Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
26 - 50 of 1423 Matches Previous Page  |  Next Page
Why Governance is Vital to Managing Risk
sponsored by Symantec Corporation
EGUIDE: This expert e-guide covers smart governance processes and how they help manage risk. Discover useful tips such as how to create faster access to better data, in order to initiate investigations and corrective actions following an adverse event.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec Corporation

When Risk Management and Information Governance Collide
sponsored by Symantec Corporation
EGUIDE: This expert e-guide outlines the ways companies can take advantage of information governance. Discover its associated analytics, which help alleviate risk.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec Corporation

HP employs Microsoft Windows Server 2003 Migration Program
sponsored by HP
WHITE PAPER: This white paper explains how to employ a Microsoft Windows Server 2003 migration program. Read now to migrate to Windows Server 2012 R2 while making business improvements.
Posted: 16 Jun 2015 | Published: 31 May 2015

HP

Information Governance: Fighting Back Against the Exponential Data Curve
sponsored by Symantec | Veritas
WHITE PAPER: This white paper focuses on information governance, specifically fighting back against the exponential data growth we are facing.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Symantec | Veritas

Malware Defense and the Fundamentals of Endpoint Security
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide contains expert advice on malware detection, endpoint security, and more.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Endpoint Security and Best Practices for Detecting Malware
sponsored by Malwarebytes Corporation
EGUIDE: In this e-guide, you can find essential tips for adapting your endpoint security to the mobile workforce, and for protecting against hidden malware.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


How to Protect Data from Ransomware and Defend Against the Digital Invasion
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide can help you stay ahead of new cyber-threat developments by telling you all you need to know about ransomware, new digital threats, and more.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Advanced Persistent Threat Detection and How to Prevent Drive-By Download Attacks
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide explains what you can do to detect and stop even the most advanced threats.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


How to Optimize your Data Warehouse for Big Data
sponsored by Cisco
WHITE PAPER: Companies now need data warehouses that can meet today's requirements and can handle a future of ever-proliferating big data. By using hadoop, you can reduce data warehouse management costs while enhancing analytics for improved business outcomes. This white paper explains how to optimize your data warehouse.
Posted: 11 Jun 2015 | Published: 11 Jun 2015

Cisco

Why SMBs Should Use Windows Server 2003 Migration as a Launchpad to IT Transformation
sponsored by Windows Server
WHITE PAPER: Access this white paper to find out why SMBs should migrate to Windows Server 2003 to transform their IT department. Additionally, go through a decision process for SMB IT leaders, considering hiring professional consultants to shape the project.
Posted: 11 Jun 2015 | Published: 31 Jan 2015

Windows Server

The Essential Guide To Selling Managed Endpoint Protection
sponsored by Solarwinds N-able
WHITE PAPER: This guide offers essential tips for building managed security services that effectively protect your customers while building your revenue.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Solarwinds N-able

An E-Guide to Online Security
sponsored by Melbourne IT
WHITE PAPER: The following white paper examines several ways to develop and implement long-term security strategies to proactively defend against evolving security risks. Access now and learn what it takes to beef up your online security quick and efficiently.
Posted: 05 Jun 2015 | Published: 05 Jun 2015

Melbourne IT

Risk-Free VDI with Tintri and Citrix
sponsored by Tintri
WHITE PAPER: Many IT organizations are turning to virtual desktop infrastructure (VDI) technology to reduce the cost, complexity, and risk associated with desktop management. Access this white paper to find out how to gain end-to-end insights into the storage infrastructure for unmatched VM control. Learn how to you make your VDI successful.
Posted: 05 Jun 2015 | Published: 07 Jul 2014

Tintri

Rethink Branch IT
sponsored by Riverbed Technology, Inc.
WEBCAST: In this webcast, learn from several IT professionals about the state of IT in supporting branch and remote locations—the critical front lines of your business.
Posted: 05 Jun 2015 | Premiered: Jun 5, 2015

Riverbed Technology, Inc.

Turkcell improves productivity through processes automation
sponsored by Hewlett-Packard Limited
WHITE PAPER: Turkcell's IT team needed to optimize its resources, focusing on the tens of thousands of incidents and service requests it receives monthly, along with process automation and health checks. Read this white paper to find out how Turkcell's IT team saved 3,300 man-hours each month, while improving quality and supporting digital business processes.
Posted: 03 Jun 2015 | Published: 31 Aug 2013

Hewlett-Packard Limited

A strong information security program is a competitive gain, not just a cost
sponsored by Hewlett-Packard Company
EGUIDE: This e-guide discusses why good cybersecurity can win you more customers and gives you tips for getting the most return on your security investments.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Hewlett-Packard Company

Managing Multi-Vendor UC Ecosystems
sponsored by IR
WEBCAST: This video introduces IR Prognosis, which identifies issues, reduces MTTR, and manages multi-vendor UC ecosystems, including Microsoft, VMware, Avaya, Cisco, and Alcatel-Lucent. Watch now so you can monitor, measure, and manage the user's complete UC experience and take control of your UC environment.
Posted: 02 Jun 2015 | Premiered: Jun 2, 2015

IR

The 5 Essential Functions of an Enterprise Security Operations Center
sponsored by IBM
WHITE PAPER: This infographic describes the five ways a dedicated security operations center can help you develop smarter and more efficient responses to threats.
Posted: 29 May 2015 | Published: 29 May 2015

IBM

Outrunning the Bear: 5 Critical Ways To Take a More Collaborative Approach To IT Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines the challenges inhibiting faster threat response and suggests five critical steps organizations can take to turn security intelligence into action.
Posted: 29 May 2015 | Published: 29 May 2015

Hewlett-Packard Company

The 2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad view of the 2014 threat landscape and gives you the insight you need to protect your business from both known vulnerabilities and unknown exploits.
Posted: 29 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

8 Elements Of Complete Vulnerability Management
sponsored by SilverSky
WHITE PAPER: Read this white paper to discover the eight elements of comprehensive vulnerability management, and to learn how you can make sure your vulnerabilities stay sealed against even the most sophisticated attacks.
Posted: 28 May 2015 | Published: 28 May 2015

SilverSky

Information Visibility: Reducing Business Risk
sponsored by Clearswift
WHITE PAPER: This paper introduces the concepts and ideas behind an information governance platform by providing details of some of its key features, such as Adaptive Redaction and information discovery and tracking through the Information Governance Server.
Posted: 26 May 2015 | Published: 01 Apr 2015

Clearswift

Securing the Mobile-First Experience
sponsored by HID
RESOURCE: This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015

HID

Detect, Prevent, and Manage Cyber-Security Incidents
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper suggests how you can partner with security services for more advanced and effective threat detection and mitigation.
Posted: 26 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

How 15 Different SIEM Systems Performed
sponsored by IBM
WHITE PAPER: This report presents the results of an in-depth review of fifteen different SIEM products.
Posted: 26 May 2015 | Published: 01 Jul 2014

IBM
26 - 50 of 1423 Matches Previous Page    1 2 3 4 5    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement