Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
126 - 150 of 1724 Matches Previous Page  |  Next Page
Three Critical Steps to Launch a Data Breach Response
sponsored by AllClear ID
WHITE PAPER: This resource highlights three critical steps in launching an effective incident response plan. Learn how to assemble a team, build communication channels with that team, draft different plans around specific incidents types and offer helpful services like identity theft protection.
Posted: 01 Jul 2016 | Published: 31 Dec 2015

AllClear ID

Infographic: Breach Preparedness
sponsored by AllClear ID
WHITE PAPER: This infographic shows you statistics from business executives and consumers on how they handle and perceive a data breach. Learn how to properly deal with a major breach now, before it's too late to formulate a proper breach response plan.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

7 Key Factors of a Highly Effective Application Protection Solution
sponsored by Arxan
WHITE PAPER: An effective application protection strategy is paramount to safeguarding the integrity and confidentiality of an application. This white paper discusses the 7 key factors that enable effective application protection, mitigating binary code risks and combating the latest security threats.
Posted: 30 Jun 2016 | Published: 01 May 2016

Arxan

Privileged Users
sponsored by Forcepoint
WHITE PAPER: Damage caused by Privileged Users is the most extensive, hardest to mitigate, and hardest to detect. However, a solution exists to mitigate the threat of Privileged User abuse. Read the "Privileged Users: Superman or Superthreat?" whitepaper for best practices and strategies for mitigating the threat within your organization.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

Defeating the Threat Within
sponsored by Forcepoint
WHITE PAPER: Your critical data can be stolen by someone who interacts with your network daily. You need the right plan before it happens. Learn about the new wave of insider threats and start planning now.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

ROI for Threat Intelligence
sponsored by ThreatConnect
PRODUCT NEWS: Not all intelligence is created equal. Learn how to make informed decisions about threat intelligence (TI) for your particular organization. Done right, you can sharpen your defenses, save time, and make better strategic decisions on your security using TI.
Posted: 30 Jun 2016 | Published: 29 Feb 2016

ThreatConnect

Breach response: It's about keeping your customers safe
sponsored by AllClear ID
WHITE PAPER: Learn how to deliver a timely, organized breach response that boosts customers' confidence, repairs customers' identities if they've been victimized and helps minimize irreparable damage to your brand. Ensure peace of mind by giving your assurance that your organization values both their identities and their loyalties.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

Breach response isn't about losing data. It's about keeping your customers.
sponsored by AllClear ID
WHITE PAPER: The time to prepare for a data breach is today. Give your customers reassurance that they are taken care of and help resolve any harm done to their identity. Learn how to respond to customer queries effectively and reduce customer response time for any size breach to as little as 48 hours.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

Building a Vendor (IT) Risk Management Program
sponsored by BitSight
WHITE PAPER: Understand a vendor's security posture without requiring expensive site visits and penetration tests. Assess your vendors more frequently and focus efforts on those who have serious security issues.
Posted: 29 Jun 2016 | Published: 28 Apr 2016

BitSight

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
PODCAST: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 28 Jun 2016 | Premiered: Jun 16, 2016

Citrix

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
WEBCAST: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 28 Jun 2016 | Premiered: Jun 16, 2016

Citrix

Breach Response: Preparing for the Threat; Controlling the Chaos
sponsored by AllClear ID
WHITE PAPER: Examine past breaches, in this report, to learn the tangible benefits of being well-prepared for a cyberattack, and the key features of a successful incident response plan. Discover how to emerge from every data breach with an enhanced public image of responsibility and competence.
Posted: 28 Jun 2016 | Published: 01 Oct 2014

AllClear ID

Illuminating the Real Cost of Incidents from an Insurer's Perspective
sponsored by AllClear ID
WHITE PAPER: This study helps you understand the true impact of data insecurity and the real cost of incidents by consolidating claims data from multiple insurers.
Posted: 28 Jun 2016 | Published: 31 Dec 2014

AllClear ID

The Cost of Unintentional Insider Threat
sponsored by Forcepoint
WHITE PAPER: A high rate of Unintentional Insider Threats (UIT) sheds light on the demands of today's workplace culture in the United States. Work cultures are unlikely to change anytime soon, but there are tools and programs that can help any work environment with a UIT problem. To find out more, read the report.
Posted: 28 Jun 2016 | Published: 13 Jan 2016

Forcepoint

Security Performance Metrics Across Major World Economies
sponsored by BitSight
WHITE PAPER: This report shows you the security performance results of 250 organizations per country from the U.S., the U.K., Singapore, Germany, China and Brazil during May 2015 until May 2016. Discover how to help your organization's security stance as you move forward into new, global markets.
Posted: 28 Jun 2016 | Published: 01 May 2016

BitSight

Don’t Let “Trusted” Vendors Become Cyber-Breach Enablers
sponsored by BitSight
WHITE PAPER: This resource uncovers how evaluate vendors' security ratings simply and effectively. Learn how to police the safety of the vendors entrusted with handling your sensitive data to enhance your vendor risk management program no matter where it is on the maturity curve.
Posted: 28 Jun 2016 | Published: 01 May 2016

BitSight

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
WHITE PAPER: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 24 Jun 2016 | Published: 01 May 2016

Citrix

QRadar: Expert SIEM Product Overview
sponsored by IBM
EGUIDE: Looking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.
Posted: 23 Jun 2016 | Published: 01 May 2016

IBM

Top 10 Reasons to choose EMC Data Protection Solutions
sponsored by Richardson Eyres
WHITE PAPER: Learn 10 reasons why changing your data protection platform to enable efficiency and TCO is a must. Discover enterprise-class data protection across on premise, virtualized, hybrid, and cloud consumption models.
Posted: 23 Jun 2016 | Published: 01 May 2016

Richardson Eyres

Neutralize Emerging Threats: Reducing the Time to Discover and Recover
sponsored by Intel Security
PODCAST: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Premiered: May 1, 2016

Intel Security

Neutralize Emerging Threats: Reducing the Time to Discover and Recover Webcast
sponsored by Intel Security
WEBCAST: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Premiered: May 1, 2016

Intel Security

Neutralize Emerging Threats: Reducing the Time to Discover and Recover Transcript
sponsored by Intel Security
WHITE PAPER: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Published: 01 May 2016

Intel Security

Why Traditional Security Fails
sponsored by Intel Security
PODCAST: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 28 Jun 2016 | Premiered: May 1, 2016

Intel Security

Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 27 Jun 2016 | Published: 01 May 2016

Intel Security

Why Traditional Security Approaches Fail
sponsored by Intel Security
WEBCAST: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure. Uncover 4 key areas to focus on when implementing a new, more efficient security strategy.
Posted: 27 Jun 2016 | Premiered: May 1, 2016

Intel Security
126 - 150 of 1724 Matches Previous Page    4 5 6 7 8 9    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement