Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
176 - 200 of 1726 Matches Previous Page  |  Next Page
Revealing Security Performance Metrics Across Major World Economies
sponsored by BitSight
WHITE PAPER: In its latest research report, BitSight studied the security performance of companies per country with more than 50% of their IP space in: The United States, United Kingdom, Germany, Brazil, China and Singapore.
Posted: 07 Jun 2016 | Published: 01 May 2016

BitSight

Optimizing Web Application Security for the New Bad Bot Threat Landscape
sponsored by Distil Networks
WHITE PAPER: Winning in today's bot battlefield takes time, expertise, and a dedicated team. In this white paper, get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.
Posted: 07 Jun 2016 | Published: 01 May 2016

Distil Networks

Defend Against Threats of Global Operations
sponsored by Verizon
WHITE PAPER: Learn how the organization decided to replace the company's global remote-access infrastructure with platforms that allow it greater overall visibility to areas of increased vulnerability. Discover how to guard both your global network and application delivery platforms to help protect your reputation and maintain business continuity.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon

Masergy Customer turned Evangelist, Stuart Carrothers talks Masergy
sponsored by MASERGY
WEBCAST: In this video, you'll discover a security vendor that wants to work with you for the lifetime of your organizations. From them, you'll get real-time visibility and change bandwidth as you need it. Learn about largest global network in the world based on software defined networking.
Posted: 07 Jun 2016 | Premiered: May 1, 2016

MASERGY

Understand the Business Impact and Cost of a Breach
sponsored by MASERGY
ANALYST REPORT: This Forrester Report will help security and risk leaders build a case for investment to show business leaders what kind of investment it'll take to adequately protect their organization.
Posted: 07 Jun 2016 | Published: 12 Jan 2015

MASERGY

Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale
sponsored by Anomali
WHITE PAPER: To address growing scalability issues, organizations will need to embrace a distributed computing approach to security. In addition, Threat Intelligence Platforms will need to create organizational relevance for threat intelligence data.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Anomali

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

Masergy UES Offers Unique Approach to Network Defense
sponsored by MASERGY
ANALYST REPORT: Instead of applying a one-size-fits-all approach, multi-stage machine learning analysis detects events differently on different networks. Learn how this security strategy can find predictable patterns on your network and methods that work best for it.
Posted: 06 Jun 2016 | Published: 11 Nov 2015

MASERGY

An Operational Model for Breach Analytics and Intelligence
sponsored by Anomali
WHITE PAPER: In the face of this situation, a new approach to security strategy and operations must be adopted. Discover an approach that focuses on operational relevance, reducing adversary dwell time and speeding incident response activities.
Posted: 06 Jun 2016 | Published: 01 May 2016

Anomali

Find, Classify, Protect your data
sponsored by Verizon
WHITE PAPER: Understanding, identifying and classifying your data correctly are the first steps in information security. Learn how to evaluate your data landscape and create a plan to manage and secure it.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Verizon

Why Today's Phishing Attacks are Harder to Detect
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to best protect your email gateway from phishing attacks and keep important information from being shared or exposed. Get clear visibility into all email using search and reporting capabilities to prioritize security incidents.
Posted: 06 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Encryption as an IT Service
sponsored by Gemalto
WHITE PAPER: To build a sustainable security foundation, organizations need to employ encryption as an IT service — centrally and cohesively managing encryption across an entire enterprise. Gain significant benefits in overall security, administrative efficiency and business agility.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

Gemalto

The Convergence of IT Security and Physical Access Control (PACS): Why Now and How it Works
sponsored by HID
WHITE PAPER: In this paper, you will learn what is driving the convergence between IT security and physical access control. Discover how creating a single identity for IT Security and physical access control can benefit your organization, while providing a better experience for your employees.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

HID

vanGO® One-2-One™ Personalized Security
sponsored by HID
WHITE PAPER: With several different card, hardware and software options available, designing the right solution for your organization is easy. vanGO is a total solution consisting of cards, hardware and software that work together to create a simple, secure, and cost-effective system.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

HID

Encrypt Office 365 Emails
sponsored by ZixCorp
RESOURCE: Passive identification of what emails should be encrypted can simultaneously protect your business while unburdening your system from unnecessary processes. Discover how to automatically scan outbound emails from Office 365 connectors and accurately detect sensitive information and evolve with changing best practices.
Posted: 03 Jun 2016 | Published: 01 May 2016

ZixCorp

Intermedia Builds an Instant Security Operations Center and Speeds Business Processes
sponsored by Splunk
CASE STUDY: This case study demonstrates how Intermedia overcame its cloud security challenges and boosted productivity with data-driven analytics and incisive, enterprise-wide intelligence.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Splunk

CISOs Are Under Mounting Pressure
sponsored by MASERGY
ANALYST BRIEF: CISOs need help. The smart ones are turning to a new way of thinking about cybersecurity protection: Security as a Service. It's a managed, unified solution that leverages the power of both machine learning and expert human intelligence. Discover the scalability and speed SaaS can add to your organization.
Posted: 03 Jun 2016 | Published: 13 Jan 2015

MASERGY

Make Behavioral Analytics Part of Your Security Strategy
sponsored by MASERGY
RESOURCE: Discover how behavioral analysis work and learn how it can benefit your network security. Shift your focus from blocking and preventing breaches to detecting and rapidly responding to attacks.
Posted: 03 Jun 2016 | Published: 05 Aug 2015

MASERGY

Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears
sponsored by IBM MaaS360
WHITE PAPER: This white paper shows you a comprehensive portfolio of mobile security solutions that address four key mobile security challenges. Learn intelligent, integrated and innovative approaches that can help your organization stay ahead of emerging threats while managing operational risks and lowering cost of a strong security posture.
Posted: 03 Jun 2016 | Published: 01 May 2016

IBM MaaS360

The State of Mobile Security Maturity
sponsored by IBM MaaS360
WHITE PAPER: This study takes the mobile security pulse of large enterprises worldwide. It'll help you assess where you are on this emerging mobile security maturity scale and giving you an indication of where you should make your mobile security investments moving forward.
Posted: 03 Jun 2016 | Published: 31 Dec 2014

IBM MaaS360

Securing mobile productivity for Microsoft Office 365
sponsored by IBM MaaS360
WHITE PAPER: Take the complexity out of securing your mobile workforce. Learn how to secure your Microsoft ecosystem across all mobile platforms, including Windows 10. Enable IT to efficiently manage enterprise productivity, connectivity and security today and into the future.
Posted: 03 Jun 2016 | Published: 01 Mar 2016

IBM MaaS360

Protect Confidential Data While Keeping Mobile Users Productive
sponsored by IBM MaaS360
WHITE PAPER: Common sense dictates that you look for ways to supplement your mobile device management (MDM) solution with additional, more robust security controls. This white paper helps you identify the goals for your MDM security strategy and select the best approach to reach those goals.
Posted: 03 Jun 2016 | Published: 01 Mar 2016

IBM MaaS360

Setting new standards in cardholder data protection
sponsored by Verizon
WHITE PAPER: Learn how CartaSi implemented powerful new vulnerability scanning and penetration testing capabilities into its security process, adding new layers of defense to its customer web portals. Get Broader enhancements to data protection with the ability to monitor security-related trends across multiple portals.
Posted: 02 Jun 2016 | Published: 31 Dec 2015

Verizon

Recognize and Respond to Cyber Attacks
sponsored by Verizon
WHITE PAPER: The inability to recognize and react the lead indicators of a cyber attack can be an organization's greatest weakness. Learn how to prepare your organization to recognize and mitigate threats. Accelerate your detection capabilities so breaches can't linger.
Posted: 02 Jun 2016 | Published: 31 Dec 2015

Verizon

Emerging security threats you're up against now
sponsored by Intel
EGUIDE: Cybercrime is now a fully functional industry with "Hacking as a Service" being a top product. Services are cheaper and more sophisticated than ever. This e-guide shows you top emerging cyber threats that could be harming your system soon.
Posted: 06 Jun 2016 | Published: 25 May 2016

Intel
176 - 200 of 1726 Matches Previous Page    6 7 8 9 10 11    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement