Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
26 - 50 of 1556 Matches Previous Page  |  Next Page
Top Cybercrime Threats to Financial Institutions
sponsored by Digital Shadows
WHITE PAPER: The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Protect Your Customer and Employee Accounts
sponsored by Digital Shadows
WHITE PAPER: Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Risk Management Pool Achieves Flexible Storage Capabilities
sponsored by Hewlett Packard Enterprise
CASE STUDY: The Special District Risk Management Authority needed a way to improve storage capacity, as well as data-retention and disaster recovery capabilities. Access this case study to learn how they deployed hyperconverged infrastructure throughout their data centers to meet these challenges and then some.
Posted: 13 Nov 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise

Security Automation and Orchestration Best Practices
sponsored by ServiceNow
WEBCAST: According to a recent Forrester Research Survey, 68% of respondents state that using automation and orchestration tools to improve security operations is a high or critical priority. Watch this webcast to gain insight into security automation and orchestration (SAO) best practices and a roadmap for deployment.
Posted: 13 Nov 2017 | Premiered: Nov 13, 2017

ServiceNow

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: According to a Black Hat Report, 32% of hackers say accessing privileged accounts is the easiest and fastest way to get at sensitive data. This white paper explores the risks associated with privileged accounts and offers strategic risk mitigation tactics you can take to ensure security.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

One Identity

How York Risk Services Responds to Security Threats in Minutes vs. Hours or Days
sponsored by ServiceNow
WEBCAST: When responding to security vulnerabilities, lack of speed and consistency are significant issues many enterprises face. Watch this webcast case study to gain insight into how York Risk Services overcame their incident response issues by implementing an effective vulnerability response strategy.
Posted: 10 Nov 2017 | Premiered: Nov 10, 2017

ServiceNow

Case Study: How Seton Hall University Improved Vulnerability Management
sponsored by ServiceNow
WEBCAST: Inside this case study, Seton Hall University faced many challenges related to prioritizing and responding to the most critical vulnerabilities. Dive into how Seton Hall University overcame these challenges and became proactive in remediating vulnerabilities.
Posted: 10 Nov 2017 | Premiered: Nov 10, 2017

ServiceNow

Equifax Breach: Lessons Learned for your Organization
sponsored by Digital Shadows
WHITE PAPER: The Equifax data breach potentially affected 143 million individuals in the US, Canada and the UK. Inside, gain insight into the impacts of the Equifax Breach, 6 lessons learned from the breach, and how your enterprise can mitigate the risks of falling victim to such a devastating data breach.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Digital Shadows

6 GDPR Compliance Pitfalls & How to Avoid Them
sponsored by Collibra
WHITE PAPER: The GDPR is a complex regulation. And on the path to compliance, there will be unanticipated roadblocks. The good news is, you can find your way through them.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Collibra

The Need for Automotive Cybersecurity Testing Standards
sponsored by Synopsys
WHITE PAPER: Most organizations creating connected systems and devices today spend a considerable amount of time looking at security issues, but often lack a standard framework for testing security. Uncover the importance of developing standards for validating and verifying security.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Synopsys

GDPR
sponsored by RSA
WHITE PAPER: GDPR is on track to be the most significant change in global privacy laws in the past 20 years. Everyone wants to know: How will this affect my business? Read this RSA e-book to discover what you need to know about how the GDPR and EU's privacy rules could impact your business operations.
Posted: 08 Nov 2017 | Published: 31 Dec 2016

RSA

GDPR Survival Basics
sponsored by RSA
WHITE PAPER: GDPR takes effect in May 2018. How prepared is your organization? This white paper sets out 5 basic steps for organizations to consider when setting up framework for managing GDPR risk.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

RSA

A Practical Guide for GDPR Compliance
sponsored by RSA
WHITE PAPER: According to an Osterman Research report, 64% of organizations are not ready to comply with the GDPR. Grab your copy of this Osterman Research practical guide to understanding your readiness. Don't miss the checklist on page 9.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

RSA

GDPR: What it Means to Your Cybersecurity Strategy
sponsored by RSA
WHITE PAPER: More than 90% of Europeans say they want the same data protection rights regardless of where their data is processed, and as a result the EU GDPR came along. This white paper reveals what the GDPR means for your various cybersecurity strategies and how you'll need to adjust your approaches to comply.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

RSA

Top-of-Mind Threats and Their Impact on Endpoint Security Decisions
sponsored by Cylance
WHITE PAPER: According to this ESG report, 91% of cybersecurity professionals express the greatest concern over the threat posed by email phishing. Explore this report to learn how to protect your organization's endpoints against cyberattacks with specific defense strategies, including machine learning.
Posted: 01 Nov 2017 | Published: 01 Nov 2017

Cylance

Introduction to Artificial Intelligence for Security Professionals
sponsored by Cylance
WHITE PAPER: According to Gartner, by 2018, 25% of security products used for detection will have some form of machine learning built into them. Explore this 155 page e-book to learn more about artificial intelligence and machine learning for security professionals.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Cylance

10 Traits Of Successful DLP Programs
sponsored by InteliSecure
WHITE PAPER: According to Gartner, by 2018, 90% of organizations will implement at least one form of integrated DLP. This white paper reveals 10 traits of successful DLP programs to increase the effectiveness of your program.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

InteliSecure

Operationalize Your Organization for the GDPR
sponsored by InteliSecure
WHITE PAPER: Learn how creating a general data protection regulation framework to protect critical assets, both tangible and intangible (think IP), will enable you to operationalize your GDPR compliance.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

InteliSecure

Next-Generation Anti-Malware Testing for Dummies
sponsored by Cylance
WHITE PAPER: Inside this Next-Generation Anti-Malware Testing for Dummies e-book, learn about next-generation endpoint security techniques and how you can use machine learning and AI to protect against advanced persistent threats.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Cylance

How Reliable PDUs Lead to Reliable Data Centers
sponsored by Raritan Inc.
EBOOK: You need to build your data center on a strong foundation, and that starts with a reliable PDU. Read this e-book to learn about the cost and security implications of maintaining a data center and how a reliable PDU will help you achieve continuous uptime.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Raritan Inc.

Pathways for GDPR Readiness
sponsored by IBM
WHITE PAPER: The GDPR regulation can be used as a potential business opportunity for your company. Explore this white paper to learn more about getting a leg up with the GDPR journey, potential drawbacks of failing to comply with GDPR and how your company can benefit from GDPR.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

IBM

Are You Ready? The GDPR is Here
sponsored by IBM
WEBCAST: Non-compliance with GDPR has the potential to lead to huge fines, so now is the time to ensure you protect, govern, and know your data. Watch this webcast to learn more about preparing your organization's data and policies for GDPR.
Posted: 30 Oct 2017 | Premiered: Mar 29, 2017

IBM

5 Steps to Building a Successful Vulnerability Management Program
sponsored by Tenable, Inc.
WHITE PAPER: Vulnerability management is something that will never end and will need to be improved and worked on periodically to ensure the security of your enterprise.Explore this white paper to learn more about successful vulnerability management programs to protect your enterprise.
Posted: 30 Oct 2017 | Published: 27 Apr 2017

Tenable, Inc.

5 Risk Points to Avoid in Enterprise Security
sponsored by Microsoft
WHITE PAPER: According to the Verizon Data Breach Investigations Report, nearly 80% of organizations reported data breaches, with 1/3 of them reporting more than 6 breaches. In this white paper, find out how you can boost your organization's device and app security, all while protecting against malware, data breaches and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Microsoft

Powerful DDoS Attacks & Recovery for Enterprises
sponsored by Arbor Networks
EGUIDE: A series of potent, record-setting DDoS attacks hit several targets in 2016 using IoT malware to infect and leverage a large number of internet connect devices. Inside this guide, experts reveal 11 key takeaways for this type of attack and real-world examples of companies suffering from the aftermath including Dyn.
Posted: 31 Oct 2017 | Published: 24 Oct 2017

Arbor Networks
26 - 50 of 1556 Matches Previous Page    1 2 3 4 5    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement