Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
26 - 50 of 1727 Matches Previous Page  |  Next Page
Protect Company Data with Encryption & Remote Management
sponsored by Intel Security
WHITE PAPER: Simplify your security enterprise security management with broad, centralized control with stronger and more efficient options for protecting endpoints. Stay ahead of emerging threats and improve user experience all will lowering the TCO to your organization.
Posted: 19 May 2016 | Published: 01 Apr 2016

Intel Security

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection
sponsored by Intel Security
WHITE PAPER: DLP tactics & tools only work if you know how to use them properly. This data exfiltration study reveals the security tools, response plans and awareness training required to protect your infrastructure and prevent major losses.
Posted: 19 May 2016 | Published: 31 Dec 2015

Intel Security

Five Tips to Help Protect Your Data - From passive monitoring to proactive protection
sponsored by Intel Security
WHITE PAPER: Modern DLP needs to be rapidly incremental, focusing on derived value, successful preventative actions and increasing the risk threshold. Inside this white paper, you'll learn 5 key requirements to ensure your data protection efforts are successful.
Posted: 19 May 2016 | Published: 01 Apr 2016

Intel Security

Korott Labs trust Barracuda NextGen Firewalls for security, reliabilityand simple centralized management
sponsored by Barracuda Networks
RESOURCE: What they decided on gave them a distributed, reliable and secure network with centralized management with complete visibility of their entire network and its components. Learn more about Korott's process and eventual decision to help your organization find the proper firewall security it needs.
Posted: 19 May 2016 | Published: 01 Apr 2016

Barracuda Networks

The Productivity Transformation
sponsored by IBM MaaS360
WHITE PAPER: Your enterprise can't be left behind in this new era of productivity. Enable your employees by creating secure systems that can protect your data while living on less than enterprise secure devices.
Posted: 19 May 2016 | Published: 01 Mar 2016

IBM MaaS360

Gemalto SafeNet Keysecure for MongoDB Encryption Key Management for MongoDB Native Encryption
sponsored by Gemalto
WHITE PAPER: Increase in opportunity comes with increase in risk. Greater encryption and key management can make accumulating big data a breeze. Learn how to ensure your data protection platform is flexible to work across all data types and all locations where your data lives.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

Gemalto SafeNet KeySecure
sponsored by Gemalto
WHITE PAPER: This white paper shows you how to easily manage keys for a variety of encryption locations. Centralize your encryption and key management for lower cost of administration.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

Gemalto’s SafeNet Encryption Connectors a Complete, Enterprise-Ready Encryption Platform
sponsored by Gemalto
WHITE PAPER: With all your different types of data and all the different locations is resides, you need a flexible data protection solution with uniform controls across your entire landscape. Learn how you can encrypt both data at rest and data in motion that flows across your network or between data centers.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

2015 the Year Data Breaches Got Personal
sponsored by Gemalto
WHITE PAPER: Data breaches continue to be a large and growing threat for organizations in all industries. Many are clinging to conventional ways of looking at cyber security rather than taking a newer approach. With this cybercrime data, you'll be able to formulate a modern security strategy to stay ahead of evolving threats and hackers.
Posted: 18 May 2016 | Published: 31 Dec 2015

Gemalto

Mobile is the New Playground for Thieves
sponsored by IBM MaaS360
WHITE PAPER: You need to modernize your security with a robust way to proactively detect, analyze and remediate new mobile threats. Learn the true cost of a data breach and how to best implement your own BYOD policy.
Posted: 18 May 2016 | Published: 31 Dec 2015

IBM MaaS360

Adapting an infosec program for emerging threats
sponsored by Intel
EGUIDE: An enterprise's information security program must be adaptable to new threats and risks. Expert Nick Lewis explains how to update and evolve these programs in the following exclusive resource.
Posted: 18 May 2016 | Published: 13 May 2016

Intel

SB Enterprise Firewall
sponsored by Fortinet, Inc.
RESOURCE: Network firewall security must evolve to secure the extended enterprise. You need end-to-end network security that protects the entire attack surface from IoT to cloud. Take a more collaborative approach across your entire network infrastructure to deploy a dynamic, long term defense strategy.
Posted: 18 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM MaaS360
WHITE PAPER: Your goal is to make BYOD policies feasible by seamlessly securing corporate data on the device while providing logical separation from personal activities. Learn five key steps you should consider before putting your BYOD program in place.
Posted: 18 May 2016 | Published: 31 Dec 2012

IBM MaaS360

The State of Mobile Application Insecurity - Ponemon Institute Research Report
sponsored by IBM MaaS360
RESOURCE: This Ponemon Institute study, which encapsulates 640 individuals involved in the application development and security process, will help you understand how organizations are reducing the risk of unsecured mobile apps used in their business practices.
Posted: 18 May 2016 | Published: 28 Feb 2015

IBM MaaS360

The Intricacies of Securing Data in the Cloud and How to Implement Policies Successfully
sponsored by Intel
EGUIDE: This e-guide helps you put together a cloud security policy for your organization as your business practices rely more heavily on cloud storage. Access now for help with creating policies for storing and securing different data types, authorizing who can migrate data and choosing which applications can access your data.
Posted: 17 May 2016 | Published: 09 May 2016

Intel

Encrypt Everything How to Unshare and Secure Your Sensitive Data Wherever It Resides
sponsored by Gemalto
WHITE PAPER: Encryption is the key to unsharing your sensitive data. Learn a multitier plan that helps you protect your perimeter while also encrypting data in every level, moving or at rest. Identify where your sensitive data lives to better understand your IT environment.
Posted: 17 May 2016 | Published: 01 Apr 2016

Gemalto

Market Focus Double Vision
sponsored by Gigamon
WHITE PAPER: It's time to get real with security realities. Understand how to achieve greater visibility into your network traffic and learn where other organizations stand in the cyber security war.
Posted: 17 May 2016 | Published: 01 Feb 2016

Gigamon

Ten ways to save money with IBM data protection
sponsored by IBM
WHITE PAPER: Discover 10 ways you can employ your data protection system to help you organize files while addressing modern data protection challenges, and save money.
Posted: 17 May 2016 | Published: 31 Jul 2015

IBM

Five Tips to Make your Data Protection Strategy more proactive
sponsored by Intel Security
WEBCAST: Learn how you can leverage data protection tools to quickly notify you on a breach, while making it harder for cybercriminals to hide and greatly reduce data exfiltration while maintaining business efficiency.
Posted: 17 May 2016 | Premiered: Apr 1, 2016

Intel Security

Data Privacy and Protection: 5 Insights from the Experts
sponsored by Iron Mountain
EBOOK: With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.
Posted: 17 May 2016 | Published: 17 May 2016

Iron Mountain

Benefits of Building a Digital Business on an Integration Foundation
sponsored by Axway
TRANSCRIPT: As the number of connected "things" increases, enterprise data is becoming more vulnerable and waiting to be exploited. All this data needs to be managed and integrated into business processes to secure the future of your digital ecosystem.
Posted: 17 May 2016 | Published: 26 Apr 2016

Axway

E-Waste Is More Than Just Clutter – It’s A Security Issue
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

Why IT Leaders Are Buying into Mobile Security
sponsored by Lookout
WHITE PAPER: As mobile devices continue to play a major role in productivity, the likelihood for targeted cyber-attacks will continue to intensify. Discover how CIOs prioritize their mobile security investments today, and ensure mobility doesn't become a liability to your organization—even with the risk of data breach.
Posted: 17 May 2016 | Published: 17 May 2016

Lookout

Data Exfiltration in Depth
sponsored by Intel Security
WEBCAST: This webinar discusses the August 2015 McAfee Labs Threat Report. Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.
Posted: 17 May 2016 | Premiered: Apr 1, 2016

Intel Security

IT Guide: Windows 10 Migration Minus The Complexity
sponsored by Druva Software
WHITE PAPER: With six steps, you can leverage endpoint data protection to help you ease into OS migration. Learn how to craft a migration plan that drastically simplifies the OS refresh process and provides comprehensive data protection and governance foundation for your organization.
Posted: 16 May 2016 | Published: 31 Dec 2015

Druva Software
26 - 50 of 1727 Matches Previous Page    1 2 3 4 5    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement