Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
26 - 50 of 1712 Matches Previous Page  |  Next Page
State of the Internet Report Q3 2016
sponsored by Akamai
WHITE PAPER: This reports leverages cybersecurity data from around the world to show you how organizations fared against cyberattacks in Q3 2016. You'll learn statistics and see figures illustrating which industries were hit hardest and in what areas. Uncover what you should do in the year ahead to protect your enterprise.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Akamai

State of the Internet Executive Summary
sponsored by Akamai
WHITE PAPER: This report shows you up-to-date statistics on cybersecurity. Better enable your business to make intelligent, strategic decisions based on the information you'll learn.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Akamai

Resource Center: How to Safeguard Data
sponsored by Intel Security
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Intel Security

Mitigate Security Risks with Hyperconverged Infrastructure
sponsored by SimpliVity
WHITE PAPER: Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls.
Posted: 18 Nov 2016 | Published: 31 Dec 2015

SimpliVity

From Reactive to Proactive: How to Avoid Alert Fatigue
sponsored by ThreatConnect
WHITE PAPER: Learn how to prioritize security alerts and reduce alert fatigue. Discover how to achieve active response, allowing you to respond to attacks as quickly as they are detected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

ThreatConnect

IoT Guardian for the Healthcare Industry
sponsored by Zingbox
WHITE PAPER: Last year, healthcare was the most attacked industry, and 17% of documented attacks were facilitated through IoT medical devices. Download this white paper and discover how to fully protect your network from vulnerable or compromised medical devices – a healthcare organization's weakest link.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Zingbox

Best Practices for Ransomware Detection and Remediation
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Ransomware is a booming business for cybercriminals, and right now it's bigger than ever. Learn how ransomware attacks work and discover best practices to keep your files secure and your organization protected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

The Security Balancing Act
sponsored by RES Software
RESOURCE: This infographic explains why taking a people-centric approach to managing security, governance, and identity and access management is the best way to secure and empower the digital workforce. Learn how to provide dynamic security for your productive workforce.
Posted: 17 Nov 2016 | Published: 30 Sep 2016

RES Software

Remove the Security Blind Spots Created by Encrypted Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Discover how to get the visibility and control you need over encrypted traffic to ensure compliance with privacy and regulatory policies. Enable your organization to cost-effectively eliminate blind spots within your environment and maximize the effectiveness of your security infrastructure investments overall.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

Conquer Threats with Collaborative, Scalable Security Intelligence
sponsored by IBM
WHITE PAPER: Meet new and sophisticated security threats head-on with adaptable SIEM tools that can scale as your organization does. Discover the power to act at scale with a fast and easy, cost-effective method to meet changing security needs.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

IBM

Demo video: How QRadar Works - IBM Security Intelligence and Analytics Whiteboard
sponsored by IBM
WEBCAST: This video shows you how to get greater network visibility and risk management out of your security solution. Discover how to instantly sense and detect a breach as it happens in real-time.
Posted: 16 Nov 2016 | Premiered: Feb 3, 2016

IBM

2016 Cyber Threat Defense Report
sponsored by Blue Coat Systems
RESOURCE: This infographic shows you the survey results from 1,000 security decision makers across 20 industries from 10 countries around the world. You'll learn stats and figures on how vulnerable they believe they are, which devices are most difficult to secure and security tools they think they need for the future.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

2016 Global Cyber Threat Defense Report
sponsored by Blue Coat Systems
RESOURCE: This cyber threat defense report aims to inform the IT security community about how their global peers are defending against threats and changes they expect to make moving forward.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

2016 Cyber Threat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: In this cyber threat report, you'll discover how IT security professionals perceive today's cyber threats and plan to defend against new threats moving forward.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

How To Foster Greater Collaboration and Support Enterprise Objectives Through Business Networks
sponsored by Basware
WHITE PAPER: 40% of B2B activity in the US, and 20% world-wide, is done electronically through business networks. Access this white paper to learn what business networks are capable of, and discover how to create circles of improved collaboration and support enterprise objectives.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Basware

New EU Security Requirements and You
sponsored by Blue Coat Systems
WHITE PAPER: Discover new EU security requirements and learn what you can do to get ready. Create a holistic approach to data protection and infrastructure security to best avoid compliance risk.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

Threats and Mitigations: A Guide to Multi-Layered Web Security
sponsored by Akamai
EBOOK: Discover the various types of threats that plague internet resources, the necessary elements of an adequate web security tool, and the options available to you. Plus, learn 5 steps to improve your web application security profile.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Akamai

RoundTower Technologies Protects its Customer's SDN: Video Case Study
sponsored by Check Point Software Technologies Ltd.
VIDEO: Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.
Posted: 14 Nov 2016 | Premiered: 13 Jun 2016

Check Point Software Technologies Ltd.

Top 10 Security Advantages of One Business Management Platform
sponsored by Acumatica
RESOURCE: Discover the top 10 reasons why one security platform's features may extend beyond the rest, including such features as control over data storage and processing, strong user identification, encrypted communications, role-based user security, and more.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Acumatica

Advanced Security for vCloud Air
sponsored by Check Point Software Technologies Ltd.
PRODUCT OVERVIEW: This white paper details a solution that provides comprehensive security tailored to protect hybrid cloud environments, so you can feel confident about extending your data center applications and workflows to the cloud.
Posted: 11 Nov 2016 | Published: 29 Feb 2016

Check Point Software Technologies Ltd.

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility
sponsored by TrendMicro
WHITE PAPER: See how security pros and decision makers are responding to the increased frequency, volume and ferocity of today's cyber threats to endpoint devices. Discover what realizations they've come to about their own security tools and posture and learn just how inadequate your current threat protection most likely is.
Posted: 11 Nov 2016 | Published: 31 Oct 2016

TrendMicro

Comprehensive Security for Amazon Web Services
sponsored by Check Point Software Technologies Ltd.
PRODUCT OVERVIEW: This white paper discusses a solution that delivers comprehensive security tailored to protect cloud environments, allowing you to confidently extend your data center applications and workloads to the cloud. Learn how to protect your cloud now.
Posted: 11 Nov 2016 | Published: 30 Sep 2016

Check Point Software Technologies Ltd.

Cybersecurity: The Ethics and Compliance Effect
sponsored by Navex Global
WHITE PAPER: Learn the important role ethics and compliance can play in your cybersecurity program and become better equipped to deal with security incidents.
Posted: 11 Nov 2016 | Published: 31 Oct 2016

Navex Global

SIEM Analysis Interfaces for Security Professionals
sponsored by LogRhythm, Inc.
EGUIDE: This expert e-guide explains how you can avoid SIEM errors by implementing an analysis interface in your SIEM system to ease assessment and interpretation tasks for security professionals.
Posted: 18 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.
26 - 50 of 1712 Matches Previous Page    1 2 3 4 5    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement