPER: This white paper describes the different types of network-based attacks and how they can affect your bottom line. Click through for recommendations on which security tools can help you prevent these threats.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

Dell Software

International Mobile Security: Research Highlights and Considerations for Enterprise IT
sponsored by Cisco
WHITE PAPER: This study reveals how today's organizations are approaching mobility and the consumerization of IT, and what this means for the development of security measures fit for a more diverse and flexible business environment.
Posted: 21 Mar 2014 | Published: 31 Jul 2013

Cisco

Secunia Vulnerability Review 2014
sponsored by Secunia
WHITE PAPER: This guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
Posted: 21 Mar 2014 | Published: 26 Feb 2014

Secunia

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
sponsored by Cisco
WHITE PAPER: This white paper features a flexible, modular approach to mobile strategies that ensures optimum user access and experience, while offering robust security.
Posted: 21 Mar 2014 | Published: 31 Jul 2013

Cisco

Universities Have Much to Teach Cyber Thieves, Regrettably
sponsored by Peak 10
WHITE PAPER: Read this resource to gain insight on what steps institutions of higher education should take in leveraging IT tools to boost data protection strategies.
Posted: 21 Mar 2014 | Published: 04 Mar 2014

Peak 10

How to Protect Health Data from Hackers
sponsored by Peak 10
WHITE PAPER: View this resource to reveal key recommendations to help prevent the growing number of cyber threats in the healthcare industry.
Posted: 20 Mar 2014 | Published: 06 Mar 2014

Peak 10

Secunia PSI Country Report - Q4 2013 United Kingdom
sponsored by Secunia
WHITE PAPER: This informative report explores  the state of security on private PCs in the United Kingdom and  what programs are making them insecure.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Secunia

Secunia PSI Country Report - Q4 2013 Germany
sponsored by Secunia
WHITE PAPER: This informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Secunia

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

Security Management 2.5: Replacing Your SIEM Yet?
sponsored by IBM
WHITE PAPER: This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.
Posted: 20 Mar 2014 | Published: 01 Feb 2014

IBM

Combating Cybercrime - A Collective Global Response
sponsored by ThreatMetrix
WHITE PAPER: This guide explores the current threat landscape and how businesses are combating cybercrime on a global level.
Posted: 20 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

IBM Security Services Client Reference Guide
sponsored by IBM
WHITE PAPER: This in-depth guide explores essential case studies that will help you understand the evolving threat landscape and learn from your peers' compliance challenges.
Posted: 19 Mar 2014 | Published: 30 Nov 2013

IBM

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 19 Mar 2014 | Published: 31 Oct 2013

IBM

Stop Fraud Before it Happens
sponsored by Verizon
WHITE PAPER: This white paper features a healthcare fraud management solution that offers detection, prevention, and management tools to better identify threats before they strike.
Posted: 19 Mar 2014 | Published: 31 Dec 2012

Verizon

Next Generation Network Security Guide
sponsored by TechTarget
RESOURCE: Mobile devices are exploding in enterprises everywhere. Unfortunately, managing this dynamic world of communication is complex and daunting. This guide showcases how to deploy network security devices and how to avoid deployment failures.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

TechTarget

Five Essentials for Better Workforce Continuity – Integrating the Human Side into your Strategy
sponsored by IBM
WHITE PAPER: In this informative paper, learn about the five essential components to workforce continuity, in case of an enterprise emergency, and learn how to embrace the human element of business continuity planning.
Posted: 18 Mar 2014 | Published: 30 Nov 2013

IBM

Reducing the Cost and Complexity of Endpoint Management
sponsored by IBM
WHITE PAPER: This guide explores key tactics for thwarting cyber-attacks, how to protect your system, and the benefits of utilizing endpoint management.
Posted: 18 Mar 2014 | Published: 30 Sep 2013

IBM

9 Simple (but Critical) Tips for Effective Patch Management
sponsored by Dell, Inc.
WHITE PAPER: This resource offers 9 patch management best practices. Click now to reveal a comprehensive solution that will help you achieve effective patch management without suffering high costs.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Dell, Inc.

IBM Security Services Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This guide asks some key questions about the current threat landscape and analyzes cyber-attacks across the world.
Posted: 18 Mar 2014 | Published: 31 Jul 2013

IBM

Building momentum: Symantec's new approach to security
sponsored by TechTarget
RESOURCE: Despite its undisputed dominance of the security market, Symantec's revenues have remained static in recent years. Arif Mohamed reports in this eGuide, whether the expansion of its enterprise data security, cloud and mobile portfolio will return it to growth.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Purchase Intentions – Summer 2013 Europe
sponsored by TechTarget
RESOURCE: Making the right purchasing decisions is a daunting task, especially when it concerns the well-being of your organizations network. By taking this brief survey you will gain access to this exclusive guide based off a survey completed by over 600 respondents on purchase intentions. Learn what drives purchases, what is being purchased, and much more!
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Information Security ASEAN March 2014
sponsored by SearchSecurity.com
EZINE: This ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

SearchSecurity.com

Information Security ANZ March 2014
sponsored by SearchSecurity.com
EZINE: This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

SearchSecurity.com

Healthcare Fraud Management: Solutions for Identification and Intervention
sponsored by Verizon
WHITE PAPER: This white paper features a healthcare fraud management solution that leverages predictive analytics to identify potentially fraudulent claims and prevent improper payment before they occur.
Posted: 18 Mar 2014 | Published: 30 Nov 2011

Verizon

Podcast: Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
sponsored by Code42
PODCAST: In this on-demand podcast from the experts at SearchStorage.com, learn how choosing the right cloud model can help you address the challenges of data backup and security.
Posted: 20 Mar 2014 | Premiered: Mar 13, 2014

Code42
126 - 150 of 1161 Matches Previous Page    4 5 6 7 8 9    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement