Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk ManagementReports
26 - 50 of 1436 Matches Previous Page  | Next Page
A closer look at Cloud regulations and risks
sponsored by IBM
EGUIDE: The expert e-guide reveals three steps to an enterprise framework for managing cloud risks that ensures your data stays secure and accessible.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

IBM

Taming the Mobile File Sharing Beast
sponsored by Novell, Inc.
WHITE PAPER: In this in-depth white paper, uncover a solution for mobile file access that gives users unfettered access while keeping the process totally under IT control.
Posted: 10 Sep 2014 | Published: 31 Dec 2013

Novell, Inc.

Need for Speed: Streamlining Response and Reaction to Attacks
sponsored by Intel Security
WHITE PAPER: This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.
Posted: 10 Sep 2014 | Published: 31 May 2013

Intel Security

Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
sponsored by Intel Security
WHITE PAPER: SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Posted: 10 Sep 2014 | Published: 31 May 2013

Intel Security

Needle in a Datastack: The Rise of Big Security Data
sponsored by Intel Security
WHITE PAPER: Big data holds many answers, but only if an organization has the capability to harness the ever growing amounts of security information. In deploying a SIEM solution to analyze this data, organizations can repel advanced threats in real-time as well as spot the stealthy, dormant threat.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Intel Security

Manage Security and Risk
sponsored by Intel Security
WHITE PAPER: Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Intel Security

Ready, Aim, HP Fortify!
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, discover how the U.S. Army uses a particular software to help prevent attacks to the TAMIS system.
Posted: 10 Sep 2014 | Published: 01 Oct 2013

Hewlett-Packard Company

SAP uses HP Fortify to help produce Secure Applications
sponsored by Hewlett-Packard Company
CASE STUDY: In this case study, examine how SAP embarks on a journey to perform static analysis on application code in order to identify and mitigate vulnerabilities early on.
Posted: 10 Sep 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

Managing IT Risk: How Much Cybersecurity Is Enough?
sponsored by IBM
WHITE PAPER: In this expert resource, gain critical insights into effective threat intelligence and risk management from industry veterans, and discover their top strategies for keeping your organization protected.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

IBM

The Definitive Guide to Establishing A Security Operation Center
sponsored by AlienVault
WHITE PAPER: In this informative white paper, discover how establishing a security operations center (SOC) can enable your organization to develop a fast, coordinated, and effective response to any and all cyber threats.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

AlienVault

Achieving PCI DSS Peace of Mind in the Cloud
sponsored by CloudPassage
WHITE PAPER: Access this white paper to learn how you can achieve PCI DSS compliance in the cloud without any hassle or setbacks.
Posted: 09 Sep 2014 | Published: 30 Jun 2014

CloudPassage

Cloud and Compliance in One – Is It Possible?
sponsored by Intel Security
WHITE PAPER: Read this insightful report on an integrated security system that help organization stay protected and compliant in cloud-based environments.
Posted: 09 Sep 2014 | Published: 31 Dec 2013

Intel Security

SIEM: Keeping Pace with Big Security Data
sponsored by Intel Security
WHITE PAPER: This detailed report explores how intelligent and scalable Security Information and Event Management (SIEM) solutions can help you stay on top of an ever-evolving, data-driven environment.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Intel Security

The Need for a New Approach to Provisioning
sponsored by RSA, The Security Division of EMC
VIDEO: This video explains the crucial need to handle risk appropriately when dealing with access control.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA, The Security Division of EMC

The Current State of Identity and Access Management
sponsored by RSA, The Security Division of EMC
VIDEO: This video explains the major shift with Identity and Access Management (IAM) in the past few years.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA, The Security Division of EMC

2014 Security Report: How DDoS Attacks Can Mask More Dangerous Malware Threats
sponsored by Neustar®
RESOURCE: In this informative report, discover key findings on the top strategies and techniques for dealing with new DDoS attacks.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Neustar®

The Latest Big Data Predictive Analytics Solutions
sponsored by SAS
WHITE PAPER: Uncover a complete evaluation of 10 various big data predictive analytics solution vendors and find out how they compare to one another.
Posted: 08 Sep 2014 | Published: 04 Feb 2013

SAS

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
PRESENTATION TRANSCRIPT: This expert resource discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Dyn

Get Free GRC Resources and Connect with Peers
sponsored by RSA, The Security Division of EMC
RESOURCE: The RSA Archer GRC Community is an online network of GRC professionals who leverage the content and advice of RSA and its 11,000+ GRC members to help themselves and their organizations excel. Access white papers, blogs, webcasts and more.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

RSA, The Security Division of EMC

Streamline Your Federal Contingency Planning/COOP
sponsored by RSA, The Security Division of EMC
WEBCAST: Learn how to streamline your COOP with an automated and integrated solution. Understand the nuances of the terminology and align with best practices such as NIST 800-34. Align recovery efforts with organizational objectives and priorities.
Posted: 05 Sep 2014 | Premiered: Sep 5, 2014

RSA, The Security Division of EMC

McAfee Positioned in Leaders Quadrant of the Magic Quadrant for SIEM
sponsored by Intel Security
WHITE PAPER: In this informative report, discover why McAfee's Enterprise Security Manager is turning heads in the security industry.
Posted: 05 Sep 2014 | Published: 25 Jun 2014

Intel Security

Effective Risk Assessment for Health Care Providers
sponsored by Solutionary
WHITE PAPER: In this in-depth white paper, gain critical insights into effective risk assessment implementation in today's healthcare organizations.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Solutionary

Managed Security Service Providers Vs. On-Premise SIEM
sponsored by Solutionary
WHITE PAPER: This informative white paper compares the strengths and weakness of on SIEM products with the MSSPs, including the financial, operational, and organizations considerations of each.
Posted: 05 Sep 2014 | Published: 13 Mar 2014

Solutionary

451 Research Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This in-depth 451 Research analysis examines AlienVault, a security vendor tailored for small and midsize businesses.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

AlienVault

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
PODCAST: This expert podcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 05 Sep 2014 | Premiered: Aug 25, 2014

Dyn
26 - 50 of 1436 Matches Previous Page    1 2 3 4 5    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement