Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
26 - 50 of 1538 Matches Previous Page  |  Next Page
Detecting Malware-Free Intrusions and Advanced Cyber Threats with Anomaly Detection and "Behavioral MD5" of Endpoint Processes
sponsored by Prelert
ANALYST REPORT: This report shows you how machine learning can detect changes in endpoint process behavior to help protect your business. Access now to learn how you can automate the analysis of data by looking for helpful anomalies that indicate malicious activity.
Posted: 25 Apr 2016 | Published: 29 Feb 2016

Prelert

Machine Learning: Perception Problem? Maybe. Pipe Dream? No Way!
sponsored by Prelert
ANALYST REPORT: This report dispels misconceptions about machine learning and explains what its actual application is. Access now to learn about recent developments in machine learning-based security analytics capabilities.
Posted: 25 Apr 2016 | Published: 29 Jan 2016

Prelert

A Guide to Corporate Social Media Security
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper helps you understand this new kind of attack and develop a plan to protect your organization's reputation.
Posted: 25 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

IBM 2015 Cyber Security Intelligence Index for Information and Communication
sponsored by IBM
WHITE PAPER: This white paper outlines cyber attack incidents of organizations in the information and communications industry. Access now to learn about past trends of cyber criminals and what to look for in the future of cyber crime.
Posted: 25 Apr 2016 | Published: 31 Dec 2015

IBM

2015 Frost & Sullivan Asia-Pacific Intrusion Detection & PreventionVendor of the Year - IBM
sponsored by IBM
WHITE PAPER: This white paper shows you how greatly IDS/IPS is growing in Asia Pacific are other methods they are using to stay ahead of advanced threats. Access now to improve your organization's awareness of these threats and prepare yourself against sophisticated threats in the future.
Posted: 25 Apr 2016 | Published: 31 Dec 2015

IBM

Machine Learning Is Cybersecurity’s Answer to Detecting Advanced Breaches
sponsored by Prelert
ANALYST REPORT: This blog post talks about replacing legacy safeguards with new machine learnings, the heart of IT's shift in mindset. Access now to learn how to focus on identifying potential threats early rather than reacting to threats after they happen.
Posted: 25 Apr 2016 | Published: 21 Mar 2016

Prelert

Star Wars X – Attack of the DROWNs: Machine Learning-based Anomaly Detection Finds the DROWN SSLv2 Vulnerability
sponsored by Prelert
ANALYST REPORT: This blog post teaches you about the DROWN vulnerability and exactly why it could be affecting your organization. Learn the great impact DROWN has had in the past and what you can do to patch this vulnerability.
Posted: 25 Apr 2016 | Published: 19 Apr 2016

Prelert

2015 Gartner Group Magic Quadrant on Managed Security Services
sponsored by IBM
ANALYST REPORT: This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.
Posted: 25 Apr 2016 | Published: 23 Dec 2015

IBM

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM
WHITE PAPER: This white paper teaches you how to safely embark on your own BYOD program. The main goal is to show you how BYOD is a feasible option for your organization by seamlessly securing corporate data and applications on each devices while providing separation from personal activity and data.
Posted: 22 Apr 2016 | Published: 01 Mar 2016

IBM

Key steps to securing data and maintaining proper access
sponsored by IBM
WHITE PAPER: This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.
Posted: 22 Apr 2016 | Published: 31 Dec 2015

IBM

2016 Cyberthreat Defense Report
sponsored by Citrix
ANALYST REPORT: This detailed 2016 cyberthreat defense examines the current and planned deployment of countermeasures across the globe to give you a better understanding of how your security perceptions, concerns, and defenses stack up against your peers.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

Citrix

How global threat intelligence fits into a security strategy
sponsored by Dell SecureWorks
EGUIDE: This e-guide helps you set up your business security strategy by showing you past examples of where other organization have fallen short. Access now to learn key tips about basic things like passwords and firewalls to help keep your business safe.
Posted: 21 Apr 2016 | Published: 19 Apr 2016

Dell SecureWorks

Commvault Secure File Sharing
sponsored by Commvault
WHITE PAPER: This white paper shows you a file sharing solution that improves user productivity by keeping files synchronized and accessible across devices. Access now to regain control of data to reduce risk or regulatory, governance and security issues.
Posted: 21 Apr 2016 | Published: 01 Mar 2016

Commvault

10 Questions to Ask Your Vendor about File Gateway Consolidation
sponsored by IBM
RESOURCE: When you embark on a file gateway consolidation project, there are hundreds of questions you may have considered—and many more that may not have even occurred to you. Read on to access 10 questions that will help you determine if a vendor's Managed File Transfer (MFT) offering is suitable.
Posted: 21 Apr 2016 | Published: 31 Dec 2015

IBM

Impostor Email Threats infographic
sponsored by Proofpoint, Inc.
WHITE PAPER: This infographic shows you some stats and facts about imposter emails research conducted on organizations across industries. Access now to learn what to look for in a phishing scheme and how to mitigate the threat.
Posted: 21 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

Impostor Email Threats eBook
sponsored by Proofpoint, Inc.
EBOOK: This white paper shows you what to looks for and how to block email attacks.
Posted: 21 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

Next-Generation IPS in the Era of Targeted Attacks
sponsored by IBM
WHITE PAPER: This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.
Posted: 21 Apr 2016 | Published: 01 Jan 2016

IBM

Six Tools Users Need for Mobile Files And How to Provide Them Securely
sponsored by BlackBerry
WHITE PAPER: This white paper identifies and details the key tools users need and outlines what IT should consider in evaluating these products. Access now to discover how you can safely access, share, sync and collaborate on even the most sensitive files through any device.
Posted: 20 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Putting Managed File Transfer in Perspective
sponsored by IBM
WHITE PAPER: This white paper helps you focus on the files that matter during your MFT integration. Access now to proactively govern your files' movements reliably, promptly and securely throughout your extended enterprise.
Posted: 20 Apr 2016 | Published: 01 Mar 2016

IBM

Create a Solid Incident Response Plan and Respond to Threats Efficiently
sponsored by Dell SecureWorks
EGUIDE: In this e-guide, you will discover steps your organization should take in order to develop and implement a cybersecurity incident response plan. Access now to learn how to create overarching goals for your plan, determine the people in your organization who need to be involved and determine incident response triggers
Posted: 20 Apr 2016 | Published: 18 Apr 2016

Dell SecureWorks

Securing the Internet of Things: 6 Crucial Steps
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Although a majority of large companies are actively working on Internet of Things (IoT) initiatives, data security continues to be a low priority for boards of directors. This resource explores the new security risks prompted by the IoT and reveals 6 crucial actions that CIOs need to take to counteract them.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

Hewlett-Packard Enterprise

Underground Hacker Markets Annual Report: 2016
sponsored by Dell SecureWorks
WHITE PAPER: Find out which underground services are on the rise and what's most valuable in today's current cybercrime economy. Access this resource now to get inside black market information without breaking the law.
Posted: 20 Apr 2016 | Published: 01 Apr 2016

Dell SecureWorks

The Current Landscape of Cybersecurity
sponsored by eSentire
EGUIDE: This e-guide breaks down current common attack vectors and pain points in the cybersecurity strategies of organizations across industries. Access now to get the latest information from security professionals and businesses of all sizes on how they're mitigating cyber attacks and loss of data.
Posted: 19 Apr 2016 | Published: 15 Apr 2016

eSentire

Behavior-Based Threat Detection
sponsored by eSentire
VIDEO: This video shows you behavior-based threat detection that scans your network for a multitude of different anomalies. It combines time of day, bandwidth surges, IP reputation and port scanning to identify possible threats to your network security. Access now to learn about always on full traffic forensics.
Posted: 19 Apr 2016 | Premiered: 01 Mar 2016

eSentire

Navigating the Challenges with Wireless Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper explores the four drivers of Wi-Fi usage that are behind the explosion of wireless connectivity and the security implications that mustn't be forgotten.
Posted: 19 Apr 2016 | Published: 01 Jan 2016

WatchGuard Technologies, Inc.
26 - 50 of 1538 Matches Previous Page    1 2 3 4 5    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement