Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
201 - 225 of 1516 Matches Previous Page  |  Next Page
Masergy Customer turned Evangelist, Stuart Carrothers talks Masergy
sponsored by MASERGY
WEBCAST: In this video, you'll discover a security vendor that wants to work with you for the lifetime of your organizations. From them, you'll get real-time visibility and change bandwidth as you need it. Learn about largest global network in the world based on software defined networking.
Posted: 07 Jun 2016 | Premiered: May 1, 2016

MASERGY

Understand the Business Impact and Cost of a Breach
sponsored by MASERGY
ANALYST REPORT: This Forrester Report will help security and risk leaders build a case for investment to show business leaders what kind of investment it'll take to adequately protect their organization.
Posted: 07 Jun 2016 | Published: 12 Jan 2015

MASERGY

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

Masergy UES Offers Unique Approach to Network Defense
sponsored by MASERGY
ANALYST REPORT: Instead of applying a one-size-fits-all approach, multi-stage machine learning analysis detects events differently on different networks. Learn how this security strategy can find predictable patterns on your network and methods that work best for it.
Posted: 06 Jun 2016 | Published: 11 Nov 2015

MASERGY

CISOs Are Under Mounting Pressure
sponsored by MASERGY
ANALYST BRIEF: CISOs need help. The smart ones are turning to a new way of thinking about cybersecurity protection: Security as a Service. It's a managed, unified solution that leverages the power of both machine learning and expert human intelligence. Discover the scalability and speed SaaS can add to your organization.
Posted: 03 Jun 2016 | Published: 13 Jan 2015

MASERGY

Intermedia Builds an Instant Security Operations Center and Speeds Business Processes
sponsored by Splunk
CASE STUDY: This case study demonstrates how Intermedia overcame its cloud security challenges and boosted productivity with data-driven analytics and incisive, enterprise-wide intelligence.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Splunk

Make Behavioral Analytics Part of Your Security Strategy
sponsored by MASERGY
RESOURCE: Discover how behavioral analysis work and learn how it can benefit your network security. Shift your focus from blocking and preventing breaches to detecting and rapidly responding to attacks.
Posted: 03 Jun 2016 | Published: 05 Aug 2015

MASERGY

An Office 365 Expert Debate: New Cloud, New Risks
sponsored by Mimecast
RESOURCE: This resource features an expert debate on the risks of Office 365. View now and you'll also have access to a demo on ways to enjoy economic cloud advantages while sidestepping cybercrimes.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Mimecast

Storage Efficiencies with Hyper-V at the Virtual and Physical Layer
sponsored by Veeam Software
WHITE PAPER: Storage tools are important because of the efficiencies they offer, but if you're too afraid of the risks associated with them to fully explore their capabilities, then what good are they? Access this white paper now for an in-depth look at several powerful storage tools and learn how to mitigate their associated risks.
Posted: 24 May 2016 | Published: 24 May 2016

Veeam Software

One Firewall Brand Decreases Complexity, Not Security
sponsored by Fortinet, Inc.
WHITE PAPER: This Gartner Report shows you how to take on a unified security posture for your entire borderless network. Automate your threat remediation actions and minimize breach intervals. With one universal network operating system, you don't need to choose between security or performance - have both and manage it all from one single pane of glass.
Posted: 23 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection
sponsored by Intel Security
WHITE PAPER: DLP tactics & tools only work if you know how to use them properly. This data exfiltration study reveals the security tools, response plans and awareness training required to protect your infrastructure and prevent major losses.
Posted: 19 May 2016 | Published: 31 Dec 2015

Intel Security

5 Tips to Help Protect Your Data
sponsored by Intel Security
WHITE PAPER: Modern DLP needs to be rapidly incremental, focusing on derived value, successful preventative actions and increasing the risk threshold. Inside this white paper, you'll learn 5 key requirements to ensure your data protection efforts are successful.
Posted: 19 May 2016 | Published: 01 Apr 2016

Intel Security

Korott Labs Implement Next Gen Firewalls for Security and Reliability
sponsored by Barracuda Networks
RESOURCE: In this case study, find out how a large pharmaceutical and cosmetics laboratory, fulfilled their need to connect their offices and logistics warehouses with next-generation technologies. Discover how a new generation of systems offered all the network security, robustness, and flexibility the business needed.
Posted: 19 May 2016 | Published: 01 Apr 2016

Barracuda Networks

BYOD allows hackers an easy access point to corporate data
sponsored by IBM
WHITE PAPER: You need to modernize your security with a robust way to proactively detect, analyze and remediate new mobile threats. Learn the true cost of a data breach and how to best implement your own BYOD policy.
Posted: 18 May 2016 | Published: 31 Dec 2015

IBM

Data Exfiltration in Depth
sponsored by Intel Security
WEBCAST: Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.
Posted: 17 May 2016 | Premiered: Apr 1, 2016

Intel Security

Barracuda NextGen Firewalls protect the ever-expanding operation of Georgia’s leading telecoms provider, Geocell
sponsored by Barracuda Networks
RESOURCE: Geocell chose a next-generation firewall that fit every criteria and beyond. Within only two months, business-critical apps were running smoothly and network management controls were centralized. Learn more about how Geocell's experiences could benefit your network.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Security and availability in extremely adverse environments
sponsored by Barracuda Networks
RESOURCE: Exalo Drilling chose a next-generation firewall to protect their growing infrastructure. The centralized management, application awareness and overall efficiency exceeded their expectations. Learn more about how their experience could benefit your organization's IT infrastructure.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Barracuda NextGen Firewall F Boosts Wireless Network Security for5,000 Users During the 2015 European Youth Olympics
sponsored by Barracuda Networks
RESOURCE: Zurab Tuskia, head of IT infrastructure of the Festival, chose Wi-Fi secured by a next-generation firewall for its ease of deployment and cost effectiveness over other, more complex solutions. Learn more about their decision that provided them live traffic monitoring and rejection capabilities unwanted of p2p traffic.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Eissmann Group Automotive Evaluates NextGen Firewall F-Series
sponsored by Barracuda Networks
WHITE PAPER: Learn what went into Eissmann Group Automotive's decision to replace their firewall when their existing routers were reaching their performance limits.
Posted: 12 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Vendor Analysis Report: Web Security
sponsored by Distil Networks
WHITE PAPER: This white paper examines five major vendors and evaluates their security solutions. Learn how well they can coordinate their systems to successfully secure your web infrastructure and online data.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

Banish Bad Bots By Asking These 13 Questions
sponsored by Distil Networks
WHITE PAPER: With bots being such a hot topic in web security, vendors are claiming they have the ability to effectively identify and mitigate bots. Discover 13 tips to help you differentiate between vendors to make a fully informed decision when it comes to your web application security.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

The Bad Bot Landscape Report
sponsored by Distil Networks
RESOURCE: This report gives you stats and graphs about recent bot traffic and how bots are crippling the cyber landscape. You'll learn how bots are created and the specific, sophisticated attacks than can use to disable your organization.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

Emerging security threats you're up against now
sponsored by Intel
EGUIDE: Cybercrime is now a fully functional industry with "Hacking as a Service" being a top product. Services are cheaper and more sophisticated than ever. This e-guide shows you top emerging cyber threats that could be harming your system soon.
Posted: 06 Jun 2016 | Published: 25 May 2016

Intel

Adapting an infosec program for emerging threats
sponsored by Intel
EGUIDE: An enterprise's information security program must be adaptable to new threats and risks. Expert Nick Lewis explains how to update and evolve these programs in the following exclusive resource.
Posted: 18 May 2016 | Published: 13 May 2016

Intel

The Intricacies of Securing Data in the Cloud and How to Implement Policies Successfully
sponsored by Intel
EGUIDE: This e-guide helps you put together a cloud security policy for your organization as your business practices rely more heavily on cloud storage. Access now for help with creating policies for storing and securing different data types, authorizing who can migrate data and choosing which applications can access your data.
Posted: 17 May 2016 | Published: 09 May 2016

Intel
201 - 225 of 1516 Matches Previous Page    7 8 9 10 11 12    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement