Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
176 - 200 of 1577 Matches Previous Page  |  Next Page
Effectively Monitor, Prioritize, and Automate Response to Third-Party Risk
sponsored by ServiceNow
WHITE PAPER: While assessing vendor risk on a regular basis is critical, it can often be an extremely time-consuming and error-prone exercise involving spreadsheets, email, and rudimentary risk management tools. Learn how to build a more advanced vendor risk management program.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

ServiceNow

Ransomware: Defending Against 5 Major Types
sponsored by Commvault
WHITE PAPER: Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Commvault

Cisco Umbrella Shoots for Secure Internet, Anywhere
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to mitigate risks and improve your security posture for the cloud by leveraging SaaS-based tools that enable advanced malware protection for your network, real-time threat intelligence, and increased DNS gateway security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Cisco Umbrella

What is GDPR? And Why Should I Care?
sponsored by Commvault
VIDEO: The General Data Protection Regulation (GDPR) will kick in May 2018, and it will have a huge impact on how you collect and manage the personal data of EU residents, even if you're not located in Europe. Get an overview of the GDPR, including who the legislation affects and the penalties for non-compliance.
Posted: 09 Aug 2017 | Premiered: 07 Jun 2017

Commvault

The Security Benefits of Prioritizing Critical Data Assets
sponsored by InteliSecure
WHITE PAPER: Do you know what your critical data assets are? This 6-part white paper explores how to define your critical data assets so you can save time and money, all while improving your security posture.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

InteliSecure

Cybersecurity Myths Debunked
sponsored by HelpSystems
WEBCAST: What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.
Posted: 04 Aug 2017 | Premiered: Aug 4, 2017

HelpSystems

How to Create a Cybersecurity Policy for Your Organization
sponsored by HelpSystems
WHITE PAPER: Discover a 4-step plan to build a cybersecurity policy for your organization. As a bonus, uncover additional resources to create a data breach response plan.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

HelpSystems

Achieve GDPR Readiness with Secure App and Data Delivery
sponsored by Citrix
WHITE PAPER: A Ponemon Institute study finds that most organizations do not feel prepared for the requirements of the GDPR. Discover how you can meet GDPR compliance through application security, contextual access, and more.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Citrix

The Race to Meet GDPR Compliance
sponsored by HyTrust
WHITE PAPER: No matter where you are in the world, if you do business within the EU, you need to be prepared for GDPR compliance. This white paper provides an overview of the GDPR so you can get ready.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

HyTrust

How Machine Data Supports GDPR Compliance
sponsored by Splunk
WHITE PAPER: Discover an overview of the GDPR and explore how machine data can help you meet the core requirements. Uncover the 3 ways machine data can help support your GDPR compliance program.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Splunk

Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

Strengthen Your Ransomware Strategy
sponsored by AdvizeX Technologies
WEBCAST: Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.
Posted: 31 Jul 2017 | Premiered: Jul 17, 2017

AdvizeX Technologies

Mobile Application Security: Discovering Leaks and Remediation
sponsored by WhiteHat Security
WEBCAST: 25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.
Posted: 27 Jul 2017 | Premiered: Jul 27, 2017

WhiteHat Security

Tool Overview: HyTrust Multi-Cloud Security and Automated Compliance
sponsored by HyTrust
PRODUCT OVERVIEW: In this technology brief, learn about HyTrust Multi-Cloud Security and Automated Compliance, security software for a multi-cloud infrastructure. Discover key features and benefits, and how you can implement this tool for your own enterprise security.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

Product Overview: 30 Minutes to a More Secure Enterprise
sponsored by Cisco Umbrella
WHITE PAPER: DNS-layer security offers a first line of defense for your company – DNS request proceed internet activity, after all. But which DNS security is right for you? In this product overview, discover how implementing Cisco Umbrella can help you improve your company's security.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Cisco Umbrella

Beyond your company boundaries
sponsored by ComputerWeekly.com
PRESENTATION: Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

ComputerWeekly.com

Key Issues for E-Discovery and Legal Compliance
sponsored by Smarsh
WHITE PAPER: Managers are often worried their organizations will be sued at some point, but most aren't adequately prepared to deal with e-discovery issues. In this Osterman Research report, uncover insight from the results of an in-depth survey of decision makers and influencers at mid-sized and large organizations.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Smarsh

The Public Sector Guide to Text Messaging Policy and Retention 2017 Edition
sponsored by Smarsh
WHITE PAPER: This white paper explores how to protect against the risks associated with text messaging by using a cloud-based archiving platform. Learn how to develop a smart text message policy and retention strategy that enables you to respond readily to open records requests or other e-discovery needs.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Smarsh

How this Large North American Retail Chain Achieves Compliance, Minimizes Risk, and Mitigates Threats
sponsored by Rapid7
CASE STUDY: In this case study, learn how, by adopting this vulnerability scanning system this North American retail chain's IT team able to go beyond compliance assessments to get actionable security information, and more.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Rapid7

When Software Goes Rogue
sponsored by BDNA
WHITE PAPER: How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.
Posted: 02 Jun 2017 | Published: 31 May 2017

BDNA

Cyber security solutions from IBM
sponsored by IBM
WHITE PAPER: Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection.
Posted: 28 Aug 2017 | Published: 20 Jul 2012

IBM

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.
Posted: 28 Aug 2017 | Published: 02 Aug 2010

nCircle

How to Become a Superstar Security Leader
sponsored by Google Cloud
RESEARCH CONTENT: Be the superstar security leader your fellow executives need. This report looks at the biggest changes in firms' expectations of their CISOs and provides specific examples of how top information security professionals rise to those occasions. Download the Forrester report today and secure your future.
Posted: 08 Aug 2017 | Published: 13 Feb 2017

Google Cloud

6 Ways to Keep Your Endpoint Devices Secure
sponsored by Sentinel Labs, Inc.
EGUIDE: Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.
Posted: 27 Jul 2017 | Published: 26 Jul 2017

Sentinel Labs, Inc.

Develop Your Information Security Management System
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
RESEARCH CONTENT: This Forrester Research report explores how to use an information security management system (ISMS) to improve risk management and strengthen security processes. Find out how to derive daily value from an ISMS, increase customer data protection, leverage KPIs and threat intelligence, and more.
Posted: 01 Jun 2017 | Published: 19 Jan 2017

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
176 - 200 of 1577 Matches Previous Page    6 7 8 9 10 11    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement