Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
201 - 225 of 1381 Matches Previous Page  |  Next Page
Creating a Successful Patch Management Strategy
sponsored by N-able Technologies
EGUIDE: In this expert e-Guide, learn how to ensure that your patch management strategy remains secure following the transition from physical to virtual desktops; why delaying security patches puts organizations at risk; and how to build a case for a formal patch management program.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

N-able Technologies

Strengthening Security, Compliance, and Control in Microsoft® Office 365®
sponsored by Actiance
WHITE PAPER: There are some missing features in Office 365 that will prompt some customers to consider the use of third-party, cloud-based or on-premises tools to enhance Office 365's native capabilities.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

Take back control of enterprise data
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn how enterprise content management can help you lower cost and risk and drive strategic insight and productivity.
Posted: 21 Sep 2014 | Published: 17 Mar 2014

Hewlett-Packard Company

Why eDiscovery Should be a Top Priority for Your Organization
sponsored by Hewlett-Packard Company
WHITE PAPER: E-discovery rules and requirements continue to evolve and are placing additional demands on IT pros. Find out why in this report by Osterman Research.
Posted: 21 Sep 2014 | Published: 31 Oct 2013

Hewlett-Packard Company

How Information Governance Helps You Meet Corporate Responsibilities
sponsored by Hewlett-Packard Company
WHITE PAPER: What is information governance? How can you make it work for you? Find out in this report by Kahn Consulting, and learn how to address its challenges.
Posted: 21 Sep 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

Streamline eDiscovery
sponsored by Hewlett-Packard Company
BROCHURE: Discover how HP eDiscovery can perform the complete range of eDiscovery steps, from collection through production.
Posted: 21 Sep 2014 | Published: 05 Dec 2013

Hewlett-Packard Company

Gain control over all enterprise content
sponsored by Hewlett-Packard Company
BROCHURE: HP ControlPoint and HP IDOL allow you to identify and connect information siloes and apply policies to data. Learn how.
Posted: 21 Sep 2014 | Published: 09 Oct 2013

Hewlett-Packard Company

Intelligent, automated employee communications monitoring
sponsored by Hewlett-Packard Company
BROCHURE: Learn why some of the world's largest companies rely on HP Supervisor to monitor employees' electronic communications.
Posted: 20 Sep 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

Staying Protected Before, During, and After a Cyber Attack
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this informative white paper, discover a threat-centric security strategy that provides superior visibility, continuous control, and advanced threat protection– all while reducing complexity.
Posted: 19 Sep 2014 | Published: 30 Jun 2014

Cisco Systems, Inc.

Information Governance Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: The IG risks of deploying Microsoft Lync are similar to those of other electronic communications such as email: malware, data leakage, inappropriate employee use, regulatory noncompliance, and skyrocketing legal costs.Download THIS WHITEPAPER to find out more!
Posted: 19 Sep 2014 | Published: 19 Sep 2014

Actiance

Mitigating IT Risk for Financial Risk Analytics
sponsored by IBM
WHITE PAPER: This white paper explores the need for a high performance IT infrastructure to assist risk analytics.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

IBM

Securosis Analyst Report: Is It Time to Replace Your Current SIEM Solution?
sponsored by IBM
WHITE PAPER: In this in-depth white paper, gain critical insights into how to evaluate, select, and deploy the right SIEM solution for your organization's specific needs.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

Disrupt Advanced Attacks and Prevent Loss with this Integrated Security Solution
sponsored by IBM
WHITE PAPER: Access this informative whitepaper to explore a new integrated, contextually-aware security solution that provides improved threat detection and prevention across the enterprise.
Posted: 12 Sep 2014 | Published: 31 May 2014

IBM

Security Concerns in the C-Suite and How Next-Generation Firewalls Can Help
sponsored by Fortinet, Inc.
WHITE PAPER: This resource highlights the danger behind APTs, leading to the need for heightened network security with the help of next-generation firewalls.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

Achieving PCI DSS Peace of Mind in the Cloud
sponsored by CloudPassage
WHITE PAPER: Access this white paper to learn how you can achieve PCI DSS compliance in the cloud without any hassle or setbacks.
Posted: 09 Sep 2014 | Published: 30 Jun 2014

CloudPassage

The Need for a New Approach to Provisioning
sponsored by RSA
VIDEO: This video explains the crucial need to handle risk appropriately when dealing with access control.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA

The Current State of Identity and Access Management
sponsored by RSA
VIDEO: This video explains the major shift with Identity and Access Management (IAM) in the past few years.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Avoid a Data Breach with Help from Data Access Governance
sponsored by RSA
VIDEO: Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
Posted: 04 Sep 2014 | Premiered: 04 Sep 2014

RSA

Show Me Simpana--Protect Your Data with Simpana 10
sponsored by CommVault
WEBCAST: Watch this short video to learn how one data protection platform introduces unprecedented capabilities to address snapshot management, reportingAccess from mobile devices, and more.
Posted: 03 Sep 2014 | Premiered: Jul 25, 2013

CommVault

8 Simple Steps to Bring Shadow IT into the Light
sponsored by Rackspace
WHITE PAPER: This in-depth white paper outlines the 8 essential steps for IT professionals to drag Shadow IT into the light and regain control of their organization.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Rackspace

How Access Governance Makes Data Loss Prevention Successful
sponsored by RSA
WHITE PAPER: Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

RSA

Governance Structures for the BYO Era
sponsored by SearchCIO
EBOOK: Bring your own anything is suffusing the enterprise, and CIOs are pursuing new governance structures to tame the mobile chaos.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

SearchCIO

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies

Big Data Architecture: Build, Buy or Blend?
sponsored by SearchCIO.com
EZINE: CIOs face a quandary in big data architecture: Do I buy or build? New business problems, inadequate vendor solutions and myriad new technologies complicate that question.
Posted: 03 Sep 2014 | Published: 02 Sep 2014

SearchCIO.com
201 - 225 of 1381 Matches Previous Page    7 8 9 10 11 12    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement