Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
26 - 50 of 1453 Matches Previous Page  |  Next Page
Addressing Compliance Issues Around Public Cloud for Content Collaboration with Box for Financial Services
sponsored by Box
WHITE PAPER: This white paper explores how content collaboration with Box for Finanical Services addresses compliance issues. Read now to learn how providing enterprise-class content collaboration capabilities can tackle compliance risk.
Posted: 20 May 2015 | Published: 20 May 2015

Box

A New Security Strategy: Focusing on Risk
sponsored by Clearswift
WHITE PAPER: This white paper explores how to shift your security strategy from a compliance-based model to a risk-based model to protect strategic assets. Continue reading and discover how to improve your overall security strategy by implementing a security training and awareness program.
Posted: 20 May 2015 | Published: 29 Apr 2015

Clearswift

Vulnerability Management for the Mid-Size: How to Run a World Class Program Even if You're Not IBM
sponsored by Risk IO
WHITE PAPER: In this white paper, discover how you can design a high-quality vulnerability management program on a midsized budget and with a small security team.
Posted: 20 May 2015 | Published: 20 May 2015

Risk IO

Simplifying Protection of Critical Assets
sponsored by AVG Technologies
EGUIDE: This expert e-guide lays out a simple strategy you can use to make sure you're optimizing your security resources.
Posted: 20 May 2015 | Published: 20 May 2015

AVG Technologies

How Cyber Attackers Operate and How to Stop them
sponsored by IBM
VIDEO: In this video, discover what separates today's attacks from those of the past and how you can revamp your security to meet modern threats.
Posted: 20 May 2015 | Premiered: 22 Apr 2014

IBM

Agile Development with Red Hat Consulting
sponsored by Red Hat
BROCHURE: Read this brochure to learn about some of Red Hat Consulting's agile practice services.
Posted: 20 May 2015 | Published: 20 May 2015

Red Hat

Security and Unlocking the Value of the Mobile Workforce
sponsored by EE
WHITE PAPER: In this white paper, explore the benefits and challenges of mobile computing and why MDM needs to transition to enterprise mobility management (EMM) to secure apps and content. Continue reading to learn more.
Posted: 19 May 2015 | Published: 18 Mar 2015

EE

How to Secure the Enterprise With Threat Intelligence and Protection Software
sponsored by AVG Technologies
EGUIDE: This expert guide can help you stay secure in today's threat landscape by helping you build a strong, layered security system that includes threat intelligence and multiple forms of endpoint protection.
Posted: 19 May 2015 | Published: 19 May 2015

AVG Technologies

Examining File Sync and Sharing Security
sponsored by IntraLinks, Inc
WHITE PAPER: Inside this white paper, examine one file sync, share, and collaboration platform and how to secure data inside and outside of the enterprise. Continue reading to learn how you to remain compliant and if this approach is right for your organization.
Posted: 18 May 2015 | Published: 17 Dec 2014

IntraLinks, Inc

As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER: In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 18 May 2015 | Published: 08 May 2015

HID

Challenges and Benefits of Making a Business Case for IAM
sponsored by Nexmo
EGUIDE: This expert e-guide explores the 5 critical issues in IAM that have plagued IT for the past 5 years. Additionally, continue reading to learn how one organizations is using IAM as a strategic tool for improving performance on top of information security.
Posted: 15 May 2015 | Published: 22 Apr 2015

Nexmo

Reduce Risk: Cisco Connected Factory Starter Kit
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to discover how this connected factory solution can help you plan, design, build, optimize, and manage your solution.
Posted: 15 May 2015 | Published: 01 Nov 2014

Cisco Systems, Inc.

Mitigating Data Sharing Risks and Leaks
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores an alternative approach to reducing data sharing risks between internal teams and outside parties. View now to learn how to safeguard data and files and minimize leaks.
Posted: 14 May 2015 | Published: 25 Mar 2015

IntraLinks, Inc

Using Intrusion Detection Systems for Improving ROI
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, discover how a strong IDS not only enhances your security, but also builds up your ROI.
Posted: 14 May 2015 | Published: 14 May 2015

Hewlett-Packard Company

Final Five Purchasing Decisions for Intrusion Detection Systems
sponsored by Hewlett-Packard Company
EGUIDE: This expert guide can help you ensure that you're making the right IDS choice with five considerations you need to think of before making your purchase.
Posted: 14 May 2015 | Published: 14 May 2015

Hewlett-Packard Company

Magic Quadrant for Operational Risk Management
sponsored by RSA
EGUIDE: Inside this helpful guide, discover the strengths and cautions of today's top ORM vendors and platforms. Continue reading to learn what to look for in a platform as well as what to avoid when making your selection.
Posted: 13 May 2015 | Published: 15 Dec 2014

RSA

Targeted Attacks: 6 Keys for Fighting Back
sponsored by Hewlett-Packard Company
WEBCAST: Target, Sony, Anthem - the biggest recent breaches have taught us that no one is safe from advanced or targeted malware attacks, and that traditional security solutions have become ineffective. In this webinar, discover the 6 key steps to fighting advanced malware and make sure your organization isn't the next big breach.
Posted: 13 May 2015 | Premiered: Mar 31, 2015

Hewlett-Packard Company

The Cloud at Your Pace
sponsored by Rackspace
WHITE PAPER: Access this white paper for the 8 top cloud concerns and learn how you can address them, while minimizing your risks, and moving to the cloud at your own pace.
Posted: 13 May 2015 | Published: 13 May 2015

Rackspace

Reviews and Ratings for 11 Risk Management Products
sponsored by RSA
WHITE PAPER: In this Gartner report, you'll find reviews and ratings of eleven different products that promise make risk management and compliance easier.
Posted: 12 May 2015 | Published: 10 Mar 2015

RSA

Magic Quadrant for IT Vendor Risk Management
sponsored by RSA
RESEARCH CONTENT: Access this research report to learn the strengths and weaknesses of the top VRM providers.
Posted: 12 May 2015 | Published: 29 Oct 2014

RSA

Improving the Effectiveness of Log Analysis
sponsored by Hewlett-Packard Company
WHITE PAPER: Hackers leave tracks, and a good log management tool is the key to finding these tracks. This analyst report tests one log management tool to demonstrate an easy way of doing so.
Posted: 12 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

Aligning Audit Objectives And Organizations Processes
sponsored by RSA
WHITE PAPER: This infographic lays out a 10 step plan for aligning audit objectives with strategic and operating objectives.  View now to learn more.
Posted: 11 May 2015 | Published: 17 Dec 2014

RSA

Harness Operational Risk with Enterprise GRC
sponsored by RSA
WHITE PAPER: This white paper examines the four key requirements to building an effective operation risk management program. View now to learn how to understand risk across the enterprise and analyze risk across silos. Read on to learn more.
Posted: 11 May 2015 | Published: 31 Dec 2014

RSA

How to Better Guard Against a Security Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: SIEM adoption may be increasing, but only 20% of organizations use their SIEM systems to their full capacity. In this study, learn why that is – and how you can bring your SIEM use to the next level.
Posted: 11 May 2015 | Published: 11 May 2015

Hewlett-Packard Company
26 - 50 of 1453 Matches Previous Page    1 2 3 4 5    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement