Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk ManagementReports
26 - 50 of 1457 Matches Previous Page  | Next Page
Weighing Risk Against the Total Cost of a Data Breach
sponsored by Akamai Technologies
WHITE PAPER: This white paper provides an approach to determine the risk of web application cyber-attacks that could potentially affect your company.
Posted: 11 Nov 2014 | Published: 01 Aug 2014

Akamai Technologies

The Importance of Improving and Adapting Web Security
sponsored by Akamai Technologies
WHITE PAPER: This white paper explores CSOs' opinions and strategies regarding web security; the challenges that currently stand in the way of web security deployment within many organizations; and the options that businesses have for working through these critical issues.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Akamai Technologies

Know Your Endpoints to Prevent Security Breaches
sponsored by IBM
WHITE PAPER: This exclusive whitepaper covers how an IBM assessment can show you how secure your endpoints really are.
Posted: 11 Nov 2014 | Published: 13 Sep 2012

IBM

Minimize Check Fraud and Counterfeited Print
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a solution developed by HP and TROY to control check printing operations and help prevent fraud on finished checks, adding security to a variety of applications.
Posted: 10 Nov 2014 | Published: 31 Mar 2014

Hewlett-Packard Limited

2 Leading Vendors Join Forces to Deliver Big Data
sponsored by Cloudera
WHITE PAPER: Learn how a powerful and versatile big data integration and data quality solution can help your business kick big data management challenges to the curb.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Cloudera

Ensuring Progress Toward Risk Management and Continuous Configuration Compliance
sponsored by IBM
WHITE PAPER: This exclusive white paper takes an in-depth look at one endpoint management solution that helped apply, enforce, and manage endpoint security and risk. Read on to learn more.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

IBM

Keep Cyber Threats From Destroying Your Organization
sponsored by LabTech Software
EBOOK: This exclusive white paper examines future security risks to the network and provides and in-depth look at how to combat them.  Read on to learn how you can ease that burden for your IT department.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

LabTech Software

How to Deal with Increasing DDOS Attacks
sponsored by Verisign, Inc.
EGUIDE: This expert e-guide explores how to protect your organization from distributed denial of service attacks.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Verisign, Inc.

10 Risky Security Behaviors to Avoid: Protect Your Organization
sponsored by Global Knowledge
WHITE PAPER: This exclusive whitepaper explores 10 risky behaviors end-users must avoid to keep your organization safe.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Global Knowledge

Risk & Compliance Monitoring
sponsored by Software AG
VIDEO: This exclusive video covers a platform-based solution with real-time analytics that can help you manage risk and stay compliant.
Posted: 07 Nov 2014 | Premiered: 07 Nov 2014

Software AG

Imaging and Printing: Is Your Valuable Data Protected?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a set of HP solutions that can help you assess, manage, and strengthen security within your organization.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Hewlett-Packard Limited

The Role of Third-Party Applications in APT
sponsored by Lumension
WEBCAST: This valuable webcast explores how criminals are using advanced persistent threats to penetrate organizations defenses for weeks at a time.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

Lessons Learned from the Target Data Breach
sponsored by Lumension
WEBCAST: This exclusive webcast explores key lessons learned from the high-profile security breaches in 2013.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper reveals the results of a study on why senior executives must get involved in breach management.
Posted: 06 Nov 2014 | Published: 15 Oct 2014

Hewlett-Packard Company

XP 5 Ways to Mitigate Risk
sponsored by Lumension
WEBCAST: This exclusive webcast offers five ways to mitigate risk when running XP after Windows discontinues support.
Posted: 05 Nov 2014 | Premiered: Nov 5, 2014

Lumension

Information-Driven Financial Services, Big Data and the Enterprise Data Hub
sponsored by Cloudera
WHITE PAPER: Find out how financial services firms are tackling the challenge of neutralizing inbound pressures and threats in order to gain opportunities from big data.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Cloudera

Incident Response: The New Paradigm
sponsored by TaaSera
WHITE PAPER: This exclusive whitepaper explores the new requirements your incident response system must be able to meet in order to keep your organization safe.
Posted: 05 Nov 2014 | Published: 15 Oct 2014


What are the Barriers to Improving IT Security?
sponsored by Icomm Technologies
VIDEO: This exclusive video explains why you must keep updating IT security to protect against evolving threats.
Posted: 05 Nov 2014 | Premiered: 05 Nov 2014

Icomm Technologies

Proactive Responses to Today's Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores and endpoint management solution that can mitigate your risk of an attack and limit the damage when one happens.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

IBM

Security Intelligence - Solving the Puzzle for Actionable Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this exclusive whitepaper now to learn how to move beyond prevention alone with detection, security analytics and intelligence, and much more.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

LogRhythm, Inc.

IBM Systems Storage Interactive Product Guide
sponsored by IBM
WHITE PAPER: Access this whitepaper to learn about an innovative, virtualized storage for software-defined environments.
Posted: 31 Oct 2014 | Published: 31 Oct 2014

IBM

IT Security and Firewalls
sponsored by Icomm Technologies
VIDEO: This valuable video explores this issue and provides detailed information on the results of a study that can help you identify where your defenses are weak and how to fortify them.
Posted: 31 Oct 2014 | Premiered: 31 Oct 2014

Icomm Technologies

Your Number One IT Security Tip is...
sponsored by Icomm Technologies
VIDEO: Tune in to this exclusive video now to learn the top tip for IT managers whose businesses are still likely vulnerable to attack.
Posted: 31 Oct 2014 | Premiered: 31 Oct 2014

Icomm Technologies

Free Trial: ObserveIT User Activity Monitoring
sponsored by ObserveIT
TRIAL SOFTWARE: ObserveIT enables you to identify and investigate suspicious user activity across your entire environment. Register for a free trial now and gain access to the full range of ObserveIT Enterprise features for 15 days.
Posted: 30 Oct 2014 | Premiered: 30 Oct 2014

ObserveIT
26 - 50 of 1457 Matches Previous Page    1 2 3 4 5    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement