Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk ManagementReports
151 - 175 of 1451 Matches Previous Page  | Next Page
Breaking Big: When Big Data Goes Bad
sponsored by Information Builders
WHITE PAPER: Learn about the differences between conventional data and big data, as well as how those differences put big data environments at a great risk of data quality problems.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Information Builders

Financial Services Company Saves $5M Annually with iovation's Fraud Prevention Service
sponsored by iovation, Inc.
CASE STUDY: Discover how a major lending company uses device-based fraud prevention to protect customers and stop sophisticated loan fraud rings.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

iovation, Inc.

The Total Economic Impact of Verdasys Digital Guardian: Assigning Value to Information Protection
sponsored by Digital Guardian
WHITE PAPER: This resource examines the total economic impact and potential ROI enterprises may receive with Verdasys Digital Guardian.
Posted: 29 Sep 2014 | Published: 31 Oct 2013

Digital Guardian

Real-Time Data and Analytics Transforming Finance
sponsored by Workday
EGUIDE: Learn from Robert Kugel and Kristina West about how in-memory technology and real-time data are transforming finance and current barriers to adoption.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Workday

Gartner: Digital transformation: How to survive the information crisis
sponsored by ComputerWeekly.com
ANALYST BRIEF: It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew White.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Global Trading Services Provider Uses iovation to Reduce Foreign Currency Trading Fraud
sponsored by iovation, Inc.
CASE STUDY: A global trading services company faced the challenge of identifying and stopping cybercriminals. Find out how they put a stop to identity theft and reduced foreign currency trading fraud.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

How to Mitigate the Risk of Insider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explains how to successfully ward off insider threats by altering the operating environment.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

How Big Data Can Lie
sponsored by Information Builders
WHITE PAPER: Find out how combining advanced analytical solutions, such as predictive analytics, with data integration and integrity technologies can deliver successful analytics and decision management in big data scenarios.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Information Builders

Mobile Fraud Trends and Impact
sponsored by iovation, Inc.
WHITE PAPER: Device intelligence uncovers hidden layers of risk in mobile transactions from both web browsers and mobile applications. Get his report to learn more about mobile fraud—risks, insights and priorities.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Deloitte CIO Survey 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Deloitte's second global CIO survey assesses CIO's role in innovation, spending and technology priorities, and their relationship with the business.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

ComputerWeekly.com

Fighting Banking Fraud Without Driving Away Customers
sponsored by iovation, Inc.
WHITE PAPER: Discover a fraud prevention solution that offers advanced device identification and reputation services, and improves the overall customer experience with online banking—at the same time.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

A More Effective Approach to Scalable Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper highlights the importance of using a scalable data classification program within your organization.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: In this white paper, explore the endless possibilities of implementing mobile initiatives into your business while keeping security initiatives in mind.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CA Technologies.

Balancing Data Protection and Compliance in the Cloud
sponsored by CipherCloud
WHITE PAPER: This white paper outlines a cloud-based solution that helps organizations stick to compliance requirements, and offers reliable data protection in the cloud.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CipherCloud

Data Loss Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Creating a Successful Patch Management Strategy
sponsored by N-able Technologies
EGUIDE: In this expert e-Guide, learn how to ensure that your patch management strategy remains secure following the transition from physical to virtual desktops; why delaying security patches puts organizations at risk; and how to build a case for a formal patch management program.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

N-able Technologies

3 Threats to Cloud Data, and How to Address Them
sponsored by CipherCloud
RESOURCE: In this resource, uncover the three major threats to cloud computing according to the Cloud Security Alliance, and learn about the best ways to protect your organization against malicious threats.
Posted: 24 Sep 2014 | Published: 03 Jul 2014

CipherCloud

The Future of Data Security: A Zero Trust Approach
sponsored by Digital Guardian
WHITE PAPER: This report reveals where data security strategies are heading in the future, and how traditional approaches are no longer making the cut.
Posted: 24 Sep 2014 | Published: 05 Jun 2014

Digital Guardian

Take Control of Your IT Security with New Cyber Resilience Programs
sponsored by Sungard
WHITE PAPER: In this in-depth whitepaper, discover a new cyber resilience program that can strengthen your defense against malicious attackers, improve responsiveness and adaptability, and provide comprehensive risk management.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Sungard

How to Stop Online and Mobile Banking Fraud
sponsored by iovation, Inc.
WHITE PAPER: This white paper reveals how to utilize a multilayered fraud prevention solution that doesn't sacrifice the overall customer experience.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

iovation, Inc.

Cloud Application Security Requires Visibility and Control
sponsored by CipherCloud
VIDEO: Tune in to this video to find out how to gain visibility and control over your cloud applications with an easy to deploy solution.
Posted: 23 Sep 2014 | Premiered: 23 Sep 2014

CipherCloud

Strengthening Security, Compliance, and Control in Microsoft® Office 365®
sponsored by Actiance
WHITE PAPER: There are some missing features in Office 365 that will prompt some customers to consider the use of third-party, cloud-based or on-premises tools to enhance Office 365's native capabilities.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

Effectively Spot Security Threats with New SSL Visibilty Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this in-depth guide, discover new SSL visibility solutions that can help organization effectively monitor encrypted traffic and detect malicious content.
Posted: 22 Sep 2014 | Published: 31 Dec 2013

Blue Coat Systems

Expose Hidden Threats with new SSL Decryption Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this informative white paper, discover how crucial new SSL decryption and inspection solutions can help organizations manage threats and sensitive data on their network.
Posted: 22 Sep 2014 | Published: 30 Nov 2013

Blue Coat Systems

Take back control of enterprise data
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn how enterprise content management can help you lower cost and risk and drive strategic insight and productivity.
Posted: 21 Sep 2014 | Published: 17 Mar 2014

Hewlett-Packard Company
151 - 175 of 1451 Matches Previous Page    5 6 7 8 9 10    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement