Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk ManagementReports
176 - 200 of 1159 Matches Previous Page  | Next Page
Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER: This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Today's New Breed of Email-based Cyber Attacks - and What it Takes to Defend Against Them
sponsored by FireEye
WHITE PAPER: This guide explores how email-based cyber-attacks aim to subvert your security tools and steal your valuable business data.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

Leverage Security Intelligence for Government Agencies
sponsored by IBM
WHITE PAPER: This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 05 Mar 2014 | Published: 31 Mar 2013

IBM

IBM QRadar Security Intelligence: Perception Capture Study
sponsored by IBM
WHITE PAPER: This Ponemon Institute report highlights the capabilities and benefits of one security incident event management (SIEM) solution.
Posted: 05 Mar 2014 | Published: 28 Feb 2014

IBM

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: This white paper features an automated identity and access management (IAM) solution that accommodates physical and cloud environment users to ensure that the right people have the right access to virtualized resources and applications.
Posted: 05 Mar 2014 | Published: 31 Dec 2011

IBM

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This resource provides an overview of the application threats that your organization faces and describes which risks you need to prioritize. Also inside, find five practical steps you can take to build security into your development processes.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

IBM

Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by SearchSecurity.com
EZINE: In this Insider Edition, we'll examine the recent advances in advanced malware detection and prevention as well as which ones are likely to bear fruit in your organization.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

SearchSecurity.com

Hot Knives Through Butter: Evading File-based Sandboxes
sponsored by FireEye
WHITE PAPER: This guide explores new strategies for thwarting malware-based cyber-attacks and how traditional security measures just don't do the trick.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

FireEye

Definitive Guide to Next Generation Threat Protection eBook
sponsored by FireEye
EBOOK: In today's evolving threat landscape, businesses of various sectors and sizes have fallen victim to sophisticated cyber-attacks. This in-depth eBook explores the next generation of threat protection and delves deep into various topics, such as advanced persistent threats.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

FireEye

How to Detect SQL Injection & XSS Attacks using SIEM Event Correlation
sponsored by AlienVault
WEBCAST: This in-depth webinar explores the current threat landscape, SQL injection and XSS attacks and what you can do to stop them.
Posted: 04 Mar 2014 | Premiered: Feb 25, 2014

AlienVault

The SIEM Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: This guide takes a look at the current trends in security management and how an effective SIEM strategy can help you ensure security.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

AlienVault

Big Threats for Small Businesses
sponsored by FireEye
WHITE PAPER: Data breaches are bad for business, but it can mean the end for small firms. This guide takes a look at today's threat landscape and explores cybercrime trends towards small and midsize businesses.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

FireEye

Information Security Magazine – March 2014
sponsored by SearchSecurity.com
EZINE: In this issue, we look at the security debate shadowing cloud deployments, and explain how to assess the threats, vulnerabilities and consequences using a simple risk equation.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

SearchSecurity.com

Once More Into the Breach: The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats
sponsored by FireEye
WHITE PAPER: This guide explores 10 common mistakes businesses make when planning their security strategy.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

FireEye

Thinking Locally, Targeted Globally: New Security Challenges for State and Local Governments
sponsored by FireEye
WHITE PAPER: In a world where cybercrime is growing in complexity and frequency, you don't have room for system vulnerabilities. This guide explores the current role of APTs in and how you can combat these advanced attacks.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

FireEye

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Dell, Inc.

Secure Your Apps, Docs and Devices in Minutes
sponsored by Fiberlink
WEBCAST: In this webcast, discover a single mobile management and security platform that ensures data protection and maintains compliance across all devices used for business.
Posted: 28 Feb 2014 | Premiered: Dec 6, 2013

Fiberlink

Dell Networking Support for Payment Card Industry Data Security Standard
sponsored by Dell, Inc.
WHITE PAPER: This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Dell, Inc.

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by GlobalScape
WHITE PAPER: Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012

GlobalScape

A Planner's Realistic Guide to Cloud Data Security
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide will walk you through the creation of a safe and secure cloud environment.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

Dell, Inc. and Intel®

Cloud Computing Insider Threats: Exploring Risk Scenarios, Mitigations
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide highlights possible insider threat scenarios, as well as 11 security issues to consider when choosing a cloud service provider.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Dell, Inc. and Intel®

NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER: This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013

IBM

Understanding and Selecting Data Masking Solutions
sponsored by IBM
WHITE PAPER: This white paper examines data masking technology, and pinpoints the must-have features to look for when choosing a solution.
Posted: 28 Feb 2014 | Published: 10 Aug 2012

IBM
176 - 200 of 1159 Matches Previous Page    6 7 8 9 10 11    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement